Author of the publication

Hypothesis testing with communication constraints.

, and . IEEE Trans. Information Theory, 32 (4): 533-542 (1986)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consistent estimation of the basic neighborhood of Markov random fields., and . ISIT, page 170. IEEE, (2004)Generalized minimizers of convex integral functionals, Bregman distance, Pythagorean identities, and . CoRR, (2012)An Information Geometry Problem in Mathematical Finance., and . GSI, volume 9389 of Lecture Notes in Computer Science, page 435-443. Springer, (2015)On Information Theoretic Security: Mathematical Models and Techniques - (Invited Talk).. ICITS, volume 6673 of Lecture Notes in Computer Science, page 73-75. Springer, (2011)On Multiterminal Secrecy Capacities., and . ISIT, page 2051-2055. IEEE, (2007)Secrecy generation for multiple input multiple output channel models., and . ISIT, page 2447-2451. IEEE, (2009)On minimization of entropy functionals under moment constraints., and . ISIT, page 2101-2105. IEEE, (2008)On minimization of multivariate entropy functionals., and . ITW, page 96-100. IEEE, (2009)On Oblivious Transfer Capacity., and . Information Theory, Combinatorics, and Search Theory, volume 7777 of Lecture Notes in Computer Science, page 145-166. Springer, (2013)On Iterative Algorithms with an Information Geometry Background.. ALT, volume 5254 of Lecture Notes in Computer Science, page 1. Springer, (2008)