BibTeX records: András Méhes

download as .bib file

@inproceedings{DBLP:conf/noms/NybergJM22,
  author       = {Jakob Nyberg and
                  Pontus Johnson and
                  Andr{\'{a}}s M{\'{e}}hes},
  title        = {Cyber threat response using reinforcement learning in graph-based
                  attack simulations},
  booktitle    = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2022, Budapest, Hungary, April 25-29, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/NOMS54207.2022.9789835},
  doi          = {10.1109/NOMS54207.2022.9789835},
  timestamp    = {Wed, 15 Jun 2022 16:45:18 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/NybergJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/BarrosISCMN15,
  author       = {Bruno M. Barros and
                  Leonardo H. Iwaya and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Tereza Cristina M. B. Carvalho and
                  Andr{\'{a}}s M{\'{e}}hes and
                  Mats N{\"{a}}slund},
  editor       = {Markus Helfert and
                  Donald Ferguson and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz},
  title        = {Classifying Security Threats in Cloud Networking},
  booktitle    = {{CLOSER} 2015 - Proceedings of the 5th International Conference on
                  Cloud Computing and Services Science, Lisbon, Portugal, 20-22 May,
                  2015},
  pages        = {214--220},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005489402140220},
  doi          = {10.5220/0005489402140220},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/BarrosISCMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/MitchellOZVLMJ12,
  author       = {James Mitchell and
                  Eamonn O'Neill and
                  Gjergji Zyba and
                  Geoffrey M. Voelker and
                  Michael Liljenstam and
                  Andr{\'{a}}s M{\'{e}}hes and
                  Per Johansson},
  editor       = {K. K. Ramakrishnan and
                  Rajeev Shorey and
                  Donald F. Towsley},
  title        = {Limitations of scanned human copresence encounters for modelling proximity-borne
                  malware},
  booktitle    = {Fourth International Conference on Communication Systems and Networks,
                  {COMSNETS} 2012, Bangalore, India, January 3-7, 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/COMSNETS.2012.6151306},
  doi          = {10.1109/COMSNETS.2012.6151306},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/MitchellOZVLMJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZybaVLMJ09,
  author       = {Gjergji Zyba and
                  Geoffrey M. Voelker and
                  Michael Liljenstam and
                  Andr{\'{a}}s M{\'{e}}hes and
                  Per Johansson},
  title        = {Defending Mobile Phones from Proximity Malware},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {1503--1511},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062067},
  doi          = {10.1109/INFCOM.2009.5062067},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZybaVLMJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MehesZ00,
  author       = {Andr{\'{a}}s M{\'{e}}hes and
                  Kenneth Zeger},
  title        = {Source and channel rate allocation for channel codes satisfying the
                  Gilbert-Varshamov or Tsfasman-Vladut-Zink bounds},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {6},
  pages        = {2133--2151},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.868483},
  doi          = {10.1109/18.868483},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MehesZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MehesZ00a,
  author       = {Andr{\'{a}}s M{\'{e}}hes and
                  Kenneth Zeger},
  title        = {Performance of quantizers on noisy channels using structured families
                  of codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {7},
  pages        = {2468--2476},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.887858},
  doi          = {10.1109/18.887858},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MehesZ00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MehesZ99,
  author       = {Andr{\'{a}}s M{\'{e}}hes and
                  Kenneth Zeger},
  title        = {Randomly Chosen Index Assignments Are Asymptotically Bad for Uniform
                  Sources},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {45},
  number       = {2},
  pages        = {788--794},
  year         = {1999},
  url          = {https://doi.org/10.1109/18.749030},
  doi          = {10.1109/18.749030},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MehesZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dcc/MehesZ99,
  author       = {Andr{\'{a}}s M{\'{e}}hes and
                  Kenneth Zeger},
  title        = {Performance of Quantizers on Noisy Channels Using Structured Families
                  of Codes},
  booktitle    = {Data Compression Conference, {DCC} 1999, Snowbird, Utah, USA, March
                  29-31, 1999},
  pages        = {473--482},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/DCC.1999.755697},
  doi          = {10.1109/DCC.1999.755697},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dcc/MehesZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Mehes98,
  author       = {Andr{\'{a}}s M{\'{e}}hes},
  title        = {Quantization for Noisy Channels Using Structured Codes},
  school       = {University of Illinois Urbana-Champaign, {USA}},
  year         = {1998},
  url          = {https://hdl.handle.net/2142/81269},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Mehes98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MehesZ98,
  author       = {Andr{\'{a}}s M{\'{e}}hes and
                  Kenneth Zeger},
  title        = {Binary Lattice Vector Quantization with Linear Block Codes and Affine
                  Index Assignments},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {1},
  pages        = {79--94},
  year         = {1998},
  url          = {https://doi.org/10.1109/18.650990},
  doi          = {10.1109/18.650990},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MehesZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics