Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: J. Harshan
@inproceedings{DBLP:conf/ncc/GuptaH24, author = {Shivangi Gupta and J. Harshan}, title = {Analog Lagrange Coded Computing: On the Curious Case of Adversarial Workers}, booktitle = {National Conference on Communications, {NCC} 2024, Chennai, India, February 28 - March 2, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NCC60321.2024.10485866}, doi = {10.1109/NCC60321.2024.10485866}, timestamp = {Wed, 10 Apr 2024 20:58:43 +0200}, biburl = {https://dblp.org/rec/conf/ncc/GuptaH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncc/HazraH24, author = {Soumita Hazra and J. Harshan}, title = {On High-Rate, Low-Overhead Mitigation Strategies Against Cognitive Adversaries}, booktitle = {National Conference on Communications, {NCC} 2024, Chennai, India, February 28 - March 2, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NCC60321.2024.10485945}, doi = {10.1109/NCC60321.2024.10485945}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncc/HazraH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-05620, author = {Harikrishnan K. and J. Harshan and Anwitaman Datta}, title = {Optimized Denial-of-Service Threats on the Scalability of {LT} Coded Blockchains}, journal = {CoRR}, volume = {abs/2402.05620}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.05620}, doi = {10.48550/ARXIV.2402.05620}, eprinttype = {arXiv}, eprint = {2402.05620}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-05620.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HazraH23, author = {Soumita Hazra and J. Harshan}, title = {On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {2583--2588}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206492}, doi = {10.1109/ISIT54713.2023.10206492}, timestamp = {Mon, 28 Aug 2023 17:20:14 +0200}, biburl = {https://dblp.org/rec/conf/isit/HazraH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/MangangH23, author = {Rusni Kima Mangang and J. Harshan}, title = {Self-Sustainable Key Generation: Strategies and Performance Bounds under DoS Attacks}, booktitle = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong Kong, SAR, China, October 10-13, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333530}, doi = {10.1109/VTC2023-FALL60731.2023.10333530}, timestamp = {Wed, 10 Jan 2024 16:12:42 +0100}, biburl = {https://dblp.org/rec/conf/vtc/MangangH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-03105, author = {Soumita Hazra and J. Harshan}, title = {On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries}, journal = {CoRR}, volume = {abs/2307.03105}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.03105}, doi = {10.48550/ARXIV.2307.03105}, eprinttype = {arXiv}, eprint = {2307.03105}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-03105.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-00342, author = {Rusni Kima Mangang and J. Harshan}, title = {Self-Sustainable Key Generation: Strategies and Performance Bounds under DoS Attacks}, journal = {CoRR}, volume = {abs/2309.00342}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.00342}, doi = {10.48550/ARXIV.2309.00342}, eprinttype = {arXiv}, eprint = {2309.00342}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-00342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-06564, author = {Aadil Hussain and Nitheesh Gundapu and Sarang Drugkar and Suraj Kiran and J. Harshan and Ranjitha Prasad}, title = {Seeing is Believing: {A} Federated Learning Based Prototype to Detect Wireless Injection Attacks}, journal = {CoRR}, volume = {abs/2311.06564}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.06564}, doi = {10.48550/ARXIV.2311.06564}, eprinttype = {arXiv}, eprint = {2311.06564}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-06564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/MishraHP22, author = {Shilpi Mishra and J. Harshan and Ranjitha Prasad}, title = {Path-Aware {OMP} Algorithms for Provenance Recovery in Wireless Networks}, booktitle = {95th {IEEE} Vehicular Technology Conference, {VTC} Spring 2022, Helsinki, Finland, June 19-22, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Spring54318.2022.9860984}, doi = {10.1109/VTC2022-SPRING54318.2022.9860984}, timestamp = {Wed, 25 Jan 2023 10:28:23 +0100}, biburl = {https://dblp.org/rec/conf/vtc/MishraHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/JoshiH21, author = {Rohit Joshi and J. Harshan}, title = {On Opportunistic Selection of Common Randomness and {LLR} generation for Algebraic Group Secret-Key Generation}, booktitle = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki, Finland, April 25-28, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9448927}, doi = {10.1109/VTC2021-SPRING51267.2021.9448927}, timestamp = {Fri, 18 Jun 2021 10:49:22 +0200}, biburl = {https://dblp.org/rec/conf/vtc/JoshiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-02195, author = {Rohit Joshi and J. Harshan}, title = {On Opportunistic Selection of Common Randomness and {LLR} generation for Algebraic Group Secret-Key Generation}, journal = {CoRR}, volume = {abs/2103.02195}, year = {2021}, url = {https://arxiv.org/abs/2103.02195}, eprinttype = {arXiv}, eprint = {2103.02195}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-02195.