default search action
John F. Doherty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c20]Nathaniel A. Henry, John F. Doherty, David M. Jenkins:
Wideband Auto-Ambiguity Function Nulling Algorithm. MILCOM 2021: 133-138 - 2020
- [j25]Richard A. Metzger, John F. Doherty, David M. Jenkins, Donald L. Hall:
Approximate Entropy and Empirical Mode Decomposition for Improved Speaker Recognition. Adv. Data Sci. Adapt. Anal. 12(3-4): 2050011:1-2050011:24 (2020)
2010 – 2019
- 2016
- [c19]Richard A. Metzger, John F. Doherty, David M. Jenkins:
Using Approximate Entropy as a speech quality measure for a speaker recognition system. CISS 2016: 292-297 - [c18]J. Daniel Park, John F. Doherty:
A steganographic approach for covert waveform design. MILCOM 2016: 180-185 - 2015
- [j24]J. Daniel Park, John F. Doherty:
Track Detection of Low Observable Targets Using a Motion Model. IEEE Access 3: 1408-1415 (2015) - [c17]Richard A. Metzger, John F. Doherty, David M. Jenkins:
Analysis of compressed speech signals in an Automatic Speaker Recognition system. CISS 2015: 1-5 - 2011
- [j23]Arnab Roy, John F. Doherty:
Overlay Communications Using Empirical Mode Decomposition. IEEE Syst. J. 5(1): 121-128 (2011) - [j22]Saurabh U. Pawar, John F. Doherty:
Modulation Recognition in Continuous Phase Modulation Using Approximate Entropy. IEEE Trans. Inf. Forensics Secur. 6(3-1): 843-852 (2011) - [j21]Ming-Wei Liu, John F. Doherty:
Nonlinearity Estimation for Specific Emitter Identification in Multipath Channels. IEEE Trans. Inf. Forensics Secur. 6(3-2): 1076-1085 (2011) - [c16]Arnab Roy, John F. Doherty:
Weak signal sensing using empirical mode decomposition and stochastic data reordering. MILCOM 2011: 37-41 - 2010
- [j20]Arnab Roy, John F. Doherty:
Covert Communications Based on Signal Overlay. Adv. Data Sci. Adapt. Anal. 2(3): 295-311 (2010) - [c15]J. Daniel Park, David J. Miller, John F. Doherty, Stephen C. Thompson:
Feasibility of range estimation using sonar LPI. CISS 2010: 1-6
2000 – 2009
- 2009
- [j19]Arnab Roy, Stan J. Briczinski, John F. Doherty, John D. Mathews:
Genetic-Algorithm-Based Parameter Estimation Technique for Fragmenting Radar Meteor Head Echoes. IEEE Geosci. Remote. Sens. Lett. 6(3): 363-367 (2009) - [c14]J. Daniel Park, David J. Miller, John F. Doherty, Stephen C. Thompson:
A study on the feasibility of low probability of intercept sonar. CISS 2009: 284-289 - [c13]Ming-Wei Liu, John F. Doherty:
Wireless device identification in MIMO channels. CISS 2009: 563-567 - [c12]Arnab Roy, John F. Doherty:
Raised cosine interpolation for empirical mode decomposition. CISS 2009: 888-892 - 2008
- [j18]Arnab Roy, Chun-Hsien Wen, John F. Doherty, John D. Mathews:
Signal Feature Extraction From Microbarograph Observations Using the Hilbert-Huang Transform. IEEE Trans. Geosci. Remote. Sens. 46(5): 1442-1447 (2008) - [c11]Arnab Roy, John F. Doherty:
Empirical mode decomposition frequency resolution improvement using the pre-emphasis and de-emphasis method. CISS 2008: 453-457 - 2007
- [c10]Arnab Roy, John F. Doherty:
Signal Detection in an Impulsive Noise Environment Using Locally Optimum Detection. VTC Fall 2007: 1022-1026 - 2006
- [j17]Stan J. Briczinski, Chun-Hsien Wen, John D. Mathews, John F. Doherty, Qina N. Zhou:
Robust Voltage Fitting Techniques for Meteor Doppler Speed Determination. IEEE Trans. Geosci. Remote. Sens. 44(12): 3490-3496 (2006) - [c9]Arnab Roy, John F. Doherty:
Autoregressive Interference Suppression in Spread Spectrum Systems using Locally Optimum Detection. CISS 2006: 447-451 - 2005
- [j16]Wen-Jye Huang, John F. Doherty:
Traffic Models and Blocking Probabilities for Two-Fold and Three-Fold SDMA Communication Systems. Wirel. Pers. Commun. 34(3): 279-305 (2005) - [c8]Arnab Roy, John F. Doherty:
