Christian Scheunert

According to our database1, Christian Scheunert authored at least 19 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Overview of the NET Playground - A Heterogeneous, Multi-Functional Network Test Bed.
CoRR, 2023

On the Advantages of Hand Gesture Recognition with Data Gloves for Gaming Applications.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

Practical construction of sensing matrices for a greedy sparse recovery algorithm over finite fields.
Proceedings of the Data Compression Conference, 2023

Lightweight Generator of Synthetic IMU Sensor Data for Accurate AHRS Analysis.
Proceedings of the IEEE International Conference on Advanced Robotics and Its Social Impacts, 2023

2018
Improving Robustness for Anisotropic Sparse Recovery using Matrix Extensions.
Proceedings of the 22nd International ITG Workshop on Smart Antennas, 2018

2017
Secure and energy-efficient interconnects for board-to-board communication.
Proceedings of the 17th IEEE International Conference on Ubiquitous Wireless Broadband, 2017

2015
Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward.
IEEE Trans. Inf. Forensics Secur., 2015

On modeling epidemics in networks using linear time-invariant dynamics.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Noise mitigated compressed sensing.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Confidential Network Coding: Physical Layer vs. Network Layer.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

Energy Models for Communication of Future Computing Platforms.
Proceedings of the IEEE International Conference on Ubiquitous Wireless Broadband, 2015

Secrecy in the two-way untrusted relay channel with compute-and-forward.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Weak Secrecy in the Multi-Way Untrusted Relay Channel with Compute-and-Forward.
CoRR, 2014

Analysis of Parallel Applications on a High Performance-Low Energy Computer.
Proceedings of the Euro-Par 2014: Parallel Processing Workshops, 2014

Wiretap-channels with constrained active attacks.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2012
Secrecy Outage in MISO Systems With Partial Channel Information.
IEEE Trans. Inf. Forensics Secur., 2012

An efficient branch-and-bound algorithm for compute-and-forward.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

2011
Transmit beamforming for inter-operator spectrum sharing.
Proceedings of the 2011 Future Network & Mobile Summit, Warsaw, Poland, June 15-17, 2011, 2011

Beamforming for secrecy rate maximization under outage constraints and partial CSI.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011


  Loading...