Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correlated jamming in a Joint Source Channel Communication system., , and . ISIT, page 2247-2251. IEEE, (2014)Channel coding with strictly casual colored side-information at transmitter., , and . ISIT, page 371-375. IEEE, (2007)Interference management through cooperation., and . ISIT, page 2071-2075. IEEE, (2009)Multiple Access Channels with Adversarial Users., , , and . ISIT, page 435-439. IEEE, (2019)Secure distributive storage of decentralized source data: Can interaction help?, , and . ISIT, page 1953-1957. IEEE, (2010)An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback., , , and . IEEE Trans. Inf. Theory, 62 (5): 2430-2480 (2016)Joint State Estimation and Communication over a State-Dependent Gaussian Multiple Access Channel., , and . CoRR, (2018)Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation., , , , , and . ISIT, page 1931-1936. IEEE, (2021)Multiple Access Channel Simulation., , , and . ISIT, page 2411-2416. IEEE, (2021)Communication With Adversary Identification in Byzantine Multiple Access Channels., , , and . ISIT, page 688-693. IEEE, (2021)