Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the (2, 1)-separating weight of the Kerdock code., and . IEEE Trans. Inf. Theory, 50 (12): 3312-3315 (2004)Separating and Intersecting Properties of BCH and Kasami Codes., and . IMACC, volume 2898 of Lecture Notes in Computer Science, page 52-65. Springer, (2003)Novel Attacks on Spread-Spectrum Fingerprinting.. EURASIP J. Information Security, (2008)A Lower Bound on the Greedy Weights of Product Codes.. Des. Codes Cryptogr., 31 (1): 27-42 (2004)Mobile Software Development Kit for Real Time Multivariate Blood Glucose Prediction., , , , and . IEEE Access, (2024)Toward a Digital Twin for Arthroscopic Knee Surgery: A Systematic Review., , , , , , and . IEEE Access, (2022)Hierarchical Task Analysis, Situation-Awareness And Support Software., , , and . ECMS, page 184-190. European Council for Modeling and Simulation, (2013)A universal control architecture for maritime cranes and robots using genetic algorithms as a possible mapping approach., , , , and . ROBIO, page 322-327. IEEE, (2013)More on (2,2)-separating systems., , and . IEEE Trans. Inf. Theory, 48 (9): 2606-2609 (2002)Upper Bounds on Separating Codes., and . IEEE Trans. Inf. Theory, 50 (6): 1291-1295 (2004)