Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially Private Secure Multiplication: Hiding Information in the Rubble of Noise., , and . ISIT, page 2207-2212. IEEE, (2023)Systematic Matrix Multiplication Codes., , and . ISIT, page 1-5. IEEE, (2019)Differentially Private Distributed Matrix Multiplication: Fundamental Accuracy-Privacy Trade-Off Limits., , , and . ISIT, page 2016-2021. IEEE, (2022)Masterless Coded Computing: A Fully-Distributed Coded FFT Algorithm., , and . Allerton, page 887-894. IEEE, (2018)ε-Approximate Coded Matrix Multiplication is Nearly Twice as Efficient as Exact Multiplication., , , and . CoRR, (2021)Fairness without Imputation: A Decision Tree Approach for Fair Prediction with Missing Values., , and . AAAI, page 9558-9566. AAAI Press, (2022)Locally Recoverable Coded Matrix Multiplication., , and . Allerton, page 715-722. IEEE, (2018)Addressing Unreliability in Emerging Devices and Non-von Neumann Architectures Using Coded Computing., , , , , and . Proc. IEEE, 108 (8): 1219-1234 (2020)Coded QR Decomposition., , and . ISIT, page 191-196. IEEE, (2020)An Application of Storage-Optimal MatDot Codes for Coded Matrix Multiplication: Fast k-Nearest Neighbors Estimation., , , , , , , and . IEEE BigData, page 1113-1120. IEEE, (2018)