Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Coding Approach for Detection of Tampering in Write-Once Optical Disks., , , and . IEEE Trans. Computers, 47 (1): 120-125 (1998)Algorithms for Generating Probabilities with Multivalued Stochastic Relay Circuits., and . IEEE Trans. Computers, 64 (12): 3376-3388 (2015)Fault-Tolerant Meshes with Small Degree., , and . SIAM J. Comput., 26 (6): 1764-1784 (1997)An on-line algorithm for checkpoint placement., and . ISSRE, page 274-283. IEEE Computer Society, (1996)On the power of neural networks for solving hard problems., and . J. Complexity, 6 (2): 129-135 (1990)Algebraic Techniques for Constructing Minimal Weight Threshold Functions., and . SIAM J. Discrete Math., 16 (1): 114-126 (2002)On optimal broadcasting in faulty hypercubes.. Discrete Applied Mathematics, 53 (1-3): 3-13 (1994)Bridging Paradigm Gaps Between Biology and Engineering.. CSB, page 14. IEEE Computer Society, (2003)The encoding complexity of network coding., , and . IEEE Trans. Information Theory, 52 (6): 2386-2397 (2006)Efficient Generation of Random Bits From Finite State Markov Chains., and . IEEE Trans. Information Theory, 58 (4): 2490-2506 (2012)