Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error exponent for source coding with a fidelity criterion.. IEEE Trans. Inf. Theory, 20 (2): 197-199 (1974)General broadcast channels with degraded message sets., and . IEEE Trans. Inf. Theory, 23 (1): 60-64 (1977)Sequences achieving the boundary of the entropy region for a two-source are virtually memoryless.. IEEE Trans. Inf. Theory, 33 (3): 443-448 (1987)How to encode the modulo-two sum of binary sources (Corresp.)., and . IEEE Trans. Inf. Theory, 25 (2): 219-221 (1979)Random access communication and graph entropy., and . IEEE Trans. Inf. Theory, 34 (2): 312-314 (1988)Logarithmic Sobolev inequalities in discrete product spaces.. Comb. Probab. Comput., 28 (6): 919-935 (2019)A coding theorem for the discrete memoryless broadcast channel.. IEEE Trans. Inf. Theory, 25 (3): 306-311 (1979)A simple proof of the blowing-up lemma.. IEEE Trans. Inf. Theory, 32 (3): 445-446 (1986)On the capacity of uniform hypergraphs., and . IEEE Trans. Inf. Theory, 36 (1): 153-156 (1990)Graphs that Split Entropies., and . SIAM J. Discret. Math., 1 (1): 71-79 (1988)