default search action
Mireille Sarkiss
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Strong Converses Using Typical Changes of Measures and Asymptotic Markov Chains. IEEE Trans. Inf. Theory 70(3): 1720-1737 (2024) - [c42]Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Covert Multi-Access Communication with a Non-Covert User. ICC 2024: 1473-1478 - [c41]Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Covert Distributed Detection over Discrete Memoryless Channels. ISIT 2024: 172-177 - [i16]Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Covert Multi-Access Communication with a Non-Covert User. CoRR abs/2404.14056 (2024) - [i15]Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Unveiling Covert Semantics: Joint Source-Channel Coding Under a Covertness Constraint. CoRR abs/2406.13466 (2024) - [i14]Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Whispering Secrets in a Crowd: Leveraging Non-Covert Users for Covert Communications. CoRR abs/2408.12962 (2024) - 2023
- [j6]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Multi-Hop Network With Multiple Decision Centers Under Expected-Rate Constraints. IEEE Trans. Inf. Theory 69(7): 4255-4283 (2023) - [c40]Hamdi Friji, Alexis Olivereau, Mireille Sarkiss:
Efficient Network Representation for GNN-Based Intrusion Detection. ACNS (1) 2023: 532-554 - [c39]Ibrahim Djemai, Mireille Sarkiss, Philippe Ciblat:
NOMA-Based Scheduling and Offloading for Energy Harvesting Devices Using Reinforcement Learning. ACSSC 2023: 215-219 - [c38]Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Mixing a Covert and a Non-Covert User. ISIT 2023: 2577-2582 - [c37]Sara Faour, Mustapha Hamad, Mireille Sarkiss, Michèle A. Wigger:
Testing Against Independence with an Eavesdropper. ITW 2023: 277-282 - [c36]Ibrahim Djemai, Mireille Sarkiss, Philippe Ciblat:
Joint Scheduling-Offloading policies in NOMA-based Mobile Edge Computing Systems. WCNC 2023: 1-6 - [i13]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Strong Converses using Typical Changes of Measures and Asymptotic Markov Chains. CoRR abs/2301.06289 (2023) - [i12]Abdelaziz Bounhar, Mireille Sarkiss, Michèle A. Wigger:
Mixing a Covert and a Non-Covert User. CoRR abs/2305.06268 (2023) - [i11]Hamdi Friji, Alexis Olivereau, Mireille Sarkiss:
Efficient Network Representation for GNN-based Intrusion Detection. CoRR abs/2310.05956 (2023) - 2022
- [c35]Mustapha Hamad, Mireille Sarkiss, Michèle A. Wigger:
Benefits of Rate-Sharing for Distributed Hypothesis Testing. ISIT 2022: 2714-2719 - [c34]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Strong Converses using Change of Measure and Asymptotic Markov Chains. ITW 2022: 535-540 - [i10]Mustapha Hamad, Mireille Sarkiss, Michèle A. Wigger:
Benefits of Rate-Sharing for Distributed Hypothesis Testing. CoRR abs/2202.02282 (2022) - [i9]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Strong Converses using Change of Measure and Asymptotic Markov Chains. CoRR abs/2205.08910 (2022) - [i8]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Multi-Hop Network with Multiple Decision Centers under Expected-Rate Constraints. CoRR abs/2208.14243 (2022) - [i7]Sara Faour, Mustapha Hamad, Mireille Sarkiss, Michèle A. Wigger:
Testing Against Independence with an Eavesdropper. CoRR abs/2211.03475 (2022) - 2021
- [c33]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Two-Hop Network with Multiple Decision Centers under Expected-Rate Constraints. GLOBECOM 2021: 1-6 - [c32]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Optimal Exponents in Cascaded Hypothesis Testing under Expected Rate Constraints. ITW 2021: 1-6 - [i6]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Two-Hop Network with Multiple Decision Centers under Expected-Rate Constraints. CoRR abs/2105.05917 (2021) - [i5]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Optimal Exponents In Cascaded Hypothesis Testing under Expected Rate Constraints. CoRR abs/2106.12299 (2021) - 2020
- [c31]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Cooperative Multi-Sensor Detection under Variable-Length Coding. ITW 2020: 1-5 - [c30]Ibrahim Fawaz, Mireille Sarkiss, Philippe Ciblat:
Packet Scheduling and Computation Offloading for Energy Harvesting Devices without CSIT. VTC Spring 2020: 1-5 - [i4]Mustapha Hamad, Michèle A. Wigger, Mireille Sarkiss:
Cooperative Multi-Sensor Detection under Variable-Length Coding. CoRR abs/2010.09616 (2020)
2010 – 2019
- 2019
- [j5]Ibrahim Fawaz, Mireille Sarkiss, Philippe Ciblat:
Delay-Optimal Resource Scheduling of Energy Harvesting-Based Devices. IEEE Trans. Green Commun. Netw. 3(4): 1023-1034 (2019) - [j4]Sarah Kamel, Mireille Sarkiss, Michèle A. Wigger, Ghaya Rekaya-Ben Othman:
Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels. IEEE Trans. Inf. Theory 65(8): 5094-5124 (2019) - [c29]Mireille Sarkiss, Michèle A. Wigger:
Multi-library Coded Caching with Partial Secrecy. ITW 2019: 1-5 - 2018
- [c28]Sarah Kamel, Michèle A. Wigger, Mireille Sarkiss:
Decentralized Coded Caching for Wiretap Broadcast Channels. GLOBECOM 2018: 1-6 - [c27]Ibrahim Fawaz, Mireille Sarkiss, Philippe Ciblat:
Optimal Resource Scheduling for Energy Harvesting Communications under Strict Delay Constraint. ICC 2018: 1-6 - [c26]Ibrahim Fawaz, Mireille Sarkiss, Philippe Ciblat:
Joint Resource Scheduling and Computation Offloading for Energy Harvesting Communications. ICT 2018: 571-576 - [c25]Sarah Kamel, Mireille Sarkiss, Michèle A. Wigger:
Decentralized joint cache-channel coding over erasure broadcast channels. MENACOMM 2018: 1-6 - [i3]Sarah Kamel, Mireille Sarkiss, Michèle Angela Wigger, Ghaya Rekaya-Ben Othman:
Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels. CoRR abs/1801.00606 (2018) - 2017
- [c24]Ibrahim Fawaz, Philippe Ciblat, Mireille Sarkiss:
Energy minimization based resource scheduling for strict delay constrained wireless communications. GlobalSIP 2017: 264-268 - [c23]Sarah Kamel, Mireille Sarkiss, Michèle A. Wigger:
Achieving joint secrecy with cache-channel coding over erasure broadcast channels. ICC 2017: 1-6 - [c22]Sarah Kamel, Michèle A. Wigger, Mireille Sarkiss:
Coded caching for wiretap broadcast channels. ITW 2017: 11-15 - [c21]Sarah Kamel, Mireille Sarkiss, Michèle A. Wigger:
Secure Joint Cache-Channel Coding over Erasure Broadcast Channels. WCNC 2017: 1-6 - 2016
- [c20]Sarah Kamel, Mireille Sarkiss, Ghaya Rekaya-Ben Othman:
Improving GGH cryptosystem using generalized low density lattices. ACOSIS 2016: 1-6 - [c19]Sarah Kamel, Mireille Sarkiss, Ghaya Rekaya-Ben Othman:
Generalized low density lattices for GGH cryptosystem. ICFSP 2016: 25-31 - [c18]Fanny Jardel, Joseph Jean Boutros, Mireille Sarkiss:
Stopping sets for MDS-based product codes. ISIT 2016: 1740-1744 - 2015
- [c17]Fanny Jardel, Joseph Jean Boutros, Volkan Dedeoglu, Mireille Sarkiss, Ghaya Rekaya-Ben Othman:
Spatial coupling for distributed storage and diversity applications. COMNET 2015: 1-5 - [c16]Mohamed Kamoun, Wael Labidi, Mireille Sarkiss:
