Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A computational approach for determining rate regions and codes using entropic vector bounds., , and . Allerton Conference, page 1580-1587. IEEE, (2012)System for controlled testing of sensor networks., , , and . CISS, page 1-6. IEEE, (2010)A Markov chain model for the search time for max degree nodes in a graph using a biased random walk., and . CISS, page 448-453. IEEE, (2016)Primal-Dual Characterizations of Jointly Optimal Transmission Rate and Scheme for Distributed Sources., and . DCC, page 243-252. IEEE, (2014)Malware Anomaly Detection on Virtual Assistants., , , , and . MALWARE, page 124-131. IEEE, (2018)On Random Walks and Random Sampling to Find Max Degree Nodes in Assortative Erdos Renyi Graphs., and . GLOBECOM, page 1-7. IEEE, (2016)Participation Incentives on a Wireless Random Access Erasure Collision Channel., and . ITA, page 1-6. IEEE, (2018)Computer aided proofs for rate regions of independent distributed source coding problems., , and . NetCod, page 81-85. IEEE, (2015)Common greedy wiring and rewiring heuristics do not guarantee maximum assortative graphs of given degree., and . CoRR, (2017)Delay minimizing user association in cellular networks via hierarchically well-separated trees., , , and . ICC, page 4005-4011. IEEE, (2015)