Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Rate-Constrained Estimation in Unreliable Sensor Networks., , , and . IPSN, volume 2634 of Lecture Notes in Computer Science, page 178-192. Springer, (2003)Topic Discovery through Data Dependent and Random Projections., , , and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 1202-1210. JMLR.org, (2013)Secure Biometrics: Concepts, Authentication Architectures and Challenges, , , and . CoRR, (2013)On decoder-latency versus performance tradeoffs in differential predictive coding., and . ICIP, page 1097-1100. IEEE, (2004)Complexity/performance trade-offs for robust distributed video coding., , , and . ICIP (2), page 678-681. IEEE, (2005)Benefit of Delay on the Diversity-Multiplexing Tradeoffs of MIMO Channels with Partial CSI., and . ISIT, page 2831-2835. IEEE, (2007)Information-theoretic bounds for multiround function computation in collocated networks., , and . ISIT, page 2306-2310. IEEE, (2009)Two-terminal distributed source coding with alternating messages for function computation., and . ISIT, page 51-55. IEEE, (2008)On Source Encoding with Side-information Under Ambiguous State of Nature., , and . ISIT, page 479-483. IEEE, (2006)Privacy-preserving indoor localization via light transport analysis., , and . ICASSP, page 3331-3335. IEEE, (2017)