Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How much feedback is required to achieve the degrees of freedom in ergodic X channel?, , and . PIMRC, page 2370-2374. IEEE, (2010)Approximate capacity of the two-user MISO Broadcast Channel with delayed CSIT., , and . Allerton, page 1136-1143. IEEE, (2013)Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes., , and . ISIT, page 2104-2108. IEEE, (2006)Cache-aided interference management in wireless cellular networks., , and . ICC, page 1-7. IEEE, (2017)Corella: A Private Multi Server Learning Approach based on Correlated Queries., , and . CoRR, (2020)SwiftAgg: Communication-Efficient and Dropout-Resistant Secure Aggregation for Federated Learning with Worst-Case Security Guarantees., , , and . ISIT, page 103-108. IEEE, (2022)Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes., , and . IWCIT, page 1-6. IEEE, (2020)Private Function Computation., and . ISIT, page 1118-1123. IEEE, (2020)Edge-Facilitated Wireless Distributed Computing., , , and . GLOBECOM, page 1-7. IEEE, (2016)How to optimally allocate resources for coded distributed computing?, , , and . ICC, page 1-7. IEEE, (2017)