Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benchmarking of scoring functions for bias-based fingerprinting code.. ICASSP, page 2039-2043. IEEE, (2016)Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 28-43. Springer, (2007)Tardos's Fingerprinting Code over AWGN Channel.. Information Hiding, volume 6387 of Lecture Notes in Computer Science, page 103-117. Springer, (2010)Iterative Detection Method for CDMA-Based Fingerprinting Scheme., and . Information Hiding, volume 5284 of Lecture Notes in Computer Science, page 357-371. Springer, (2008)Improved DM-QIM Watermarking Scheme for PDF Document., and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 171-183. Springer, (2019)Efficient Decoding Algorithm for Cyclically Permutable Code., , and . ITW, page 1-5. IEEE, (2018)Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 119-128 (2018)A throughput estimation model under two-link concurrent communications with partially overlapping channels and its application to channel assignment in IEEE 802.11n WLAN., , , , and . Int. J. Space Based Situated Comput., 8 (3): 123-137 (2018)An Active Access-Point Configuration Algorithm for Elastic Wireless Local-Area Network System Using Heterogeneous Devices., , , , and . Int. J. Netw. Comput., 6 (2): 395-419 (2016)Throughput measurements for access-point installation optimization in IEEE802.11n wireless networks., , , and . ICCE-TW, page 1-2. IEEE, (2016)