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-12456, author = {Shilpi Mishra and J. Harshan and Ranjitha Prasad}, title = {Path-Aware {OMP} Algorithms for Provenance Recovery in Vehicular Networks}, journal = {CoRR}, volume = {abs/2105.12456}, year = {2021}, url = {https://arxiv.org/abs/2105.12456}, eprinttype = {arXiv}, eprint = {2105.12456}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-12456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-14125, author = {Rusni Kima Mangang and J. Harshan}, title = {Do Not Forget the Past: {A} Buffer-Aided Framework for Relay Based Key Generation}, journal = {CoRR}, volume = {abs/2112.14125}, year = {2021}, url = {https://arxiv.org/abs/2112.14125}, eprinttype = {arXiv}, eprint = {2112.14125}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-14125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/RaoH19, author = {Manish Rao and J. Harshan}, title = {Low-Latency Exchange of Common Randomness for Group-Key Generation}, booktitle = {30th {IEEE} Annual International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2019, Istanbul, Turkey, September 8-11, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PIMRC.2019.8904207}, doi = {10.1109/PIMRC.2019.8904207}, timestamp = {Tue, 26 Nov 2019 09:39:15 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/RaoH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-07013, author = {Mohit Goyal and J. Harshan}, title = {Achievable Rates of Attack Detection Strategies in Echo-Assisted Communication}, journal = {CoRR}, volume = {abs/1901.07013}, year = {2019}, url = {http://arxiv.org/abs/1901.07013}, eprinttype = {arXiv}, eprint = {1901.07013}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-07013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spcom/RaoH18, author = {Manish Rao and J. Harshan}, title = {Practical Physical-Layer Group Secret-Key Generation in Three-User Wireless Networks}, booktitle = {2018 International Conference on Signal Processing and Communications (SPCOM), Bangalore, India, July 16-19, 2018}, pages = {342--346}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SPCOM.2018.8724397}, doi = {10.1109/SPCOM.2018.8724397}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/spcom/RaoH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/NagubandiH18, author = {Harshith Nagubandi and J. Harshan}, title = {{RASI:} Relay-Assisted Physical-Layer Key Generation in Unmanned Aerial Vehicles}, booktitle = {87th {IEEE} Vehicular Technology Conference, {VTC} Spring 2018, Porto, Portugal, June 3-6, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/VTCSpring.2018.8417687}, doi = {10.1109/VTCSPRING.2018.8417687}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/NagubandiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-00743, author = {Manish Rao and J. Harshan}, title = {Group Secret-Key Generation using Algebraic Rings in Three-User Wireless Networks}, journal = {CoRR}, volume = {abs/1805.00743}, year = {2018}, url = {http://arxiv.org/abs/1805.00743}, eprinttype = {arXiv}, eprint = {1805.00743}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-00743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/LuHO17, author = {Jinlong Lu and J. Harshan and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Performance of lattice coset codes on Universal Software Radio Peripherals}, journal = {Phys. Commun.}, volume = {24}, pages = {94--102}, year = {2017}, url = {https://doi.org/10.1016/j.phycom.2017.04.004}, doi = {10.1016/J.PHYCOM.2017.04.004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/LuHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/PooksombatHK17, author = {Perathorn Pooksombat and J. Harshan and Wittawat Kositwattanarerk}, title = {On shaping complex lattice constellations from multi-level constructions}, booktitle = {2017 {IEEE} International Symposium on Information Theory, {ISIT} 2017, Aachen, Germany, June 25-30, 2017}, pages = {2593--2597}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISIT.2017.8006998}, doi = {10.1109/ISIT.2017.8006998}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/PooksombatHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/HarshanSV17, author = {J. Harshan and Amin Sakzad and Emanuele Viterbo}, title = {Integer-Forcing Linear Receivers: {A} Design Criterion for Full-Diversity STBCs}, booktitle = {2017 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2017, San Francisco, CA, USA, March 19-22, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WCNC.2017.7925751}, doi = {10.1109/WCNC.2017.7925751}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/HarshanSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HarshanSV17, author = {J. Harshan and Amin Sakzad and Emanuele Viterbo}, title = {Integer-Forcing Linear Receivers: {A} Design Criterion for Full-Diversity STBCs}, journal = {CoRR}, volume = {abs/1701.03566}, year = {2017}, url = {http://arxiv.org/abs/1701.03566}, eprinttype = {arXiv}, eprint = {1701.03566}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HarshanSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/HarshanOD16, author = {J. Harshan and Fr{\'{e}}d{\'{e}}rique E. Oggier and Anwitaman Datta}, title = {Sparsity exploiting erasure coding for distributed storage of versioned data}, journal = {Computing}, volume = {98}, number = {12}, pages = {1305--1329}, year = {2016}, url = {https://doi.org/10.1007/s00607-016-0485-x}, doi = {10.1007/S00607-016-0485-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/HarshanOD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HarshanDO16, author = {J. Harshan and Anwitaman Datta and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {DiVers: An erasure code based storage architecture for versioning exploiting sparsity}, journal = {Future Gener. Comput. Syst.}, volume = {59}, pages = {47--62}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.01.005}, doi = {10.1016/J.FUTURE.2016.01.005}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HarshanDO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/HarshanDO16, author = {J. Harshan and Anwitaman Datta and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Differential Erasure Codes for Efficient Archival of Versioned Data in Cloud Storage Systems}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {30}, pages = {23--65}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54054-1\_2}, doi = {10.1007/978-3-662-54054-1\_2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tlsdkcs/HarshanDO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LuHO16, author = {Jinlong Lu and J. Harshan and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Performance of Lattice Coset Codes on a {USRP} Testbed}, journal = {CoRR}, volume = {abs/1607.07163}, year = {2016}, url = {http://arxiv.org/abs/1607.07163}, eprinttype = {arXiv}, eprint = {1607.07163}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LuHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/HarshanOD15, author = {J. Harshan and Fr{\'{e}}d{\'{e}}rique E. Oggier and Anwitaman Datta}, title = {Sparsity Exploiting Erasure Coding for Resilient Storage and Efficient {I/O} Access in Delta Based Versioning Systems}, booktitle = {35th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015}, pages = {798--799}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICDCS.2015.115}, doi = {10.1109/ICDCS.2015.115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/HarshanOD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/HarshanO15, author = {J. Harshan and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {On Algebraic Manipulation Detection codes from linear codes and their application to storage systems}, booktitle = {2015 {IEEE} Information Theory Workshop - Fall (ITW), Jeju Island, South Korea, October 11-15, 2015}, pages = {64--68}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ITWF.2015.7360735}, doi = {10.1109/ITWF.2015.7360735}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/HarshanO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HarshanDO15, author = {J. Harshan and Anwitaman Datta and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Compressed Differential Erasure Codes for Efficient Archival of Versioned Data}, journal = {CoRR}, volume = {abs/1503.05434}, year = {2015}, url = {http://arxiv.org/abs/1503.05434}, eprinttype = {arXiv}, eprint = {1503.05434}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/HarshanDO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/HarshanV14, author = {J. Harshan and Emanuele Viterbo}, title = {Constellation constrained capacity of additive Gaussian mixture noise channels}, booktitle = {International Symposium on Information Theory and its Applications, {ISITA} 2014, Melbourne, Australia, October 26-29, 2014}, pages = {110--114}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6979813/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/HarshanV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/LuHO14, author = {Jinlong Lu and J. Harshan and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {A {USRP} implementation of wiretap lattice codes}, booktitle = {2014 {IEEE} Information Theory Workshop, {ITW} 2014, Hobart, Tasmania, Australia, November 2-5, 2014}, pages = {316--320}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ITW.2014.6970845}, doi = {10.1109/ITW.2014.6970845}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/LuHO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HarshanOD14, author = {J. Harshan and Fr{\'{e}}d{\'{e}}rique E. Oggier and Anwitaman Datta}, title = {Sparsity Exploiting Erasure Coding for Resilient Storage and Efficient {I/O} Access in Delta based Versioning Systems}, journal = {CoRR}, volume = {abs/1411.4762}, year = {2014}, url = {http://arxiv.org/abs/1411.4762}, eprinttype = {arXiv}, eprint = {1411.4762}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/HarshanOD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/HarshanVB13, author = {J. Harshan and Emanuele Viterbo and Jean{-}Claude Belfiore}, title = {Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices}, journal = {{IEEE} Trans. Commun.