Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAC with partially cooperating encoders and security constraints., , and . VALUETOOLS, page 658-664. ICST/ACM, (2011)Cooperative Relaying with State Available Non-Causally at the Relay, , , and . CoRR, (2009)On the Capacity of Cloud Radio Access Networks with Oblivious Relaying., , , and . CoRR, (2017)Rate-optimized power allocation for OFDM transmission with multiple DF/regenerative relays and an improved protocol., , , and . WCNC, page 988-993. IEEE, (2009)Achievable regions for interference channels with generalized and intermittent feedback.. ISIT, page 1026-1030. IEEE, (2014)Secure lossy helper and Gray-Wyner problems., and . ISIT, page 2454-2458. IEEE, (2016)Mac Aware Coding Strategy for Multiple User Information Embedding., and . ICASSP (5), page 393-396. IEEE, (2006)Broadcast- and MAC-Aware Coding Strategies for Multiple User Information Embedding., , and . IEEE Trans. Signal Process., 55 (6-2): 2974-2992 (2007)Rate-Distortion Function for a Heegard-Berger Problem With Two Sources and Degraded Reconstruction Sets., and . IEEE Trans. Inf. Theory, 62 (9): 5080-5092 (2016)Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT., , , and . IEEE Trans. Inf. Forensics Secur., 8 (11): 1760-1774 (2013)