Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resiliency in numerical algorithm design for extreme scale simulations., , , , , , , , , and 26 other author(s). Int. J. High Perform. Comput. Appl., 36 (2): 251-285 (2022)Quantum and Quantum-Inspired Stereographic K Nearest-Neighbour Clustering., , , , , , and . Entropy, 25 (9): 1361 (September 2023)Testing of Hybrid Quantum-Classical K-Means for Nonlinear Noise Mitigation., , , , , , and . GLOBECOM, page 3179-3184. IEEE, (2023)Resiliency in Numerical Algorithm Design for Extreme Scale Simulations., , , , , , , , , and 26 other author(s). CoRR, (2020)Online flow size prediction for improved network routing., , , , , , , , and . ICNP, page 1-6. IEEE Computer Society, (2016)Linking QKD testbeds across Europe., , , , , , , , , and 4 other author(s). CoRR, (2023)Solution to time-energy costs of quantum channels., , , and . Quantum Inf. Comput., 15 (7&8): 685-693 (2015)Precoding for the Multiantenna Downlink: Multiuser SNR Gap and Optimal User Ordering., , and . IEEE Trans. Commun., 55 (1): 188-197 (2007)High-Rate Continuous-Variables Quantum Key Distribution with Piloted-Disciplined Local Oscillator., , , , , , , , , and 2 other author(s). ECOC, page 1-3. IEEE, (2017)Security proof of quantum key distribution with detection efficiency mismatch., , , , and . Quantum Inf. Comput., 9 (1&2): 131-165 (2009)