Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network error correction, part II: lower bounds, and . Communications in Information and Systems, 6 (1): 37 - 54 (2006)Network error correction, part I: basic concepts and upper bounds, and . Communications in Information and Systems, 6 (1): 19 - 36 (2006)Linear network coding, , and . #IEEE_J_IT#, 49 (2): 371-381 (February 2003)Network coding theory, , , and . Foundation and Trends in Communications and Information Theory, 2 (4 and 5): 241-381 (2005)Secure network coding, and . Proc. IEEE ISIT'02, (June 2002)Network Information Flow, , , and . IEEE Transactions on Information Theory, 46 (4): 1204-1216 (July 2000)Taxonomy-driven computation of product recommendations, , and . Proceedings of the thirteenth ACM international conference on Information and knowledge management, page 406--415. New York, NY, USA, ACM, (2004)Retrospective on "Power-Sensitive Multithreaded Architecture"., , and . ICCD, page 15-16. IEEE Computer Society, (2012)Power-Sensitive Multithreaded Architecture., , and . ICCD, page 199-206. IEEE Computer Society, (2000)Support for High-Frequency Streaming in CMPs., , , , , and . MICRO, page 259-272. IEEE Computer Society, (2006)