Locally optimum detection performance analysis for narrowband interference rejection in spread spectrum communications. GLOBECOM 2005: 5 - 2004
- [j15]Chun-Hsien Wen, John F. Doherty, John D. Mathews:
Time-frequency radar processing for meteor detection. IEEE Trans. Geosci. Remote. Sens. 42(3): 501-510 (2004) - 2003
- [c7]Mohsen Kavehrad, John F. Doherty, Jun Ho Jeong, Arnab Roy, Gaurav Malhotra:
10 Gbps transmission over standard category-5 copper cable. GLOBECOM 2003: 4106-4110 - 2002
- [j14]John F. Doherty, Yu-Tsun Hsieh:
A Constrained Block Iterative Algorithm for Multiple-Access Interference Suppression. Digit. Signal Process. 12(1): 12-20 (2002) - [j13]Yiwei Wang, John F. Doherty, Robert E. Van Dyck:
A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2): 77-88 (2002) - [j12]John F. Doherty, Gerard J. Michaud, Allan G. Sonsteby:
Statistical Properties of Mobile-to-Mobile Code Alignment in CDMA Communications. Wirel. Pers. Commun. 20(2): 179-188 (2002) - 2001
- [c6]A. Ravindran, Hang Liu, Izzet Agoren, Alex J. Lackpour, David J. Miller, Mohsen Kavehrad, John F. Doherty:
Mobile multimedia services for third generation communications systems. VTC Fall 2001: 2589-2593 - 2000
- [j11]Jaeseung Yoon, John F. Doherty:
Interference suppression in CDMA systems using a sequential adaptive receiver. J. Commun. Networks 2(3): 239-243 (2000) - [c5]Yiwei Wang, John F. Doherty, Robert E. Van Dyck:
Moving Object Tracking in Video. AIPR 2000: 95-101
1990 – 1999
- 1998
- [j10]Ajai Narayan, John F. Doherty:
Low-Bit-Rate VQ: A Projection Based Approach. Multidimens. Syst. Signal Process. 9(3): 255-272 (1998) - [j9]John F. Doherty:
A Regularized LMS Algorithm for Narrowband Interference Rejection in Direct Sequence Spread Spectrum Communications. Wirel. Pers. Commun. 7(1): 53-67 (1998) - 1997
- [j8]Krishna R. Narayanan, John F. Doherty:
A convex projections method for improved narrow-band interference rejection in direct-sequence spread-spectrum systems. IEEE Trans. Commun. 45(7): 772-774 (1997) - 1996
- [j7]Rajiv Porayath, John F. Doherty, Steve F. Russell:
An Adaptive Acoustic Echo Canceler for Hands-Free Teleconferencing. Digit. Signal Process. 6(1): 29-36 (1996) - [j6]Ajai Narayan, John F. Doherty:
Convex projections based edge recovery in low bit rate VQ. IEEE Signal Process. Lett. 3(4): 97-99 (1996) - [j5]John F. Doherty, Henry Stark:
Direct-sequence spread spectrum narrowband interference rejection using property restoration. IEEE Trans. Commun. 44(9): 1197-1204 (1996) - [j4]John F. Doherty, James P. Michels:
A linearly constrained fast transversal filter for direct-sequence spread spectrum interference rejection. IEEE Trans. Commun. 44(11): 1428-1431 (1996) - [c4]Ajai Narayan, John F. Doherty:
Multiple codebook decoding of VQ compressed images. ICASSP 1996: 2028-2031 - [c3]Sang C. Park, John F. Doherty:
A minimax optimization approach to sidelobe suppression filter design. ICASSP 1996: 3113-3116 - 1995
- [j3]John F. Doherty:
Suppression of terrain-scattered jamming in pulse compression radar. IEEE Signal Process. Lett. 2(1): 4-6 (1995) - 1994
- [j2]John F. Doherty:
Linearly constrained direct-sequence spread-spectrum interference rejection. IEEE Trans. Commun. 42(234): 865-872 (1994) - [c2]Sanjeev Tavathia, John F. Doherty:
Robust signal estimation using H∞ criteria. ICASSP (4) 1994: 525-528 - 1992
- [j1]John F. Doherty, Richard J. Mammone:
A fast method for regularized adaptive filtering. Digit. Signal Process. 2(1): 14-26 (1992) - 1990
- [c1]John F. Doherty, Richard J. Mammone:
A row-action projection algorithm for adaptive filtering. ICASSP 1990: 1397-1400
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint