Searching games with errors---fifty years of coping with liars
Theoretical Computer Science
Binary search with delayed and missing answers
Information Processing Letters
Strategies for the Renyi-Ulam game with fixed number of lies
Theoretical Computer Science
Searching for two counterfeit coins with two-arms balance
Discrete Applied Mathematics
Reliability criteria in information theory and in statistical hypothesis testing
Foundations and Trends in Communications and Information Theory
Generating Stochastic Processes Based on the Finitary Interval Algorithm
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Entropy of the induced transformations associated with the interval algorithm
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Searching for two counterfeit coins with two-arms balance
Discrete Applied Mathematics
Generalized framework for selectors with applications in optimal group testing
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
On logarithmically asymptotically optimal testing of hypotheses and identification
General Theory of Information Transfer and Combinatorics
Search with noisy and delayed responses
General Theory of Information Transfer and Combinatorics
Minimax trees in linear time with applications
European Journal of Combinatorics
Multiple objects: error exponents in hypotheses testing and identification
Information Theory, Combinatorics, and Search Theory
Threshold and majority group testing
Information Theory, Combinatorics, and Search Theory
Randomized post-optimization for t-restrictions
Information Theory, Combinatorics, and Search Theory
Search when the lie depends on the target
Information Theory, Combinatorics, and Search Theory
Group testing problem with two defectives
Problems of Information Transmission
Hi-index | 0.00 |