Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some aspects of error bounds in feature selection., and . Pattern Recognit., 11 (5-6): 353-360 (1979)A Binary Sequence Generator Based on Ziv-Lempel Source Coding., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 156-164. Springer, (1990)KEYMEX: An expert system for the design of key management schemes., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 96-103. Springer, (1990)Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis., and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 489-513. Springer, (1985)Sub-band coding of images using predictive vector quantization., , and . ICASSP, page 1378-1381. IEEE, (1987)Bounds and constructions for codes correcting unidirectional errors., , and . IEEE Trans. Inf. Theory, 35 (4): 797-810 (1989)On the Significance of the Directed Acyclic Word Graph in Cryptology., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 318-326. Springer, (1990)Subband coding of images using vector quantization., , , and . IEEE Trans. Commun., 36 (6): 713-719 (1988)The R-Norm Information Measure, and . Inf. Control., 45 (2): 136-155 (May 1980)A pel-recursive segmentation and estimation algorithm for motion compensated image sequence coding., , and . ICASSP, page 1901-1904. IEEE, (1989)