Get my own profile
Public access
View all20 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Ahmed Hussen AbdelazizAppleVerified email at apple.com
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Martin HeckmannAalen University of Applied SciencesVerified email at hs-aalen.de
Hendrik MeutznerRuhr-University BochumVerified email at rub.de
Rahim SaeidiEagle GenomicsVerified email at eaglegenomics.com
Katharina KohlsRadboud UniversityVerified email at cs.ru.nl
Ning MaUniversity of SheffieldVerified email at sheffield.ac.uk
Shinji WatanabeCarnegie Mellon UniversityVerified email at cmu.edu
Marc DelcroixNTT Communication Science LaboratoriesVerified email at ieee.org
Tomohiro NakataniNTT Communication Science LaboratoriesVerified email at ieee.org
Alberto AbadINESC-ID, Instituto Superior Técnico, University of Lisbon, PortugalVerified email at l2f.inesc-id.pt
Pejman MowlaeeLead Research ScientistVerified email at tugraz.at
Reinhold Haeb-UmbachProfessor of Communications Engineering, University of PaderbornVerified email at nt.uni-paderborn.de
Markus BärProfessor, PTB, Modeling and Data Analysis; TU Berlin, Theoretical PhysicsVerified email at ptb.de
Armin KohlrauschPhilips Research and TU EindhovenVerified email at philips.com
Jike ChongCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Sebastian GergenBochumer Institut für Technologie, Bochum, GermanyVerified email at bo-i-t.de
Heiko WersingHonda Research Institute EuropeVerified email at honda-ri.de
John HersheyGoogle (formerly MERL, IBM, MSR, UCSD)Verified email at google.com
Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr