default search action
Asaf Cohen 0001
Person information
- affiliation: Ben-Gurion University, Israel
Other persons with the same name
- Asaf Cohen 0002 — Bar-Ilan University, Israel
- Asaf Cohen 0003 — University of Haifa, Department of Statistics, Israel (and 3 more)
- Asaf Cohen 0004 — Intel Advanced Analytics
- Asaf Cohen 0005 — Weizmann Institute of Science, Department of Molecular Chemistry and Materials Science, Rehovot, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]George Vershinin, Asaf Cohen, Omer Gurewitz:
Order-Optimal Multiple-Access Channel for Massive MIMO via Group Testing Decoding. IEEE Trans. Commun. 72(7): 3890-3904 (2024) - [j37]Barak Amihood, Asaf Cohen:
Covertly Controlling a Linear System. IEEE Trans. Inf. Forensics Secur. 19: 2651-2663 (2024) - [j36]Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Adaptive Group Testing. IEEE Trans. Inf. Forensics Secur. 19: 2786-2799 (2024) - [j35]Or Elimelech, Ori Shmuel, Asaf Cohen:
Corrections to "Private Information Retrieval Over Gaussian MAC". IEEE Trans. Inf. Theory 70(10): 7521-7524 (2024) - [c46]George Vershinin, Asaf Cohen, Omer Gurewitz:
Novel Bounds for Semi-Blind Multiple-Access in Massive MIMO. ISIT 2024: 2157-2162 - [c45]Rachel Bonen, Asaf Cohen:
Less than 1-Bit Control of an Unstable AR Process with 1-Bit Quantizers. ISIT 2024: 3243-3248 - [c44]Or Elimelech, Asaf Cohen:
An Efficient, High-Rate Scheme for Private Information Retrieval over the Gaussian MAC. ISIT 2024: 3672-3677 - [i45]Or Elimelech, Ori Shmuel, Asaf Cohen:
Correction to "Private Information Retrieval Over Gaussian MAC". CoRR abs/2401.15910 (2024) - [i44]Or Elimelech, Asaf Cohen:
An Efficient, High-Rate Scheme for Private Information Retrieval over the Gaussian MAC. CoRR abs/2401.15912 (2024) - 2023
- [c43]Asaf Cohen, Pawel Cyprys, Shlomi Dolev:
Single Instance Self-masking via Permutations - (Preliminary Version). CSCML 2023: 74-84 - [c42]George Vershinin, Asaf Cohen, Omer Gurewitz:
Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO. CSCML 2023: 200-215 - [c41]George Vershinin, Asaf Cohen, Omer Gurewitz:
Order-Optimal Joint Transmission and Identification in Massive Multi-User MIMO via Group Testing. ISIT 2023: 1991-1996 - [i43]Asaf Cohen, Pawel Cyprys, Shlomi Dolev:
Single Instance Self-Masking via Permutations. IACR Cryptol. ePrint Arch. 2023: 416 (2023) - 2022
- [j34]Asaf Cohen, Neri Merhav:
Universal Randomized Guessing Subject to Distortion. IEEE Trans. Inf. Theory 68(12): 7714-7734 (2022) - [c40]Nimrod Gradus, Asaf Cohen, Erez Biton, Omer Gurwitz:
Reinforcement Based User Scheduling for Cellular Communications. CSCML 2022: 189-207 - [c39]Asaf Cohen, Neri Merhav:
Universal Randomized Guessing Subject to Distortion. ISIT 2022: 3345-3350 - [c38]Barak Amihood, Asaf Cohen:
Covertly Controlling a Linear System. ITW 2022: 321-326 - [i42]Barak Amihood, Asaf Cohen:
Covertly Controlling a Linear System. CoRR abs/2202.02853 (2022) - [i41]George Vershinin, Asaf Cohen, Omer Gurewitz:
Multiple Access Channel in Massive Multi-User MIMO Using Group Testing. CoRR abs/2210.00421 (2022) - [i40]Barak Amihood, Asaf Cohen:
Covertly Controlling a Linear System. CoRR abs/2212.01052 (2022) - [i39]Or Elimelech, Itai Bitton, Eran Nehushtan, Asaf Cohen:
Perfectly Covert Communication with a Reflective Panel. CoRR abs/2212.09049 (2022) - 2021
