Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An animation-and-chirplet based approach to intruder classification using PIR sensing., , , , , , , , , and 1 other author(s). ISSNIP, page 1-6. IEEE, (2015)Codes with locality for two erasures., , and . ISIT, page 1962-1966. IEEE, (2014)Distributed intrusion detection in the presence of correlated sensor readings: Signal-space and communication-complexity view-point., , , and . Ad Hoc Networks, 9 (6): 1015-1027 (2011)A nested linear codes approach to distributed function computation over subspaces., , , , and . Allerton, page 1202-1209. IEEE, (2011)Binary codes with locality for multiple erasures having short block length., , and . ISIT, page 655-659. IEEE, (2016)A Tight Lower Bound on the Sub- Packetization Level of Optimal-Access MSR and MDS Codes., and . ISIT, page 2381-2385. IEEE, (2018)A tight rate bound and a matching construction for locally recoverable codes with sequential recovery from any number of multiple erasures., , and . ISIT, page 1778-1782. IEEE, (2017)A Novel Optical CDMA Modulation Scheme: Code Cycle Modulation., , , , and . GLOBECOM, IEEE, (2006)A Generic Wight-Proportional Bandwidth Sharing Policy for ATM ABR Service., , , and . Perform. Evaluation, 38 (1): 21-44 (1999)Prime-phase sequences with periodic correlation properties better than binary sequences., and . IEEE Trans. Inf. Theory, 37 (3): 603-616 (1991)