Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: András Méhes
@inproceedings{DBLP:conf/noms/NybergJM22, author = {Jakob Nyberg and Pontus Johnson and Andr{\'{a}}s M{\'{e}}hes}, title = {Cyber threat response using reinforcement learning in graph-based attack simulations}, booktitle = {2022 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2022, Budapest, Hungary, April 25-29, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NOMS54207.2022.9789835}, doi = {10.1109/NOMS54207.2022.9789835}, timestamp = {Wed, 15 Jun 2022 16:45:18 +0200}, biburl = {https://dblp.org/rec/conf/noms/NybergJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/BarrosISCMN15, author = {Bruno M. Barros and Leonardo H. Iwaya and Marcos A. Simpl{\'{\i}}cio Jr. and Tereza Cristina M. B. Carvalho and Andr{\'{a}}s M{\'{e}}hes and Mats N{\"{a}}slund}, editor = {Markus Helfert and Donald Ferguson and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz}, title = {Classifying Security Threats in Cloud Networking}, booktitle = {{CLOSER} 2015 - Proceedings of the 5th International Conference on Cloud Computing and Services Science, Lisbon, Portugal, 20-22 May, 2015}, pages = {214--220}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005489402140220}, doi = {10.5220/0005489402140220}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/BarrosISCMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/MitchellOZVLMJ12, author = {James Mitchell and Eamonn O'Neill and Gjergji Zyba and Geoffrey M. Voelker and Michael Liljenstam and Andr{\'{a}}s M{\'{e}}hes and Per Johansson}, editor = {K. K. Ramakrishnan and Rajeev Shorey and Donald F. Towsley}, title = {Limitations of scanned human copresence encounters for modelling proximity-borne malware}, booktitle = {Fourth International Conference on Communication Systems and Networks, {COMSNETS} 2012, Bangalore, India, January 3-7, 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/COMSNETS.2012.6151306}, doi = {10.1109/COMSNETS.2012.6151306}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/MitchellOZVLMJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZybaVLMJ09, author = {Gjergji Zyba and Geoffrey M. Voelker and Michael Liljenstam and Andr{\'{a}}s M{\'{e}}hes and Per Johansson}, title = {Defending Mobile Phones from Proximity Malware}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {1503--1511}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062067}, doi = {10.1109/INFCOM.2009.5062067}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZybaVLMJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MehesZ00, author = {Andr{\'{a}}s M{\'{e}}hes and Kenneth Zeger}, title = {Source and channel rate allocation for channel codes satisfying the Gilbert-Varshamov or Tsfasman-Vladut-Zink bounds}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {6}, pages = {2133--2151}, year = {2000}, url = {https://doi.org/10.1109/18.868483}, doi = {10.1109/18.868483}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MehesZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MehesZ00a, author = {Andr{\'{a}}s M{\'{e}}hes and Kenneth Zeger}, title = {Performance of quantizers on noisy channels using structured families of codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {7}, pages = {2468--2476}, year = {2000}, url = {https://doi.org/10.1109/18.887858}, doi = {10.1109/18.887858}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MehesZ00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MehesZ99, author = {Andr{\'{a}}s M{\'{e}}hes and Kenneth Zeger}, title = {Randomly Chosen Index Assignments Are Asymptotically Bad for Uniform Sources}, journal = {{IEEE} Trans. Inf. Theory}, volume = {45}, number = {2}, pages = {788--794}, year = {1999}, url = {https://doi.org/10.1109/18.749030}, doi = {10.1109/18.749030}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MehesZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/MehesZ99, author = {Andr{\'{a}}s M{\'{e}}hes and Kenneth Zeger}, title = {Performance of Quantizers on Noisy Channels Using Structured Families of Codes}, booktitle = {Data Compression Conference, {DCC} 1999, Snowbird, Utah, USA, March 29-31, 1999}, pages = {473--482}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/DCC.1999.755697}, doi = {10.1109/DCC.1999.755697}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dcc/MehesZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Mehes98, author = {Andr{\'{a}}s M{\'{e}}hes}, title = {Quantization for Noisy Channels Using Structured Codes}, school = {University of Illinois Urbana-Champaign, {USA}}, year = {1998}, url = {https://hdl.handle.net/2142/81269}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Mehes98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MehesZ98, author = {Andr{\'{a}}s M{\'{e}}hes and Kenneth Zeger}, title = {Binary Lattice Vector Quantization with Linear Block Codes and Affine Index Assignments}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {1}, pages = {79--94}, year = {1998}, url = {https://doi.org/10.1109/18.650990}, doi = {10.1109/18.650990}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MehesZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.