From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature, , , и . CoRR, (2006)Perfect Codes for Generalized Deletions from Minuscule Elements of Weyl Groups.. CoRR, (2018)Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount., , , и . Information Hiding, том 4567 из Lecture Notes in Computer Science, стр. 279-293. Springer, (2007)On ML-certificate linear constraints for rank modulation with linear programming decoding and its application to compact graphs.. ISIT, стр. 2993-2997. IEEE, (2012)Single Quantum Deletion Error-Correcting Codes., и . ISITA, стр. 329-333. IEEE, (2020)Formalization of Insertion/Deletion Codes and the Levenshtein Metric in Lean., , и . ISITA, стр. 11-15. IEEE, (2018)Comparing Euclidean, Kendall tau metrics toward extending LP decoding., и . ISITA, стр. 91-95. IEEE, (2012)Nonexistence of perfect permutation codes in the Ulam metric., и . ISITA, стр. 691-695. IEEE, (2016)Weight enumerator analysis for (2, P)- and (3, P)-SFA LDPC codes., и . ISITA, стр. 556-560. IEEE, (2012)On the Key-Privacy Issue of McEliece Public-Key Encryption., , , , и . AAECC, том 4851 из Lecture Notes in Computer Science, стр. 168-177. Springer, (2007)