- [j33]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
On the Outage Probability of Distributed MAC With ZF Detection. IEEE Trans. Commun. 69(4): 2398-2412 (2021) - [j32]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Multi-Antenna Jamming in Covert Communication. IEEE Trans. Commun. 69(7): 4644-4658 (2021) - [j31]Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Group Testing. IEEE Trans. Inf. Forensics Secur. 16: 4003-4018 (2021) - [j30]Ori Shmuel, Asaf Cohen:
Private Information Retrieval Over Gaussian MAC. IEEE Trans. Inf. Theory 67(8): 5404-5419 (2021) - [j29]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Compute-and-Forward in Large Relaying Systems: Limitations and Asymptotically Optimal Scheduling. IEEE Trans. Inf. Theory 67(9): 6243-6265 (2021) - [i38]Asaf Cohen, Neri Merhav:
Universal Randomized Guessing Subjected to Distortion. CoRR abs/2112.13594 (2021) - 2020
- [j28]Shachar Siboni, Asaf Cohen:
Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools. Entropy 22(6): 649 (2020) - [j27]Sreejith Sreekumar, Asaf Cohen, Deniz Gündüz:
Privacy-Aware Distributed Hypothesis Testing. Entropy 22(6): 665 (2020) - [j26]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing With Side-Information. IEEE Trans. Inf. Forensics Secur. 15: 3749-3759 (2020) - [j25]Neri Merhav, Asaf Cohen:
Universal Randomized Guessing With Application to Asynchronous Decentralized Brute-Force Attacks. IEEE Trans. Inf. Theory 66(1): 114-129 (2020) - [j24]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Analysis of Different Approaches to Distributed Multiuser MIMO in the 802.11ac. IEEE Trans. Mob. Comput. 19(11): 2548-2561 (2020) - [j23]Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Efficient Data Collection Over Multiple Access Wireless Sensors Network. IEEE/ACM Trans. Netw. 28(2): 491-504 (2020) - [j22]Mark Shifrin, Daniel S. Menasché, Asaf Cohen, Dennis Goeckel, Omer Gurewitz:
Optimal PHY Configuration in Wireless Networks. IEEE/ACM Trans. Netw. 28(6): 2601-2614 (2020) - [c37]Ori Shmuel, Asaf Cohen:
Private Information Retrieval Over Gaussian MAC. ISIT 2020: 1047-1052 - [c36]Salman Salamatian, Asaf Cohen, Muriel Médard:
Approximate Gács-Körner Common Information. ISIT 2020: 2234-2239 - [i37]Ori Shmuel, Asaf Cohen, Omer Gurewitz, Alejandro Cohen:
Multi-Antenna Jamming in Covert Communication. CoRR abs/2001.03146 (2020) - [i36]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Private Information Retrieval Over Gaussian MAC. CoRR abs/2001.03753 (2020) - [i35]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Compute-and-Forward in Large Relaying Systems: Limitations and Asymptotically Optimal Scheduling. CoRR abs/2005.04592 (2020) - [i34]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs Decentralized Targeted Brute-Force Attacks: Guessing with Side-Information. CoRR abs/2008.12823 (2020)
2010 – 2019
- 2019
- [j21]Alejandro Cohen, Asaf Cohen, Muriel Médard, Omer Gurewitz:
Secure Multi-Source Multicast. IEEE Trans. Commun. 67(1): 708-723 (2019) - [j20]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. IEEE Trans. Inf. Forensics Secur. 14(9): 2288-2299 (2019) - [c35]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Jamming Strategies in Covert Communication. CSCML 2019: 1-15 - [c34]Neri Merhav, Asaf Cohen:
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute - Force Attacks. ISIT 2019: 485-489 - [c33]Ori Shmuel, Asaf Cohen, Omer Gurewitz, Alejandro Cohen:
Multi-Antenna Jamming in Covert Communication. ISIT 2019: 987-991 - 2018
- [j19]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Performance Analysis of Opportunistic Distributed Scheduling in Multi-User Systems. IEEE Trans. Commun. 66(10): 4637-4652 (2018) - [j18]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
The Ergodic Capacity of the Multiple Access Channel Under Distributed Scheduling - Order Optimality of Linear Receivers. IEEE Trans. Inf. Theory 64(8): 5898-5919 (2018) - [j17]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Traffic Classification Based on Zero-Length Packets. IEEE Trans. Netw. Serv. Manag. 15(3): 1049-1062 (2018) - [c32]Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secured Data Gathering Protocol for IoT Networks. CSCML 2018: 129-143 - [c31]Alejandro Cohen, Asaf Cohen, Sidharth Jaggi, Omer Gurewitz:
Secure Adaptive Group Testing. ISIT 2018: 2589-2593 - [c30]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
On the Outage Probability of Distributed MAC with ZF Detection. ITW 2018: 1-5 - [c29]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Asymptotically Optimal Scheduling for Compute-and-Forward. ITW 2018: 1-5 - [c28]Sreejith Sreekumar, Deniz Gündüz, Asaf Cohen:
Distributed Hypothesis Testing Under Privacy Constraints. ITW 2018: 1-5 - [c27]Tsvi Gregory Dvorkind, Asaf Cohen:
Maximizing Miss Detection for Covert Communication Under Practical Constraints. SSP 2018: 712-716 - [i33]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Asymptotically Optimal Scheduling for Compute-and-Forward. CoRR abs/1801.03259 (2018) - [i32]Alejandro Cohen, Asaf Cohen, Sidharth Jaggi, Omer Gurewitz:
Secure Adaptive Group Testing. CoRR abs/1801.04735 (2018) - [i31]Salman Salamatian, Wasim Huleihel, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization. CoRR abs/1805.11666 (2018) - [i30]Sreejith Sreekumar, Asaf Cohen, Deniz Gündüz:
Distributed Hypothesis Testing Under Privacy Constraints. CoRR abs/1807.02764 (2018) - [i29]Neri Merhav, Asaf Cohen:
Universal Randomized Guessing with Application to Asynchronous Decentralized Brute-Force Attacks. CoRR abs/1811.04363 (2018) - 2017
- [j16]Chen Avin, Asaf Cohen, Yoram Haddad, Erez Kantor, Zvi Lotker, Merav Parter, David Peleg:
SINR diagram with interference cancellation. Ad Hoc Networks 54: 1-16 (2017) - [j15]Oron Sabag, Haim H. Permuter, Asaf Cohen:
Lossless Coding of Correlated Sources With Actions. IEEE Trans. Inf. Theory 63(2): 1237-1252 (2017) - [j14]Niv Voskoboynik, Haim H. Permuter, Asaf Cohen:
Network Coding Schemes for Data Exchange Networks With Arbitrary Transmission Delays. IEEE/ACM Trans. Netw. 25(3): 1293-1309 (2017) - [c26]Salman Salamatian, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs decentralized multi-agent guesswork. ISIT 2017: 2258-2262 - [c25]Asaf Cohen, Alejandro Cohen, Muriel Médard, Omer Gurewitz:
Individually-secure multi-source multicast. ISIT 2017: 3105-3109 - [c24]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
The necessity of scheduling in compute-and-forward. ITW 2017: 509-513 - [c23]Mark Shifrin, Daniel Sadoc Menasché, Asaf Cohen, Omer Gurewitz, Dennis Goeckel:
An SMDP approach to optimal PHY configuration in wireless networks. WONS 2017: 128-135 - [i28]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
The Necessity of Scheduling in Compute-and-Forward. CoRR abs/1702.02362 (2017) - [i27]Alejandro Cohen, Asaf Cohen, Muriel Médard, Omer Gurewitz:
Secure Multi-Source Multicast. CoRR abs/1702.03012 (2017) - [i26]Salman Salamatian, Ahmad Beirami, Asaf Cohen, Muriel Médard:
Centralized vs Decentralized Multi-Agent Guesswork. CoRR abs/1705.09372 (2017) - [i25]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Distributed Scheduling in Time Dependent Environments: Algorithms and Analysis. CoRR abs/1709.04361 (2017) - [i24]Ron Meir, Omer Gurewitz, Asaf Cohen:
Integer Forcing: Effective SNR Distribution and Practical Block-Based Schemes. CoRR abs/1709.10037 (2017) - [i23]Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Data Aggregation Over Multiple Access Wireless Sensors Network. CoRR abs/1712.03314 (2017) - 2016
- [j13]Alejandro Cohen, Asaf Cohen:
Wiretap Channel With Causal State Information and Secure Rate-Limited Feedback. IEEE Trans. Commun. 64(3): 1192-1203 (2016) - [j12]Mark Shifrin, Asaf Cohen, Olga Weisman, Omer Gurewitz:
Coded Retransmission in Wireless Networks Via Abstract MDPs: Theory and Algorithms. IEEE Trans. Wirel. Commun. 15(6): 4292-4306 (2016) - [c22]Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Group Testing. ISIT 2016: 1391-1395 - [c21]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
On secrecy rates and outage in multi-user multi-eavesdroppers MISO systems. ISIT 2016: 2449-2453 - [c20]Salman Salamatian, Asaf Cohen, Muriel Médard:
Efficient coding for multi-source networks using Gács-Körner common information. ISITA 2016: 166-170 - [i22]Salman Salamatian, Asaf Cohen, Muriel Médard:
Efficient Coding for Multi-source Networks using Gács-Körner Common Information. CoRR abs/1601.06882 (2016) - [i21]Salman Salamatian, Asaf Cohen, Muriel Médard:
Maximum Entropy Functions: Approximate Gacs-Korner for Distributed Compression. CoRR abs/1604.03877 (2016) - [i20]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
On Secrecy Rates and Outage in Multi-User Multi-Eavesdroppers MISO Systems. CoRR abs/1605.02349 (2016) - [i19]Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secure Group Testing. CoRR abs/1607.04849 (2016) - [i18]Mark Shifrin, Daniel S. Menasché, Asaf Cohen, Omer Gurewitz, Dennis Goeckel:
An SMDP Approach to Optimal PHY Configuration in Wireless Networks. CoRR abs/1610.05598 (2016) - 2015
- [j11]Asaf Cohen, Bernhard Haeupler, Chen Avin, Muriel Médard:
Network Coding Based Information Spreading in Dynamic Networks With Correlated Data. IEEE J. Sel. Areas Commun. 33(2): 213-224 (2015) - [j10]Eliahu Cohen, Ron Heiman, Maya Carmi, Ofer Hadar, Asaf Cohen:
When physics meets signal processing: Image and video denoising based on Ising theory. Signal Process. Image Commun. 34: 14-21 (2015) - [c19]Ron Yadgar, Asaf Cohen, Omer Gurewitz:
Scaling laws for reliable data dissemination in shared loss multicast trees. Allerton 2015: 894-900 - [c18]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Performance analysis for multi-user systems under distributed opportunistic scheduling. Allerton 2015: 1480-1485 - [c17]Mark Shifrin, Asaf Cohen, Olga Weisman, Omer Gurewitz:
Coded retransmission in wireless networks via abstract MDPs: Theory and algorithms. ISIT 2015: 2628-2632 - [i17]Mark Shifrin, Asaf Cohen, Omer Gurewitz, Olga Weisman:
Coded Retransmission in Wireless Networks Via Abstract MDPs: Theory and Algorithms. CoRR abs/1502.02893 (2015) - [i16]Niv Voskoboynik, Haim H. Permuter, Asaf Cohen:
On the Capacity of Wireless Networks with Random Transmission Delay. CoRR abs/1503.01063 (2015) - [i15]Ron Yadgar, Asaf Cohen, Omer Gurewitz:
Asymptotic Analysis for Reliable Data Dissemination in Shared loss Multicast Trees. CoRR abs/1506.05819 (2015) - [i14]Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Capacity and performance analysis for multi-user system under distributed opportunistic scheduling in a time dependent channel. CoRR abs/1507.03255 (2015) - [i13]Shachar Siboni, Asaf Cohen:
Universal Anomaly Detection: Algorithms and Applications. CoRR abs/1508.03687 (2015) - 2014
- [j9]Asaf Cohen, Shlomi Dolev, Guy Leshem:
Sensor networks: From dependence analysis via matroid bases to online synthesis. Theor. Comput. Sci. 553: 2-17 (2014) - [j8]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Capacity of Distributed Opportunistic Scheduling in Nonhomogeneous Networks. IEEE Trans. Inf. Theory 60(11): 7231-7247 (2014) - [j7]Erez Biton, Asaf Cohen, Guy Reina, Omer Gurewitz:
Distributed Inter-Cell Interference Mitigation Via Joint Scheduling and Power Control Under Noise Rise Constraints. IEEE Trans. Wirel. Commun. 13(6): 3464-3477 (2014) - [c16]Oron Sabag, Haim H. Permuter, Asaf Cohen:
Lossless coding of correlated sources with actions in acyclic directed networks. ISIT 2014: 1331-1335 - [c15]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
The capacity of the Multiple Access Channel under distributed scheduling and MMSE decoding. ITW 2014: 491-495 - [c14]Niv Voskoboynik, Haim H. Permuter, Asaf Cohen:
Random delay in network coding for bidirectional relaying. NetCod 2014: 1-6 - [c13]Shachar Siboni, Asaf Cohen:
Botnet identification via universal anomaly detection. WIFS 2014: 101-106 - [i12]Oron Sabag, Haim H. Permuter, Asaf Cohen:
Lossless Coding of Correlated Sources with Actions. CoRR abs/1404.3997 (2014) - 2013
- [j6]Asaf Cohen, Erez Biton, Dor-Joseph Kampeas, Omer Gurewitz:
Coded unicast downstream traffic in a wireless network: analysis and WiFi implementation. EURASIP J. Adv. Signal Process. 2013: 25 (2013) - [j5]Asaf Cohen, Shlomi Dolev, Nir Tzachar:
Efficient and Universal Corruption Resilient Fountain Codes. IEEE Trans. Commun. 61(10): 4058-4066 (2013) - [j4]Dima Bykhovsky, Asaf Cohen:
Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic Model. IEEE Trans. Inf. Forensics Secur. 8(5): 744-753 (2013) - [c12]Alejandro Cohen, Asaf Cohen:
Wiretap channel with causal state information and secure rate-limited feedback. Allerton 2013: 240-247 - [c11]Oron Sabag, Asaf Cohen, Haim H. Permuter:
Correlated sources with actions. Allerton 2013: 869-874 - [c10]Eliahu Cohen, Maya Carmi, Ron Heiman, Ofer Hadar, Asaf Cohen:
Image restoration via ising theory and automatic noise estimation. BMSB 2013: 1-5 - [c9]Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
MAC capacity under distributed scheduling of multiple users and linear decorrelation. ITW 2013: 1-5 - [i11]Dor-Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
MAC Capacity Under Distributed Scheduling of Multiple Users and Linear Decorrelation. CoRR abs/1304.7480 (2013) - [i10]Alejandro Cohen, Asaf Cohen:
