Author of the publication

Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective.

, , , and . SCIENCE CHINA Information Sciences, 57 (4): 1-14 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Robin Rainer Herkert University of Stuttgart

Replication Code for: Error Analysis of Randomized Symplectic Model Order Reduction for Hamiltonian systems. Software, (2024)Related to: R. Herkert, P. Buchfink, B. Haasdonk, J. Rettberg, J. Fehr. (2024), "Error Analysis of Randomized Symplectic Model Order Reduction for Hamiltonian systems". arXiv: 2405.10465.
 

Other publications of authors with the same name

Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery., , and . DBSec, volume 10359 of Lecture Notes in Computer Science, page 185-204. Springer, (2017)A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database., , , and . PST, page 293-302. IEEE Computer Society, (2017)A New Privacy-Preserving Searching Model on Blockchain., , , , , and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 248-266. Springer, (2018)CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud., , , , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 186-205. Springer, (2015)Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform., , , , , and . PST, page 1-10. IEEE Computer Society, (2018)Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective., , , and . SCIENCE CHINA Information Sciences, 57 (4): 1-14 (2014)Privacy-preserving verifiable elastic net among multiple institutions in the cloud., , , and . Journal of Computer Security, 26 (6): 791-815 (2018)Searchable Encryption over Feature-Rich Data., , , , , and . IEEE Trans. Dependable Sec. Comput., 15 (3): 496-510 (2018)From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions., , , , and . C2SI, volume 11445 of Lecture Notes in Computer Science, page 142-167. Springer, (2019)Privacy-Preserving Disease Risk Test Based on Bloom Filters., , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 472-486. Springer, (2017)