Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Compress-and-Forward Relaying in Fading Environments with or without Wyner-Ziv Coding., , and . ICC, page 1-5. IEEE, (2009)On the Performance Improvements of Max-SINR Equalizers in Wireless Communications., , and . ICC, page 1-5. IEEE, (2009)Image-based multimodal face authentication, and . Signal Processing, 69 (1): 59--79 (Aug 31, 1998)Neighbor-friendly user scheduling algorithm for interference management in LTE-A networks., , and . ISWCS, page 586-590. IEEE, (2015)Topology-aware space-time network coding., , , , and . EUSIPCO, page 126-130. IEEE, (2017)A blind interference alignment scheme for practical channels., , , and . ICC, page 1-6. IEEE, (2016)On the effect of blockage objects in dense MIMO SWIPT networks., , and . CoRR, (2018)MAC with partially cooperating encoders and security constraints., , and . VALUETOOLS, page 658-664. ICST/ACM, (2011)Performances of linear tools and models for error detection and concealment in subband image transmission., , , and . IEEE Trans. Image Processing, 11 (5): 518-529 (2002)Profile Authentication Using a Chamfer Matching Algorithm., and . AVBPA, volume 1206 of Lecture Notes in Computer Science, page 185-192. Springer, (1997)