Author of the publication

File Updates Under Random/Arbitrary Insertions and Deletions.

, , , , and . IEEE Trans. Information Theory, 63 (10): 6487-6513 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. Dongren Wang University of Stuttgart

Replication data of Buchmeiser group for: "Synthetic and Structural Peculiarities of Neutral and Cationic Molybdenum Imido and Tungsten Oxo Alkylidene Complexes Bearing Weakly Coordinating N-Heterocyclic Carbenes", , , , , , and . Dataset, (2024)Related to: M. R. Buchmeiser, D. Wang, R. Schowner, L. Stöhr, F. Ziegler, S. Sen, W. Frey,; Synthetic and Structural Peculiarities of Neutral and Cationic Molybdenum Imido and Tungsten Oxo Alkylidene Complexes Bearing Weakly Coordinating N-Heterocyclic Carbenes; Eur. J. Inorg. Chem., in press (2024). doi: 10.1002/ejic.202400082.
 

Other publications of authors with the same name

A neural network model for the wire bonding process., , , , , , and . Computers & OR, 20 (8): 879-888 (1993)The Usage of Opportunity Cost to Maximize Performance in Revenue Management., , , and . Decision Sciences, 39 (4): 737-758 (2008)Symmetric Private Information Retrieval from MDS Coded Distributed Storage With Non-Colluding and Colluding Servers., and . IEEE Trans. Information Theory, 65 (8): 5160-5175 (2019)Secure Symmetric Private Information Retrieval from Colluding Databases with Adversaries., and . CoRR, (2017)A collaborative robot for COVID-19 oropharyngeal swabbing., , , , , , , , , and 1 other author(s). Robotics Auton. Syst., (2022)The Use of Switching Point and Protection Levels to Improve Revenue Performance in Order-Driven Production Systems., , , and . Decision Sciences, 42 (2): 495-509 (2011)On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers., and . IEEE Trans. Information Theory, 65 (5): 3183-3197 (2019)File Updates Under Random/Arbitrary Insertions and Deletions., , , , and . IEEE Trans. Information Theory, 63 (10): 6487-6513 (2017)Secure Private Information Retrieval from Colluding Databases with Eavesdroppers., and . CoRR, (2017)End-to-End Error-Correcting Codes on Networks with Worst-Case Symbol Errors., and . CoRR, (2015)