Joint resource allocation and offloading strategies in cloud enabled cellular networks. ICC 2015: 5529-5534 - [c15]Wael Labidi, Mireille Sarkiss, Mohamed Kamoun:
Energy-optimal resource scheduling and computation offloading in small cell networks. ICT 2015: 313-318 - [c14]Wael Labidi, Mireille Sarkiss, Mohamed Kamoun:
Joint multi-user resource scheduling and computation offloading in small cell networks. WiMob 2015: 794-801 - 2014
- [j3]Mireille Sarkiss, Mohamed Kamoun:
On the energy efficiency of base station cooperation under limited backhaul capacity. Ann. des Télécommunications 69(9-10): 539-551 (2014) - [j2]Sinda Smirani, Mohamed Kamoun, Mireille Sarkiss, Abdellatif Zaidi, Pierre Duhamel:
Achievable Rate Regions for Two-Way Relay Channel Using Nested Lattice Coding. IEEE Trans. Wirel. Commun. 13(10): 5607-5620 (2014) - [c13]Sami Mekki, Mohamed Kamoun, Mireille Sarkiss:
Device-to-device communication for capacity enhancement in cellular networks. WCNC 2014: 496-501 - 2013
- [c12]Sinda Smirani, Mohamed Kamoun, Mireille Sarkiss, Abdellatif Zaidi, Pierre Duhamel:
Finite dimension Wyner-Ziv lattice coding for two-way relay channel. SPAWC 2013: 570-574 - [c11]Sinda Smirani, Mohamed Kamoun, Mireille Sarkiss, Abdellatif Zaidi, Pierre Duhamel:
Lattice-based Wyner-Ziv coding for parallel Gaussian two-way relay channels. WCNC 2013: 2405-2409 - [i2]Sinda Smirani, Mohamed Kamoun, Mireille Sarkiss, Abdellatif Zaidi, Pierre Duhamel:
Achievable Rate Regions for Two-Way Relay Channel using Nested Lattice Coding. CoRR abs/1311.5360 (2013) - 2012
- [c10]Mireille Sarkiss, Mohamed Kamoun:
Energy efficiency analysis of base station cooperation under limited backhaul capacity. COMNET 2012: 1-8 - [c9]Mireille Sarkiss, Mohamed Kamoun:
Delay-tolerant space-time coding and decoding for femto-assisted cellular networks. WCNC 2012: 608-612 - 2011
- [j1]Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Mohamed Oussama Damen, Jean-Claude Belfiore:
Construction of New Delay-Tolerant Space-Time Codes. IEEE Trans. Inf. Theory 57(6): 3567-3581 (2011) - 2010
- [c8]Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Mohamed Oussama Damen, Jean-Claude Belfiore:
Construction of new delay-tolerant Space-Time Codes. PIMRC 2010: 379-384 - [i1]Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Mohamed Oussama Damen, Jean-Claude Belfiore:
Construction of New Delay-Tolerant Space-Time Codes. CoRR abs/1011.0474 (2010)
2000 – 2009
- 2008
- [c7]Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Jean-Claude Belfiore:
4 × 4 Perfect space-time code partition. ACSCC 2008: 1763-1767 - [c6]Mireille Sarkiss, Mohamed Oussama Damen, Jean-Claude Belfiore:
2 × 2 delay-tolerant distributed space-time codes with non-vanishing determinants. PIMRC 2008: 1-5 - [c5]Yi Yuan-Wu, Mireille Sarkiss:
Two low complexity multiuser detectors for uplink MC-CDMA systems. PIMRC 2008: 1-5 - 2007
- [c4]Mireille Sarkiss, Jean-Claude Belfiore, Yi Yuan-Wu:
Performance Comparison of Different Golden Code Detectors. PIMRC 2007: 1-5 - 2006
- [c3]Mireille Sarkiss, Yi Yuan-Wu:
Linear Scalable Dispersion Codes for Downlink MIMO MC-CDMA Systems. PIMRC 2006: 1-5 - [c2]Mireille Sarkiss, Yi Yuan-Wu:
MAP-DFE Detector for Downlink V-BLAST MC-CDMA Systems. VTC Fall 2006: 1-5 - [c1]Yi Yuan-Wu, Mireille Sarkiss, Geoffrey Ye Li:
How to obtain good performance by iterative and diversity techniques for uplink MC-CDMA systems. VTC Spring 2006: 2479-2483
Coauthor Index
aka: Michèle Angela Wigger
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint