Author of the publication

Characterization of Rate Region in Interference Channels with Constrained Power.

, , and . ISIT, page 2441-2445. IEEE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Approach to Automotive Security., , , , , , , , , and 1 other author(s). FM, volume 14000 of Lecture Notes in Computer Science, page 598-609. Springer, (2023)Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning., , , , , , , , and . ICTSS, volume 11812 of Lecture Notes in Computer Science, page 3-21. Springer, (2019)Safety Synthesis Sans Specification., , , , and . CoRR, (2020)Characterization of Rate Region in Interference Channels with Constrained Power., , and . ISIT, page 2441-2445. IEEE, (2007)Synthesizing Non-Vacuous Systems., , , and . VMCAI, volume 10145 of Lecture Notes in Computer Science, page 55-72. Springer, (2017)Transmit Diversity for LTE PUCCH with Channel Selection., , and . VTC Fall, page 1-5. IEEE, (2011)Iterative interference cancellation for a coded multicarrier frequency-hopping CDMA (MC-FH-CDMA) system., and . WCNC, page 573-578. IEEE, (2003)Power Allocation and Asymptotic Achievable Sum-Rates in Single-Hop Wireless Networks., , and . CISS, page 498-503. IEEE, (2006)Learning Mealy Machines with One Timer., , and . LATA, volume 12638 of Lecture Notes in Computer Science, page 157-170. Springer, (2021)Star identification based on euclidean distance transform, voronoi tessellation, and k-nearest neighbor classification., , and . IEEE Trans. Aerosp. Electron. Syst., 52 (6): 2940-2949 (2016)