Author of the publication

Complexity reduction for non-coherent iteratively detected differentially encoded quaternary phase shift keying based on trellis decomposition.

, and . Trans. Emerging Telecommunications Technologies, 26 (3): 318-321 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity investigation of on-off keying in noncoherent channel settings at low SNR., , and . Trans. Emerging Telecommunications Technologies, 26 (11): 1235-1250 (2015)Privacy-leakage codes for biometric authentication systems., and . ICASSP, page 1601-1605. IEEE, (2014)Secret rate - Privacy leakage in biometric systems., and . ISIT, page 2251-2255. IEEE, (2009)Authentication based on secret-key generation., and . ISIT, page 1792-1796. IEEE, (2012)Square Root approximation to the Poisson Channel., , and . ISIT, page 1695-1699. IEEE, (2013)Coding for a binary independent piecewise-identically-distributed source.. IEEE Trans. Information Theory, 42 (6): 2210-2217 (1996)On multiple access channels with feedback.. IEEE Trans. Information Theory, 30 (6): 842-845 (1984)Variable to fixed-length codes for Markov sources., and . IEEE Trans. Information Theory, 33 (2): 246-257 (1987)Context weighting for general finite-context sources., , and . IEEE Trans. Information Theory, 42 (5): 1514-1520 (1996)A universal variable-to-fixed length source code based on Lawrence's algorithm., and . IEEE Trans. Information Theory, 38 (2): 247-253 (1992)