default search action
Bikash Kumar Dey
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Byzantine Multiple Access Channels - Part I: Reliable Communication. IEEE Trans. Inf. Theory 70(4): 2309-2366 (2024) - [c53]Eeshan Modak, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Sequential Adversarial Hypothesis Testing. ISIT 2024: 1474-1479 - [c52]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Y. Zhang:
Computationally Efficient Codes for Strongly Dobrushin-Stambler Nonsymmetrizable Oblivious AVCs. ISIT 2024: 1586-1591 - [i46]Abhishek Sarkar, Bikash Kumar Dey:
Identification via Permutation Channels. CoRR abs/2405.09309 (2024) - 2023
- [c51]Eeshan Modak, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Hypothesis Testing for Adversarial Channels: Chernoff-Stein Exponents. ISIT 2023: 1225-1230 - [i45]Eeshan Modak, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Hypothesis Testing for Adversarial Channels: Chernoff-Stein Exponents. CoRR abs/2304.14166 (2023) - [i44]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Byzantine Multiple Access Channels - Part II: Communication With Adversary Identification. CoRR abs/2309.11174 (2023) - 2022
- [j23]Varun Narayanan, Jithin Ravi, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani, Vinod M. Prabhakaran:
Private Index Coding. IEEE Trans. Inf. Theory 68(3): 2020-2049 (2022) - [j22]Chinmay Gurjarpadhye, Jithin Ravi, Sneha Kamath, Bikash Kumar Dey, Nikhil Karamchandani:
Fundamental Limits of Demand-Private Coded Caching. IEEE Trans. Inf. Theory 68(6): 4106-4134 (2022) - [c50]Abhishek Sarkar, Bikash Kumar Dey, Sibi Raj B. Pillai:
On the Error Exponents for Common Message Broadcasting over DMCs with Feedback. SPCOM 2022: 1-5 - [i43]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Byzantine Multiple Access Channels - Part I: Reliable Communication. CoRR abs/2211.12769 (2022) - 2021
- [c49]Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Compound Arbitrarily Varying Channels. ISIT 2021: 503-508 - [c48]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication With Adversary Identification in Byzantine Multiple Access Channels. ISIT 2021: 688-693 - [i42]Chinmay Gurjarpadhye, Jithin Ravi, Sneha Kamath, Bikash Kumar Dey, Nikhil Karamchandani:
Fundamental Limits of Demand-Private Coded Caching. CoRR abs/2101.07127 (2021) - [i41]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication With Adversary Identification in Byzantine Multiple Access Channels. CoRR abs/2105.03380 (2021) - [i40]Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Compound Arbitrarily Varying Channels. CoRR abs/2105.03420 (2021) - 2020
- [c47]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Carol Wang:
Symmetrizability for Myopic AVCs. ISIT 2020: 2103-2107 - [c46]Chinmay Gurjarpadhye, Jithin Ravi, Bikash Kumar Dey, Nikhil Karamchandani:
Improved Memory-Rate Trade-off for Caching with Demand Privacy. ITW 2020: 1-5 - [c45]Sneha Kamath, Jithin Ravi, Bikash Kumar Dey:
Demand-Private Coded Caching and the Exact Trade-off for N=K=2. NCC 2020: 1-6 - [i39]Varun Narayanan, Jithin Ravi, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani, Vinod M. Prabhakaran:
Private Index Coding. CoRR abs/2006.00257 (2020)
2010 – 2019
- 2019
- [j21]Jithin Ravi, Bikash Kumar Dey:
Function Computation Through a Bidirectional Relay. IEEE Trans. Inf. Theory 65(2): 902-916 (2019) - [j20]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Sufficiently Myopic Adversaries Are Blind. IEEE Trans. Inf. Theory 65(9): 5718-5736 (2019) - [c44]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Multiple Access Channels with Adversarial Users. ISIT 2019: 435-439 - [c43]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Carol Wang:
The Interplay of Causality and Myopia in Adversarial Channel Models. ISIT 2019: 1002-1006 - [c42]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Multiple Access Channels with Byzantine Users. ITW 2019: 1-5 - [i38]Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran:
Byzantine Multiple Access. CoRR abs/1904.11925 (2019) - [i37]Sneha Kamath, Jithin Ravi, Bikash Kumar Dey:
Demand-Private Coded Caching and the Exact Trade-off for N=K=2. CoRR abs/1911.06995 (2019) - 2018
- [c41]Varun Narayanan, Vinod M. Prabhakaran, Jithin Ravi, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani:
Private Index Coding. ISIT 2018: 596-600 - [c40]Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Quadratically Constrained Channels with Causal Adversaries. ISIT 2018: 621-625 - [c39]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:
On the Rate Distortion Function of Arbitrarily Varying Remote Sources. ITW 2018: 1-5 - [i36]Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Quadratically Constrained Channels with Causal Adversaries. CoRR abs/1805.03319 (2018) - [i35]Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran:
Arbitrarily Varying Remote Sources. CoRR abs/1809.04464 (2018) - 2017
- [j19]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
Wiretapped Oblivious Transfer. IEEE Trans. Inf. Theory 63(4): 2560-2595 (2017) - [j18]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication in the Presence of a State-Aware Adversary. IEEE Trans. Inf. Theory 63(11): 7396-7419 (2017) - [c38]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Coding for arbitrarily varying remote sources. ISIT 2017: 729-733 - [i34]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Coding for Arbitrarily Varying Remote Sources. CoRR abs/1704.07693 (2017) - 2016
- [j17]Jithin Ravi, Bikash Kumar Dey, Emanuele Viterbo:
Oblivious Transfer Over Wireless Channels. IEEE Trans. Commun. 64(3): 893-905 (2016) - [c37]Jithin Ravi, Bikash Kumar Dey:
Broadcast Function Computation with Complementary Side Information. GLOBECOM Workshops 2016: 1-6 - [c36]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
A bit of delay is sufficient and stochastic encoding is necessary to overcome online adversarial erasures. ISIT 2016: 880-884 - [i33]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels. CoRR abs/1602.02384 (2016) - [i32]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
Wiretapped Oblivious Transfer. CoRR abs/1604.05668 (2016) - [i31]Jithin Ravi, Bikash Kumar Dey:
Function Computation through a Bidirectional Relay. CoRR abs/1609.07923 (2016) - [i30]Jithin Ravi, Bikash Kumar Dey:
Broadcast Function Computation with Complementary Side Information. CoRR abs/1610.00867 (2016) - [i29]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Sufficiently Myopic Adversaries are Blind. CoRR abs/1610.01287 (2016) - 2015
- [j16]Sreejith Sreekumar, Bikash Kumar Dey, Sibi Raj B. Pillai:
Distributed Rate Adaptation and Power Control in Fading Multiple Access Channels. IEEE Trans. Inf. Theory 61(10): 5504-5524 (2015) - [c35]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Sufficiently myopic adversaries are blind. ISIT 2015: 1164-1168 - [c34]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the oblivious transfer capacity of the degraded wiretapped binary erasure channel. ISIT 2015: 1169-1173 - [c33]Manoj Mishra, Tanmay Sharma, Bikash Kumar Dey, Vinod M. Prabhakaran:
Private data transfer over a broadcast channel. ISIT 2015: 1352-1356 - [c32]Jithin Ravi, Bikash Kumar Dey:
Zero-error function computation through a bidirectional relay. ITW 2015: 1-5 - [c31]Jithin Ravi, Bikash Kumar Dey, Emanuele Viterbo:
Oblivious transfer over OFDM and MIMO channels. ITW 2015: 1-5 - [c30]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Dirty paper arbitrarily varying channel with a state-aware adversary. ITW Fall 2015: 94-98 - [i28]Manoj Mishra, Tanmay Sharma, Bikash Kumar Dey, Vinod M. Prabhakaran:
Private Data Transfer over a Broadcast Channel. CoRR abs/1504.01101 (2015) - [i27]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Dirty Paper Arbitrarily Varying Channel with a State-Aware Adversary. CoRR abs/1504.04351 (2015) - [i26]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel. CoRR abs/1504.04499 (2015) - [i25]Jithin Ravi, Bikash Kumar Dey, Emanuele Viterbo:
Oblivious Transfer over Wireless Channels. CoRR abs/1508.00664 (2015) - [i24]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Communication in the Presence of a State-Aware Adversary. CoRR abs/1509.08299 (2015) - 2014
- [j15]Pannir Selvam Elamvazhuthi, Bikash Kumar Dey, Srikrishna Bhashyam:
An MMSE Strategy at Relays With Partial CSI for a Multi-Layer Relay Network. IEEE Trans. Signal Process. 62(2): 271-282 (2014) - [c29]Amitalok J. Budkuley, Bikash Kumar Dey, Sibi Raj B. Pillai, Vinod M. Prabhakaran:
The Gaussian CEO competitive pricing game. COMSNETS 2014: 1-8 - [c28]Sreejith Sreekumar, Sibi Raj B. Pillai, Bikash Kumar Dey:
Energy efficient random multiple access with strict delay constraints. ISIT 2014: 981-985 - [c27]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
The oblivious transfer capacity of the wiretapped binary erasure channel. ISIT 2014: 1539-1543 - [c26]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Writing on a dirty paper in the presence of jamming. ISIT 2014: 2242-2246 - [c25]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Correlated jamming in a Joint Source Channel Communication system. ISIT 2014: 2247-2251 - [c24]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
On the oblivious transfer capacity region of the binary erasure broadcast channel. ITW 2014: 237-241 - [c23]Sreejith Sreekumar, Sibi Raj B. Pillai, Bikash Kumar Dey:
On the adaptive capacity region of fading MACs with distributed CSI. ITW 2014: 486-490 - [c22]Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to securely compute the modulo-two sum of binary sources. ITW 2014: 496-500 - [i23]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Correlated Jamming in a Joint Source Channel Communication System. CoRR abs/1404.5055 (2014) - [i22]Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran:
Writing on a Dirty Paper in the presence of Jamming. CoRR abs/1404.5060 (2014) - [i21]Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas N. Diggavi:
The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel. CoRR abs/1404.6614 (2014) - [i20]Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran:
How to Securely Compute the Modulo-Two Sum of Binary Sources. CoRR abs/1405.2555 (2014) - [i19]Sreejith Sreekumar, Bikash Kumar Dey, Sibi Raj B. Pillai:
Distributed Rate Adaptation and Power Control in Fading Multiple Access Channels. CoRR abs/1409.4489 (2014) - [i18]Jithin Ravi, Bikash Kumar Dey:
Zero-Error Function Computation through a Bidirectional Relay. CoRR abs/1411.6835 (2014) - 2013
- [j14]Virag Shah, Bikash Kumar Dey, D. Manjunath:
Network Flows for Function Computation. IEEE J. Sel. Areas Commun. 31(4): 714-730 (2013) - [j13]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Codes Against Online Adversaries: Large Alphabets. IEEE Trans. Inf. Theory 59(6): 3304-3316 (2013) - [j12]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Upper Bounds on the Capacity of Binary Channels With Causal Adversaries. IEEE Trans. Inf. Theory 59(6): 3753-3763 (2013) - [c21]Sreejith Sreekumar, Bikash Kumar Dey, Sibi Raj B. Pillai:
On the adaptive sum-capacity of fading MACs with distributed CSI and non-identical links. ISIT 2013: 1471-1475 - [c20]Kamal Singh, Sibi Raj B. Pillai, Bikash Kumar Dey:
On fading MAC channels with asymmetric CSI. ISIT 2013: 2626-2630 - 2012
- [j11]Brijesh Kumar Rai, Bikash Kumar Dey:
On Network Coding for Sum-Networks. IEEE Trans. Inf. Theory 58(1): 50-63 (2012) - [c19]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Improved upper bounds on the capacity of binary channels with causal adversaries. ISIT 2012: 681-685 - [c18]Krishnamoorthy Iyer, Sibi Raj B. Pillai, Bikash Kumar Dey:
Power controlled adaptive sum-capacity in the presence of distributed CSI. ISITA 2012: 66-70 - [c17]Jithin Ravi, Bikash Kumar Dey:
Exact topology inference for DAGs using network coding. NetCod 2012: 73-78 - [i17]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Upper Bounds on the Capacity of Binary Channels with Causal Adversaries. CoRR abs/1204.2587 (2012) - [i16]Sibi Raj B. Pillai, Bikash Kumar Dey, Yash Deshpande, Krishnamoorthy Iyer:
Power Controlled Adaptive Sum-Capacity of Fading MACs with Distributed CSI. CoRR abs/1208.4777 (2012) - [i15]B. Santhana Krishnan, Animesh Kumar, D. Manjunath, Bikash Kumar Dey:
On the Separability of Targets Using Binary Proximity Sensors. CoRR abs/1211.4441 (2012) - 2011
- [j10]Bikash Kumar Dey, D. Manjunath, Supriyo Chakraborty:
Estimating network link characteristics using packet-pair dispersion: A discrete-time queueing theoretic analysis. Comput. Networks 55(5): 1052-1068 (2011) - [j9]S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey:
A Channel Coding Perspective of Collaborative Filtering. IEEE Trans. Inf. Theory 57(4): 2327-2341 (2011) - [j8]Bhushan G. Jagyasi, Deepthi Chander, Uday B. Desai, Shabbir N. Merchant, Bikash Kumar Dey:
Blind Adaptive Weighted Aggregation Scheme for Event Detection in Multihop Wireless Sensor Networks. Wirel. Pers. Commun. 58(3): 581-597 (2011) - [c16]Virag Shah, Bikash Kumar Dey, D. Manjunath:
Efficient Flow Allocation Algorithms for In-Network Function Computation. GLOBECOM 2011: 1-6 - [c15]Virag Shah, Bikash Kumar Dey, D. Manjunath:
Network flows for functions. ISIT 2011: 234-238 - [c14]Yash Deshpande, Sibi Raj B. Pillai, Bikash Kumar Dey:
On the sum capacity of multiaccess block-fading channels with individual side information. ITW 2011: 588-592 - 2010
- [c13]Sagar Shenvi, Bikash Kumar Dey:
A Simple Necessary and Sufficient Condition for the Double Unicast Problem. ICC 2010: 1-5 - [c12]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate:
Coding against delayed adversaries. ISIT 2010: 285-289 - [c11]Sagar Shenvi, Bikash Kumar Dey:
A necessary and sufficient condition for solvability of a 3s/3t sum-network. ISIT 2010: 1858-1862 - [i14]Sagar Shenvi, Bikash Kumar Dey:
A Necessary and Sufficient Condition for Solvability of a 3s/3t Sum-network. CoRR abs/1001.4137 (2010) - [i13]Virag Shah, Bikash Kumar Dey, D. Manjunath:
Network Flows for Functions. CoRR abs/1009.6057 (2010)
2000 – 2009
- 2009
- [c10]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Codes against online adversaries. Allerton 2009: 1169-1176 - [c9]S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey:
A channel coding perspective of recommendation systems. ISIT 2009: 319-323 - [c8]Brijesh Kumar Rai, Bikash Kumar Dey:
Feasible alphabets for communicating the sum of sources over a network. ISIT 2009: 1353-1357 - [c7]Michael Langberg, Sidharth Jaggi, Bikash Kumar Dey:
Binary causal-adversary channels. ISIT 2009: 2723-2727 - [c6]Vijay Ganwani, Bikash Kumar Dey, G. V. V. Sharma, S. N. Merchant, Uday B. Desai:
Performance Analysis of Amplify and Forward Based Cooperative Diversity in MIMO Relay Channels. VTC Spring 2009 - [i12]S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey:
A Channel Coding Perspective of Recommendation Systems. CoRR abs/0901.1753 (2009) - [i11]Michael Langberg, Sidharth Jaggi, Bikash Kumar Dey:
Binary Causal-Adversary Channels. CoRR abs/0901.1853 (2009) - [i10]Brijesh Kumar Rai, Bikash Kumar Dey:
Feasible alphabets for communicating the sum of sources over a network. CoRR abs/0901.2198 (2009) - [i9]Brijesh Kumar Rai, Bikash Kumar Dey:
Sum-networks: System of polynomial equations, unachievability of coding capacity, reversibility, insufficiency of linear network coding. CoRR abs/0906.0695 (2009) - [i8]Brijesh Kumar Rai, Bikash Kumar Dey:
Classification of \textit{sum-networks} based on network coding capacity. CoRR abs/0907.2090 (2009) - [i7]S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey:
A Channel Coding Perspective of Collaborative Filtering. CoRR abs/0908.2494 (2009) - [i6]Sagar Shenvi, Bikash Kumar Dey:
A simple necessary and sufficient condition for the double unicast problem. CoRR abs/0909.5268 (2009) - [i5]Bikash Kumar Dey, D. Manjunath, Supriyo Chakraborty:
Estimating Network Link Characteristics using Packet-Pair Dispersion: A Discrete Time Queueing Theoretic View. CoRR abs/0911.3528 (2009) - 2008
- [j7]Bhushan G. Jagyasi, Bikash Kumar Dey, S. N. Merchant, Uday B. Desai:
An Efficient Multibit Aggregation Scheme for Multihop Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [c5]Bhushan G. Jagyasi, Deepthi Chander, S. N. Merchant, Uday B. Desai, Bikash Kumar Dey:
MAAS: Multibit Adaptive Aggregation Scheme for wireless sensor networks. ICT 2008: 1-7 - [c4]Sagar Shenvi, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
"Real" Slepian-Wolf codes. ISIT 2008: 1423-1427 - [i4]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
"Real" Slepian-Wolf Codes. CoRR abs/0810.1424 (2008) - [i3]Pannir Selvam Elamvazhuthi, Parag Shankar Kulkarni, Bikash Kumar Dey:
DSTC Layering Protocols in Wireless Cooperative Networks. CoRR abs/0810.2659 (2008) - [i2]Brijesh Kumar Rai, Bikash Kumar Dey, Abhay Karandikar:
Some results on communicating the sum of sources over a network. CoRR abs/0811.0285 (2008) - [i1]Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg:
Codes against Online Adversaries. CoRR abs/0811.2850 (2008) - 2007
- [j6]Subhendu Batabyal, Bikash Kumar Dey, V. Umapathi Reddy:
A Code Set for a Robust 8.25 Mb/s Data Rate for IEEE 802.11b WLANs. IEEE Trans. Veh. Technol. 56(3): 1131-1142 (2007) - 2006
- [c3]Bhushan G. Jagyasi, Bikash Kumar Dey, S. N. Merchant, Uday B. Desai:
An MMSE based weighted aggregation scheme for event detection using wireless sensor network. EUSIPCO 2006: 1-5 - 2005
- [j5]Bikash Kumar Dey, B. Sundar Rajan:
Fq-linear Cyclic Codes over Fqm: DFT Approach. Des. Codes Cryptogr. 34(1): 89-116 (2005) - 2004
- [j4]Bikash Kumar Dey, B. Sundar Rajan:
Codes Closed under Arbitrary Abelian Group of Permutations. SIAM J. Discret. Math. 18(1): 1-18 (2004) - [j3]Bikash Kumar Dey, B. Sundar Rajan:
Affine invariant extended cyclic codes over Galois rings. IEEE Trans. Inf. Theory 50(4): 691-698 (2004) - [j2]Bikash Kumar Dey:
On Existence of Good Self-Dual Quasi-Cyclic Codes. IEEE Trans. Inf. Theory 50(8): 1794-1798 (2004) - [c2]Bikash Kumar Dey:
On existence of good self-dual quasicyclic codes. ISIT 2004: 184 - 2003
- [j1]Bikash Kumar Dey, B. Sundar Rajan:
DFT Domain Characterization of Quasi-Cyclic Codes. Appl. Algebra Eng. Commun. Comput. 13(6): 453-474 (2003) - 2001
- [c1]Bikash Kumar Dey, B. Sundar Rajan:
Fq-Linear Cyclic Codes over Fq: DFT Characterization. AAECC 2001: 67-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint