Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncovering elements of style., , , , and . ICASSP, page 1017-1020. IEEE, (2011)Boolean Functions, Projection Operators and Quantum Error Correcting Codes, and . CoRR, (2006)Geometric Matrix Completion With Deep Conditional Random Fields., , and . IEEE Trans. Neural Networks Learn. Syst., 31 (9): 3579-3593 (2020)New rate-2 STBC design for 2 TX with reduced-complexity maximum likelihood decoding., , and . IEEE Trans. Wirel. Commun., 8 (4): 1803-1813 (2009)On Design of Rateless Codes over Dying Binary Erasure Channel., , and . IEEE Trans. Commun., 60 (4): 889-894 (2012)Pilot Designs for Consistent Frequency-Offset Estimation in OFDM Systems., , , and . IEEE Trans. Commun., 55 (5): 864-877 (2007)Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels., , , and . EURASIP J. Wirel. Commun. Netw., (2009)Mitigating Coherent Noise by Balancing Weight-2 Z-Stabilizers., , , and . IEEE Trans. Inf. Theory, 68 (3): 1795-1808 (2022)Read-and-Run Constrained Coding for Modern Flash Devices., , , and . ICC, page 3466-3471. IEEE, (2022)Fake News Detection using Deep Markov Random Fields., , , and . NAACL-HLT (1), page 1391-1400. Association for Computational Linguistics, (2019)