default search action
Don J. Torrieri
Person information
- affiliation: US Army Research Laboratory, Adelphi, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j33]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Analysis of a Frequency-Hopping Millimeter-Wave Cellular Uplink. IEEE Trans. Wirel. Commun. 15(10): 7089-7098 (2016) - [i19]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Analysis of a Frequency-Hopping Millimeter-Wave Cellular Uplink. CoRR abs/1607.08200 (2016) - 2015
- [j32]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Performance Comparisons of Geographic Routing Protocols in Mobile Ad Hoc Networks. IEEE Trans. Commun. 63(11): 4276-4286 (2015) - [c26]Zhiyong Shan, Iulian Neamtiu, Zhiyun Qian, Don J. Torrieri:
Proactive restart as cyber maneuver for Android. MILCOM 2015: 19-24 - [c25]Salvatore Talarico, Matthew C. Valenti, Don J. Torrieri:
Otimization of an adaptive frequency-hopping network. MILCOM 2015: 854-859 - [c24]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Performance analysis of fifth-generation cellular uplink. MILCOM 2015: 1206-1211 - [i18]Salvatore Talarico, Matthew C. Valenti, Don J. Torrieri:
Optimization of an Adaptive Frequency-Hopping Network. CoRR abs/1508.05694 (2015) - [i17]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Performance Analysis of Fifth-Generation Cellular Uplink. CoRR abs/1508.06011 (2015) - [i16]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Performance Comparisons of Geographic Routing Protocols in Mobile Ad Hoc Networks. CoRR abs/1509.01205 (2015) - 2014
- [j31]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don J. Torrieri:
A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks 14: 84-94 (2014) - [j30]Tianzhen Cheng, Ping Li, Sencun Zhu, Don J. Torrieri:
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks. Integr. Comput. Aided Eng. 21(1): 19-34 (2014) - [j29]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
A Direct Approach to Computing Spatially Averaged Outage Probability. IEEE Commun. Lett. 18(7): 1103-1106 (2014) - [j28]Don J. Torrieri:
Direction Finding of a Compromised Node in a Wireless Network. IEEE Trans. Mob. Comput. 13(9): 1995-2002 (2014) - [c23]Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia:
Self-healing wireless networks under insider jamming attacks. CNS 2014: 220-228 - [c22]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Performance Analysis of Geographic Routing Protocols in Ad Hoc Networks. MILCOM 2014: 1079-1084 - [i15]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
A Direct Approach to Computing Spatially Averaged Outage Probability. CoRR abs/1404.2380 (2014) - [i14]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Performance Analysis of Geographic Routing Protocols in Ad Hoc Networks. CoRR abs/1412.5616 (2014) - 2013
- [j27]Don J. Torrieri, Matthew C. Valenti:
Exclusion and Guard Zones in DS-CDMA Ad Hoc Networks. IEEE Trans. Commun. 61(6): 2468-2476 (2013) - [j26]Don J. Torrieri, Matthew C. Valenti, Salvatore Talarico:
An Analysis of the DS-CDMA Cellular Uplink for Arbitrary and Constrained Topologies. IEEE Trans. Commun. 61(8): 3318-3326 (2013) - [c21]Salvatore Talarico, Matthew C. Valenti, Don J. Torrieri:
Analysis of multi-cell downlink cooperation with a constrained spatial model. GLOBECOM 2013: 3631-3636 - [c20]Don J. Torrieri, Matthew C. Valenti, Salvatore Talarico:
A new analysis of the DS-CDMA cellular uplink under spatial constraints. ICC 2013: 5360-5365 - [c19]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
Adjacent-channel interference in frequency-hopping ad hoc networks. ICC 2013: 5583-5588 - [c18]Terry Ferrett, Matthew C. Valenti, Don J. Torrieri:
An iterative noncoherent relay receiver for the two-way relay channel. ICC 2013: 5903-5908 - [c17]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
A new analysis of the DS-CDMA cellular downlink under spatial constraints. ICNC 2013: 425-430 - [c16]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Multihop Routing in Ad Hoc Networks. MILCOM 2013: 504-509 - [p2]Don J. Torrieri, Sencun Zhu, Sushil Jajodia:
Cyber Maneuver Against External Adversaries and Compromised Nodes. Moving Target Defense 2013: 87-96 - [i13]Terry Ferrett, Matthew C. Valenti, Don J. Torrieri:
An Iterative Noncoherent Relay Receiver for the Two-way Relay Channel. CoRR abs/1302.6292 (2013) - [i12]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
Adjacent-Channel Interference in Frequency-Hopping Ad Hoc Networks. CoRR abs/1303.0567 (2013) - [i11]Don J. Torrieri, Matthew C. Valenti:
Exclusion and Guard Zones in DC-CDMA Ad Hoc Networks. CoRR abs/1304.5304 (2013) - [i10]Don J. Torrieri, Matthew C. Valenti, Salvatore Talarico:
A New Analysis of the DS-CDMA Cellular Uplink Under Spatial Constraints. CoRR abs/1304.7517 (2013) - [i9]Salvatore Talarico, Matthew C. Valenti, Don J. Torrieri:
Analysis of Multi-Cell Downlink Cooperation with a Constrained Spatial Model. CoRR abs/1306.3786 (2013) - [i8]Don J. Torrieri, Matthew C. Valenti, Salvatore Talarico:
An Analysis of the DS-CDMA Cellular Uplink for Arbitrary and Constrained Topologies. CoRR abs/1306.6735 (2013) - [i7]Don J. Torrieri, Salvatore Talarico, Matthew C. Valenti:
Multihop Routing in Ad Hoc Networks. CoRR abs/1309.3582 (2013) - 2012
- [j25]Don J. Torrieri, Matthew C. Valenti:
The Outage Probability of a Finite Ad Hoc Network in Nakagami Fading. IEEE Trans. Commun. 60(11): 3509-3518 (2012) - [c15]Don J. Torrieri:
Direction finding of a compromised node in a spread-spectrum network. MILCOM 2012: 1-6 - [c14]Don J. Torrieri, Matthew C. Valenti:
Guard zones and the near-far problem in DS-CDMA ad hoc networks. MILCOM 2012: 1-6 - [c13]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
Optimization of a finite frequency-hopping ad hoc network in Nakagami fading. MILCOM 2012: 1-6 - [i6]Don J. Torrieri, Matthew C. Valenti:
The Outage Probability of a Finite Ad Hoc Network in Nakagami Fading. CoRR abs/1207.2711 (2012) - [i5]Don J. Torrieri, Matthew C. Valenti:
Guard Zones and the Near-Far Problem in DS-CDMA Ad Hoc Networks. CoRR abs/1207.2825 (2012) - [i4]Salvatore Talarico, Matthew C. Valenti, Don J. Torrieri:
Analysis and Optimization of a Frequency-Hopping Ad Hoc Network in Rayleigh Fading. CoRR abs/1207.3451 (2012) - [i3]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
Optimization of a Finite Frequency-Hopping Ad Hoc Network in Nakagami Fading. CoRR abs/1207.4083 (2012) - [i2]Matthew C. Valenti, Don J. Torrieri, Salvatore Talarico:
A New Analysis of the DS-CDMA Cellular Downlink Under Spatial Constraints. CoRR abs/1210.3667 (2012) - 2011
- [j24]Matthew C. Valenti, Don J. Torrieri, Terry Ferrett:
Noncoherent Physical-Layer Network Coding with FSK Modulation: Relay Receiver Design Issues. IEEE Trans. Commun. 59(9): 2595-2604 (2011) - [c12]Terry Ferrett, Matthew C. Valenti, Don J. Torrieri:
Noncoherent digital network coding using multi-tone CPFSK modulation. MILCOM 2011: 299-304 - [c11]Don J. Torrieri, Michael B. Bendak, Gordon Ritchie:
Indoor geolocation by inertial navigation. MILCOM 2011: 1760-1765 - [c10]Thomas J. Calomiris, Don J. Torrieri, Douglas A. Gwyn, Tarin Ziyaee:
Implementation and emulation of adaptive-array algorithms for direct-sequence systems. MILCOM 2011: 1790-1795 - 2010
- [j23]Don J. Torrieri, Matthew C. Valenti:
Efficiently decoded full-rate space-time block codes. IEEE Trans. Commun. 58(2): 480-488 (2010) - [j22]Matthew C. Valenti, Shi Cheng, Don J. Torrieri:
Iterative Multisymbol Noncoherent Reception of Coded CPFSK. IEEE Trans. Commun. 58(7): 2046-2054 (2010) - [j21]Don J. Torrieri, Amitav Mukherjee, Hyuck M. Kwon:
Coded DS-CDMA systems with iterative channel estimation and no pilot symbols. IEEE Trans. Wirel. Commun. 9(6): 2012-2021 (2010) - [i1]Don J. Torrieri, Amitav Mukherjee, Hyuck M. Kwon:
Coded DS-CDMA Systems with Iterative Channel Estimation and no Pilot Symbols. CoRR abs/1008.3196 (2010)
2000 – 2009
- 2009
- [j20]Shi Cheng, Matthew C. Valenti, Don J. Torrieri:
Coherent continuous-phase frequency-shift keying: Parameter optimization and code design. IEEE Trans. Wirel. Commun. 8(4): 1792-1802 (2009) - 2008
- [j19]Don J. Torrieri, Shi Cheng, Matthew C. Valenti:
Robust Frequency Hopping for Interference and Fading Channels. IEEE Trans. Commun. 56(8): 1343-1351 (2008) - [j18]Don J. Torrieri, Kesh Bakhru:
Adaptive-Array Algorithm for Interference Suppression Prior to Acquisition of Direct-Sequence Signal. IEEE Trans. Wirel. Commun. 7(9): 3341-3346 (2008) - [j17]Don J. Torrieri, Matthew C. Valenti:
Constellation labeling maps for low error floors. IEEE Trans. Wirel. Commun. 7(12-2): 5401-5407 (2008) - [c9]Matthew C. Valenti, Raghu Doppalapudi, Don J. Torrieri:
A genetic algorithm for designing constellations with low error floors. CISS 2008: 1155-1160 - [c8]Don J. Torrieri, Neelu Bijukchhe, Amitav Mukherjee, Hyuck M. Kwon:
Iterative EM channel estimation for turbo-coded DS-CDMA receiver under time-varying interference. WSA 2008: 174-179 - 2007
- [j16]Don J. Torrieri, Kesh Bakhru:
The Maximin Adaptive-Array Algorithm for Direct-Sequence Systems. IEEE Trans. Signal Process. 55(5-1): 1853-1861 (2007) - [j15]Shi Cheng, Matthew C. Valenti, Don J. Torrieri:
Robust Iterative Noncoherent Reception of Coded FSK over Block Fading Channels. IEEE Trans. Wirel. Commun. 6(9): 3142-3147 (2007) - [c7]Shi Cheng, Rohit Iyer Seshadri, Matthew C. Valenti, Don J. Torrieri:
The Capacity of Noncoherent Continuous-Phase Frequency Shift Keying. CISS 2007: 396-401 - [c6]Don J. Torrieri, Shi Cheng, Matthew C. Valenti:
Robust Frequency-Hopping System for Channels with Interference and Frequency-Selective Fading. ICC 2007: 4481-4487 - [c5]Don J. Torrieri, Avinash Mathur, Amitav Mukherjee, Hyuck M. Kwon:
Iterative EM Based LDPC CDMA Receiver under Time Varying Interference. VTC Spring 2007: 1986-1989 - 2003
- [c4]Don J. Torrieri:
Uplink capacity of a CDMA network. WCNC 2003: 1408-1411 - 2002
- [j14]Don J. Torrieri:
Instantaneous and local-mean power control for direct-sequence CDMA cellular networks. IEEE Trans. Commun. 50(8): 1310-1315 (2002) - [j13]Don J. Torrieri:
Simple formula for error probability of RAKE demodulator for noncoherent binary orthogonal signals and Rayleigh fading. IEEE Trans. Commun. 50(11): 1734-1735 (2002) - 2000
- [j12]Don J. Torrieri:
Mobile frequency-hopping CDMA systems. IEEE Trans. Commun. 48(8): 1318-1327 (2000)
1990 – 1999
- 1999
- [j11]Don J. Torrieri:
The eigenspace separation transform for neural-network classifiers. Neural Networks 12(3): 419-427 (1999) - [c3]LipChen Alex Chan, Nasser M. Nasrabadi, Don J. Torrieri:
Bipolar Elgenspace Separation Transformation for Automatic Clutter Rejection. ICIP (1) 1999: 139-142 - [c2]LipChen Alex Chan, Nasser M. Nasrabadi, Don J. Torrieri:
Selectively optimized networks for automatic clutter rejection. IJCNN 1999: 3161-3164 - 1997
- [j10]Gregory L. Plett, Takeshi Doi, Don J. Torrieri:
Mine detection using scattering parameters. IEEE Trans. Neural Networks 8(6): 1456-1467 (1997) - 1996
- [c1]Don J. Torrieri:
A linear transform that simplifies and improves neural-network classifiers. ICNN 1996: 1738-1743 - 1992
- [j9]Don J. Torrieri:
Performance of Direct-Sequence Systems with Long Pseudonoise Sequences. IEEE J. Sel. Areas Commun. 10(4): 770-781 (1992) - [j8]Leonard E. Miller, Jhong S. Lee, Robert H. French, Don J. Torrieri:
Analysis of an antijam FH acquisition scheme. IEEE Trans. Commun. 40(1): 160-170 (1992) - [j7]Don J. Torrieri:
Algorithms for finding an optimal set of short disjoint paths in a communication network. IEEE Trans. Commun. 40(11): 1698-1702 (1992) - 1990
- [p1]Don J. Torrieri:
Statistical Theory of Passive Location Systems. Autonomous Robot Vehicles 1990: 151-166
1980 – 1989
- 1989
- [j6]Don J. Torrieri:
Fundamental limitations on repeater jamming of frequency-hopping communications. IEEE J. Sel. Areas Commun. 7(4): 569-575 (1989) - 1988
- [j5]Don J. Torrieri:
Information-bit, information-symbol, and decoded-symbol error rates for linear block codes. IEEE Trans. Commun. 36(5): 613-617 (1988) - 1986
- [j4]Don J. Torrieri:
The Performance of Five Different Metrics Against Pulsed Jamming. IEEE Trans. Commun. 34(2): 200-204 (1986) - 1984
- [j3]Don J. Torrieri:
The Information-Bit Error Rate for Block Codes. IEEE Trans. Commun. 32(4): 474-476 (1984) - [j2]Don J. Torrieri:
Frequency Hopping with Multiple Frequency-Shift Keying and Hard Decisions. IEEE Trans. Commun. 32(5): 574-582 (1984) - [j1]Don J. Torrieri:
Correction to "Frequency Hopping with Multiple Frequency-Shift Keying and Hard Decisions". IEEE Trans. Commun. 32(11): 1218 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint