Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SeF: A Secure Fountain Architecture for Slashing Storage Costs in Blockchains., , and . CoRR, (2019)Bit allocation for dependent quantization with applications to multiresolution and MPEG video coders., , and . IEEE Trans. Image Processing, 3 (5): 533-545 (1994)Rademacher Complexity for Adversarially Robust Generalization., , and . CoRR, (2018)Defending Against Saddle Point Attack in Byzantine-Robust Distributed Learning., , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 7074-7084. PMLR, (2019)Efficient interactive algorithms for file synchronization under general edits., , and . Allerton, page 1226-1233. IEEE, (2013)Faster Data-access in Large-scale Systems: Network-scale Latency Analysis under General Service-time Distributions., and . Allerton, page 757-764. IEEE, (2018)Overlap-based genome assembly from variable-length reads., , , and . ISIT, page 1018-1022. IEEE, (2016)An Optimal and Efficient Soft Caching Algorithm for Network Image Retrieval., and . ICIP (3), page 12-16. IEEE Computer Society, (1998)Enhancing peer-to-peer live multicast quality using helpers., and . ICIP, page 2300-2303. IEEE, (2008)On the Transmission of a Class of Hidden Markov Sources over Gaussian Channels with Applications to Image Communication., and . ICIP, page 363-366. IEEE, (2000)