Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Soljanin, Emina
add a person with the name Soljanin, Emina
 

Other publications of authors with the same name

On the Delay-Storage Trade-Off in Content Download from Coded Distributed Storage Systems., , and . IEEE Journal on Selected Areas in Communications, 32 (5): 989-997 (2014)Coding Theory (Dagstuhl Seminar 13351)., , and . Dagstuhl Reports, 3 (8): 136-150 (2013)Network Coding Fundamentals., and . Foundations and Trends in Networking, (2007)Fountain Codes Based Distributed Storage Algorithms for Large-Scale Wireless Sensor Networks., , and . IPSN, page 171-182. IEEE Computer Society, (2008)Incremental multi-hop based on "good" punctured codes and its reliable hop rate., , and . WCNC, page 249-254. IEEE, (2004)Decentralized fountain codes for minimum-delay data collection., , , and . CISS, page 545-550. IEEE, (2008)Physical Layer Security of Space-Division Multiplexed Fiber-Optic Communication Systems in the Presence of Multiple Eavesdroppers., , , and . GLOBECOM, page 1-6. IEEE, (2015)Distortion bounds for broadcasting a binary source over binary erasure channels., , and . CWIT, page 49-54. IEEE, (2013)Secrecy Capacities in Space-Division Multiplexed Fiber Optic Communication Systems., , , and . IEEE Trans. Information Forensics and Security, 10 (7): 1325-1335 (2015)Low Complexity Doped Wireless Broadcast for Multimedia Applications., , and . IEEE Trans. Communications, 61 (8): 3462-3471 (2013)