Sort by
Refine Your Search
-
of wiretap coding in highly directive links and to obtain new bounds for the finite-blocklength secrecy rate under a mutual information secrecy constraint. Context : Physical layer security techniques
-
- evolutionary theories ● Interpretation and formatting of the results obtained (publications) ● Proficiency in programming languages (Bash, Python, R), code management tools and software environments (Gitlab
Searches related to coding theory
Enter an email to receive alerts for coding-theory positions