Author of the publication

Limited preparation contextuality in quantum theory and its relation to the Cirel'son bound

, , , , , and . PHYSICAL REVIEW A, 2469-9926 (92): arXiv:1506.05174 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limited preparation contextuality in quantum theory and its relation to the Cirel'son bound, , , , , and . PHYSICAL REVIEW A, 2469-9926 (92): arXiv:1506.05174 (2015)Component and morphology biases on quantifying the composition of nanoparticles using single-particle mass spectrometry, , and . International Journal of Mass Spectrometry, 258 (1-3): 104--112 (2006)Modelling of single electron ternary flip-flop using SIMON., , , , , and . UEMCON, page 1-9. IEEE, (2016)Comparative study of the underlay and overlay techniques of myringoplasty in large and subtotal perforations of the tympanic membrane, , , and . J Laryngol Otol, 117 (6): 444-448 (June 2003)Uniform weighted round robin scheduling algorithms for input queued switches., and . ICC, page 2028-2032. IEEE, (2001)Continent-Based Comparative Study of Internet Attacks., and . AFRICOM, volume 64 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 31-40. Springer, (2010)Size-based scheduling to improve the performance of short TCP flows., , and . IEEE Netw., 19 (1): 12-17 (2005)Relevant Computing Curricula in Sub-Saharan Africa., , , , , and . AFRICOMM, volume 119 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 239-248. Springer, (2012)Identification of maize leaves infected by fall armyworms using UAV-based imagery and convolutional neural networks., , and . Comput. Electron. Agric., (2021)Towards end-host-based identification of competing protocols against TCP in a bottleneck link., and . Ann. des Télécommunications, 66 (1-2): 59-77 (2011)