Wiretap Channel With Causal State Information and Secure Rate-Limited Feedback. CoRR abs/1308.6736 (2013) - [i9]Chen Avin, Asaf Cohen, Yoram Haddad, Erez Kantor, Zvi Lotker, Merav Parter, David Peleg:
SINR Diagram with Interference Cancellation. CoRR abs/1309.3193 (2013) - 2012
- [c8]Dor-Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Capacity of distributed opportunistic scheduling in heterogeneous networks. Allerton Conference 2012: 1246-1253 - [c7]Bernhard Haeupler, Asaf Cohen, Chen Avin, Muriel Médard:
Network coded gossip with correlated data. ISIT 2012: 2616-2620 - [c6]Chen Avin, Asaf Cohen, Yoram Haddad, Erez Kantor, Zvi Lotker, Merav Parter, David Peleg:
SINR diagram with interference cancellation. SODA 2012: 502-515 - [i8]Asaf Cohen, Shlomi Dolev, Guy Leshem:
Sensor Networks: from Dependence Analysis Via Matroid Bases to Online Synthesis. CoRR abs/1201.4054 (2012) - [i7]Dor-Joseph Kampeas, Asaf Cohen, Omer Gurewitz:
Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity. CoRR abs/1202.0119 (2012) - [i6]Bernhard Haeupler, Asaf Cohen, Chen Avin, Muriel Médard:
Network Coded Gossip with Correlated Data. CoRR abs/1202.1801 (2012) - [i5]Erez Biton, Asaf Cohen, Guy Reina, Omer Gurewitz:
Distributed Inter-Cell Interference Mitigation Via Joint Scheduling and Power Control Under Noise Rise Constraints. CoRR abs/1207.4498 (2012) - 2011
- [c5]Asaf Cohen, Shlomi Dolev, Guy Leshem:
Sensor Fusion: From Dependence Analysis via Matroid Bases to Online Synthesis. ALGOSENSORS 2011: 42-56 - [c4]Chen Avin, Michael Borokhovich, Asaf Cohen, Zvi Lotker:
Efficient distributed source coding for multiple receivers via matrix sparsification. ISIT 2011: 2045-2049 - [i4]Chen Avin, Michael Borokhovich, Asaf Cohen, Zvi Lotker:
Efficient Joint Network-Source Coding for Multiple Terminals with Side Information. CoRR abs/1111.5735 (2011) - [i3]Asaf Cohen, Shlomi Dolev, Nir Tzachar:
Efficient and Universal Corruption Resilient Fountain Codes. CoRR abs/1111.6244 (2011)
2000 – 2009
- 2009
- [c3]Asaf Cohen, Amir Salman Avestimehr, Michelle Effros:
On networks with side information. ISIT 2009: 1343-1347 - 2008
- [j3]Asaf Cohen, Tsachy Weissman, Neri Merhav:
Scanning and Sequential Decision Making for Multidimensional Data - Part II: The Noisy Case. IEEE Trans. Inf. Theory 54(12): 5609-5631 (2008) - 2007
- [j2]Asaf Cohen, Neri Merhav, Tsachy Weissman:
Scanning and Sequential Decision Making for Multidimensional Data-Part I: The Noiseless Case. IEEE Trans. Inf. Theory 53(9): 3001-3020 (2007) - [c2]Asaf Cohen, Neri Merhav, Tsachy Weissman:
Scanning, Filtering and Prediction for Random Fields Corrupted by Gaussian Noise. ISIT 2007: 691-695 - [i2]Asaf Cohen, Tsachy Weissman, Neri Merhav:
Scanning and Sequential Decision Making for Multi-Dimensional Data - Part II: the Noisy Case. CoRR abs/0705.2854 (2007) - 2006
- [c1]Asaf Cohen, Neri Merhav, Tsachy Weissman:
Universal Scanning and Sequential Decision Making for Multidimensional Data. ISIT 2006: 431-435 - [i1]Asaf Cohen, Neri Merhav, Tsachy Weissman:
Scanning and Sequential Decision Making for Multi-Dimensional Data - Part I: the Noiseless Case. CoRR abs/cs/0609049 (2006) - 2004
- [j1]Asaf Cohen, Neri Merhav:
Lower bounds on the error probability of block codes based on improvements on de Caen's inequality. IEEE Trans. Inf. Theory 50(2): 290-310 (2004)
Coauthor Index
aka: Joseph Kampeas
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint