Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chandar, Venkat
add a person with the name Chandar, Venkat
 

Other publications of authors with the same name

On reliability functions for single-message unequal error protection., , , and . ISIT, page 2934-2938. IEEE, (2012)Asynchronous Communication: Capacity Bounds and Suboptimality of Training, , and . CoRR, (2011)Segmenting and Tracking the Left Ventricle by Learning the Dynamics in Cardiac Images., , , , , , and . IPMI, volume 3565 of Lecture Notes in Computer Science, page 553-565. Springer, (2005)On Bounded Weight Codes., , , , and . IEEE Trans. Information Theory, 57 (10): 6780-6787 (2011)Energy and Sampling Constrained Asynchronous Communication., , and . IEEE Trans. Information Theory, 60 (12): 7686-7697 (2014)Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key., , , , and . IEEE Signal Process. Mag., 32 (5): 42-53 (2015)On the capacity region of asynchronous channels., , and . ISIT, page 1213-1217. IEEE, (2008)Asynchronous capacity per unit cost under a receiver sampling constraint., and . ISIT, page 511-515. IEEE, (2015)Energy and Sampling Constrained Asynchronous Communication, , and . CoRR, (2013)Quickest Transient-Change Detection under a Sampling Constraint., and . CoRR, (2015)