Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An animation-and-chirplet based approach to intruder classification using PIR sensing., , , , , , , , , and 1 other author(s). ISSNIP, page 1-6. IEEE, (2015)Ideal structure of the Silver code., , , and . ISIT, page 2818-2822. IEEE, (2009)Achieving the DMD tradeoff of the MIMO-ARQ channel., , , , and . ISIT, page 901-905. IEEE, (2005)Algebraic constructions of optimal space-time trellis codes., and . GLOBECOM, page 1984-1988. IEEE, (2003)Codes with locality for two erasures., , and . ISIT, page 1962-1966. IEEE, (2014)A nested linear codes approach to distributed function computation over subspaces., , , , and . Allerton, page 1202-1209. IEEE, (2011)Binary codes with locality for multiple erasures having short block length., , and . ISIT, page 655-659. IEEE, (2016)A Tight Lower Bound on the Sub- Packetization Level of Optimal-Access MSR and MDS Codes., and . ISIT, page 2381-2385. IEEE, (2018)A tight rate bound and a matching construction for locally recoverable codes with sequential recovery from any number of multiple erasures., , and . ISIT, page 1778-1782. IEEE, (2017)A Novel Optical CDMA Modulation Scheme: Code Cycle Modulation., , , , and . GLOBECOM, IEEE, (2006)