Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiterminal source coding with complementary delivery, and . CoRR, (2008)Universal source coding over generalized complementary delivery networks, , , and . CoRR, (2007)Universal Coding for Lossless and Lossy Complementary Delivery Problems, , and . CoRR, (2008)Universal coding for lossy complementary delivery problem., , and . ISIT, page 2177-2181. IEEE, (2008)Noise tolerance of the BB84 protocol with random privacy amplification., , and . ISIT, page 1013-1017. IEEE, (2005)Revisiting the Slepian-Wolf coding problem for general sources: A direct approach., and . ISIT, page 1336-1340. IEEE, (2014)A construction of codes with exponential error bounds on arbitrary discrete memoryless channels., and . IEEE Trans. Inf. Theory, 43 (3): 992-996 (1997)On the Wyner-Ziv Source Coding Problem with Unknown Delay., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (12): 2288-2299 (2014)Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (9): 1650-1659 (2010)Achievable Rate Regions for Source Coding with Delayed Partial Side Information., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (12): 1631-1641 (2019)