Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An interference suppression scheme with joint channel-data estimation., , and . IEEE Journal on Selected Areas in Communications, 17 (11): 1924-1939 (1999)Maximum throughput loss of noisy ISI channels due to narrow-band interference., and . IEEE Communications Letters, 5 (6): 233-235 (2001)Network coding for undirected information exchange., , and . IEEE Communications Letters, 13 (1): 25-27 (2009)On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels., , , , and . IEEE Trans. Information Theory, 58 (6): 3798-3820 (2012)Even One-Dimensional Mobility Increases the Capacity of Wireless Networks., , and . IEEE Trans. Information Theory, 51 (11): 3947-3954 (2005)Secret Communication Over Broadcast Erasure Channels With State-Feedback., , , and . IEEE Trans. Information Theory, 61 (9): 4788-4808 (2015)On information transmission over a finite buffer channel., and . IEEE Trans. Information Theory, 52 (3): 1226-1237 (2006)Secret-Key Generation Using Correlated Sources and Channels., , and . IEEE Trans. Information Theory, 58 (2): 652-670 (2012)Rate splitting is approximately optimal for fading Gaussian interference channels., , , and . Allerton, page 315-321. IEEE, (2015)On interactive secrecy over erasure networks., , , and . ISCCSP, page 1-4. IEEE, (2012)