Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approaching capacity by equiprobable signaling on the Gaussian channel., and . IEEE Trans. Inf. Theory, 39 (5): 1714-1716 (1993)Two-dimensional burst identification codes and their use in burst correction., , and . IEEE Trans. Inf. Theory, 34 (3): 494-504 (1988)On the Security of Digital Signature Schemes Based on Error-Correcting Codes., , and . Des. Codes Cryptogr., 28 (2): 187-199 (2003)Constructions and Properties of k out of n Visual Secret Sharing Schemes., and . Des. Codes Cryptogr., 11 (2): 179-196 (1997)Multiple burst-correcting array codes., , and . IEEE Trans. Inf. Theory, 34 (5): 1061-1066 (1988)Two observations concerning optimum cyclic burst-correcting codes., and . Discret. Math., 184 (1-3): 111-120 (1998)Upper bounds on |C2| for a uniquely decodable code pair (C1, C2) for a two-access binary adder channel.. IEEE Trans. Inf. Theory, 29 (3): 386-389 (1983)Symbol synchronization in convolutionally coded systems (Corresp.)., , and . IEEE Trans. Inf. Theory, 25 (3): 362-365 (1979)On maximum likelihood soft-decision decoding of binary linear codes., , and . IEEE Trans. Inf. Theory, 39 (1): 197-203 (1993)Two "Dual" Families of Nearly-Linear Codes over Zp, p odd., and . Appl. Algebra Eng. Commun. Comput., 11 (4): 313-329 (2001)