Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Maximum Size of Block Codes Subject to a Distance Criterion., , , , and . IEEE Trans. Inf. Theory, 65 (6): 3751-3757 (2019)Threshold-based cooperative communication of energy harvesting active networked tags., , , , and . Int. J. Ad Hoc Ubiquitous Comput., 24 (4): 225-236 (2017)Cooperative secret delivery in wireless sensor networks., and . Int. J. Ad Hoc Ubiquitous Comput., 14 (4): 226-237 (2013)Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks., , , , and . CoRR, (2014)Fast Ecoding/Decoding Algorithms for Reed-Solomon Erasure Codes., , and . CoRR, (2014)Distributed fault-tolerant classification in wireless sensor networks., , , and . IEEE J. Sel. Areas Commun., 23 (4): 724-734 (2005)Delay-Constrained Input-Queued Switch., , , , and . IEEE J. Sel. Areas Commun., 36 (11): 2464-2474 (2018)A systematic bit-wise decomposition of M-ary symbol metric., , and . IEEE Trans. Wirel. Commun., 5 (10): 2742-2751 (2006)Two-dimensional coded classification schemes in wireless sensor networks., , and . IEEE Trans. Wirel. Commun., 7 (5-1): 1450-1455 (2008)Triple-fault-tolerant binary MDS array codes with asymptotically optimal repair., , , and . ISIT, page 839-843. IEEE, (2017)