Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal sparse-QIM codes for zero-rate blind watermarking., , and . ICASSP (3), page 73-76. IEEE, (2004)Enforcing Integrability for Surface Reconstruction Algorithms Using Belief Propagation in Graphical Models., , , , and . CVPR (1), page 743-748. IEEE Computer Society, (2001)Turbo equalization: principles and new results., , and . IEEE Trans. Communications, 50 (5): 754-767 (2002)Minimum mean squared error equalization using a priori information., , and . IEEE Trans. Signal Processing, 50 (3): 673-683 (2002)On the performance of the ternary 13, 7, 5 quadratic-residue code., , and . IEEE Trans. Information Theory, 48 (2): 562-564 (2002)Extremal Problems of Information Combining., , , and . IEEE Trans. Information Theory, 54 (1): 51-71 (2008)On counteracting Byzantine attacks in network coded peer-to-peer networks., , , , , , , and . IEEE Journal on Selected Areas in Communications, 28 (5): 692-702 (2010)Graphical models for coded data transmission over inter-symbol interference channels., , and . European Transactions on Telecommunications, 15 (4): 307-321 (2004)A framework for the design of good watermark identification codes., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60721H. SPIE, (2006)Algebraic soft-decision decoding of Reed-Solomon codes., and . IEEE Trans. Information Theory, 49 (11): 2809-2825 (2003)