Author of the publication

Universal coding for correlated sources with complementary delivery.

, , and . ISIT, page 1756-1760. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal Coding for Lossless and Lossy Complementary Delivery Problems, , and . CoRR, (2008)Universal coding for lossy complementary delivery problem., , and . ISIT, page 2177-2181. IEEE, (2008)Revisiting the Slepian-Wolf coding problem for general sources: A direct approach., and . ISIT, page 1336-1340. IEEE, (2014)Noise tolerance of the BB84 protocol with random privacy amplification., , and . ISIT, page 1013-1017. IEEE, (2005)A construction of codes with exponential error bounds on arbitrary discrete memoryless channels., and . IEEE Trans. Inf. Theory, 43 (3): 992-996 (1997)An Equivalent Expression for the Wyner-Ziv Source Coding Problem., and . ISITA, page 21-25. IEEE, (2020)Strongly-secure secret sharing based on linear codes can be characterized by generalized hamming weight., and . Allerton, page 951-957. IEEE, (2011)An algebraic construction of codes for Slepian-Wolf source networks.. IEEE Trans. Inf. Theory, 47 (7): 3082-3088 (2001)Decodability of Network Coding with Time-Varying Delay and No Buffering., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (8): 2141-2145 (2009)Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext., , and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 369-382. Springer, (1994)