Author of the publication

Using linear programming to Decode Binary linear codes.

, , and . IEEE Trans. Information Theory, 51 (3): 954-972 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building peer-to-peer systems with Chord, a distributed lookup service., , , , , , and . HotOS, page 81-86. IEEE Computer Society, (2001)Implementing a Fully Polynomial Time Approximation Scheme for All Terminal Network Reliability., and . SODA, page 334-343. ACM/SIAM, (1997)Approximation Algorithms for Orienteering and Discounted-Reward TSP., , , , , and . FOCS, page 46-55. IEEE Computer Society, (2003)Text Bundling: Statistics Based Data-Reduction., , , and . ICML, page 696-703. AAAI Press, (2003)Diminished Chord: A Protocol for Heterogeneous Subgroup Formation in Peer-to-Peer Networks., and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 288-297. Springer, (2004)OverCite: A Cooperative Digital Research Library., , , , , , and . IPTPS, volume 3640 of Lecture Notes in Computer Science, page 69-79. Springer, (2005)Observations on the Dynamic Evolution of Peer-to-Peer Networks., , and . IPTPS, volume 2429 of Lecture Notes in Computer Science, page 22-33. Springer, (2002)DDoS defense by offense., , , , and . SIGCOMM, page 303-314. ACM, (2006)Expressive Query Construction through Direct Manipulation of Nested Relational Results., and . SIGMOD Conference, page 1377-1392. ACM, (2016)Classifying and visualizing students' cognitive engagement in course readings., , , , and . L@S, page 52:1-52:10. ACM, (2018)