Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Performance Gap Between Pull-Based Mesh Streaming Protocols and Fundamental Limits., , and . INFOCOM, page 891-899. IEEE, (2009)Integrated dual grating polymer microbeams for bio-chemical sensing in liquid environment., , , , and . NEMS, page 1204-1207. IEEE, (2013)A joint typicality approach to compute-forward., , , and . Allerton, page 1294-1301. IEEE, (2015)Semantics and Algorithms for Parametric Monitoring, and . Logical Methods in Computer Science, (2012)Temporal and Spatial Aspects of Snow Distribution in the Nam Co Basin on the Tibetan Plateau from MODIS Data., , , , and . Remote Sensing, 2 (12): 2700-2712 (2010)Distributed Join-the-Idle-Queue for Low Latency Cloud Services., , and . IEEE/ACM Trans. Netw., 26 (5): 2309-2319 (2018)Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography., , , and . CoRR, (2017)Towards an Algebraic Network Information Theory: Simultaneous Joint Typicality Decoding., , , , and . CoRR, (2019)A Joint Typicality Approach to Algebraic Network Information Theory., , , , and . CoRR, (2016)Method to Evaluate Software Protection Based on Attack Modeling., , , , , and . HPCC/EUC, page 837-844. IEEE, (2013)