}, volume = {61}, number = {11}, pages = {4417--4427}, year = {2013}, url = {https://doi.org/10.1109/TCOMM.2013.100213.130018}, doi = {10.1109/TCOMM.2013.100213.130018}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/HarshanVB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/HarshanV13, author = {J. Harshan and Emanuele Viterbo}, title = {Integer Space-Time Block Codes for Practical {MIMO} Systems}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {2}, number = {4}, pages = {455--458}, year = {2013}, url = {https://doi.org/10.1109/WCL.2013.052813.130201}, doi = {10.1109/WCL.2013.052813.130201}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/HarshanV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausctw/SakzadHV13, author = {Amin Sakzad and J. Harshan and Emanuele Viterbo}, title = {On complex {LLL} algorithm for integer forcing linear receivers}, booktitle = {Australian Communications Theory Workshop, AusCTW 2013, Adelaide, Australia, January 29 - Feb. 1, 2013}, pages = {13--17}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/AusCTW.2013.6510037}, doi = {10.1109/AUSCTW.2013.6510037}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ausctw/SakzadHV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HarshanV13, author = {J. Harshan and Emanuele Viterbo}, title = {Full-rate integer space-time block codes for 2{\texttimes}2 {MIMO} channels}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {3187--3191}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6655034}, doi = {10.1109/ICC.2013.6655034}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/HarshanV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-1415, author = {Amin Sakzad and J. Harshan and Emanuele Viterbo}, title = {On Complex {LLL} Algorithm for Integer Forcing Linear Receivers}, journal = {CoRR}, volume = {abs/1301.1415}, year = {2013}, url = {http://arxiv.org/abs/1301.1415}, eprinttype = {arXiv}, eprint = {1301.1415}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-1415.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-3665, author = {J. Harshan and Emanuele Viterbo}, title = {Integer Space-Time Block Codes for Practical {MIMO} Systems}, journal = {CoRR}, volume = {abs/1303.3665}, year = {2013}, url = {http://arxiv.org/abs/1303.3665}, eprinttype = {arXiv}, eprint = {1303.3665}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-3665.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausctw/HarshanV12, author = {J. Harshan and Emanuele Viterbo}, title = {On the robustness of algebraic STBCs to coefficient quantization}, booktitle = {Australian Communications Theory Workshop, AusCTW 2012, Wellington, New Zealand, January 30 - Feb. 2, 2012}, pages = {55--60}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/AusCTW.2012.6164906}, doi = {10.1109/AUSCTW.2012.6164906}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ausctw/HarshanV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HarshanVB12, author = {J. Harshan and Emanuele Viterbo and Jean{-}Claude Belfiore}, title = {Construction of Barnes-Wall lattices from linear codes over rings}, booktitle = {Proceedings of the 2012 {IEEE} International Symposium on Information Theory, {ISIT} 2012, Cambridge, MA, USA, July 1-6, 2012}, pages = {3110--3114}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISIT.2012.6284136}, doi = {10.1109/ISIT.2012.6284136}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/HarshanVB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-3282, author = {J. Harshan and Emanuele Viterbo and Jean{-}Claude Belfiore}, title = {Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices}, journal = {CoRR}, volume = {abs/1203.3282}, year = {2012}, url = {http://arxiv.org/abs/1203.3282}, eprinttype = {arXiv}, eprint = {1203.3282}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-3282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-6412, author = {Amin Sakzad and J. Harshan and Emanuele Viterbo}, title = {Integer-Forcing Linear Receivers Based on Lattice Reduction Algorithms}, journal = {CoRR}, volume = {abs/1209.6412}, year = {2012}, url = {http://arxiv.org/abs/1209.6412}, eprinttype = {arXiv}, eprint = {1209.6412}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-6412.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.