Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On counteracting Byzantine attacks in network coded peer-to-peer networks., , , , , , , and . IEEE Journal on Selected Areas in Communications, 28 (5): 692-702 (2010)Graphical models for coded data transmission over inter-symbol interference channels., , and . European Transactions on Telecommunications, 15 (4): 307-321 (2004)Enforcing Integrability for Surface Reconstruction Algorithms Using Belief Propagation in Graphical Models., , , , and . CVPR (1), page 743-748. IEEE Computer Society, (2001)Optimal sparse-QIM codes for zero-rate blind watermarking., , and . ICASSP (3), page 73-76. IEEE, (2004)Minimum mean squared error equalization using a priori information., , and . IEEE Trans. Signal Processing, 50 (3): 673-683 (2002)Turbo equalization: principles and new results., , and . IEEE Trans. Communications, 50 (5): 754-767 (2002)On the performance of the ternary 13, 7, 5 quadratic-residue code., , and . IEEE Trans. Information Theory, 48 (2): 562-564 (2002)Extremal Problems of Information Combining., , , and . IEEE Trans. Information Theory, 54 (1): 51-71 (2008)Graphical Models for Desynchronization-Resilient Watermark Decoding., , and . ICIP (5), page 477-480. IEEE, (2007)A framework for the design of good watermark identification codes., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721H. SPIE, (2006)