Author of the publication

On a New Class of Codes for Identifying Vertices in Graphs.

, , and . IEEE Trans. Information Theory, 44 (2): 599-611 (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard., , and . Journal of Systems Architecture, 53 (2-3): 139-149 (2007)Minimal Sets of Turns for Breaking Cycles in Graphs Modeling Networks., , and . IEEE Trans. Parallel Distrib. Syst., 21 (9): 1342-1353 (2010)Aliasing Probability for Multiple Input Signature Analyzer., , and . IEEE Trans. Computers, 39 (4): 586-591 (1990)Duplication Based One-to-Many Coding for Trojan HW Detection., , and . DFT, page 160-166. IEEE Computer Society, (2010)Pseudo-exhaustive word-oriented DRAM testing., , and . ED&TC, page 126-132. IEEE Computer Society, (1995)An Automated Fine-Grain Pipelining Using Domino Style Asynchronous Library., , , and . ACSD, page 68-76. IEEE Computer Society, (2005)Covering radius - Survey and recent results., , , and . IEEE Trans. Information Theory, 31 (3): 328-343 (1985)Spectral Techniques in Binary and Multiple-Valued Switching Theory., , and . ISMVL, page 41-48. IEEE Computer Society, (2001)Robust FSMs for cryptographic devices resilient to strong fault injection attacks., and . IOLTS, page 240-245. IEEE Computer Society, (2010)Detecting bridging and stuck-at faults at input and output pins of standard digital components., and . DAC, page 494-505. ACM/IEEE, (1980)