Search the dblp DataBase
Xiao Ma :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
João W. Cangussu , Kendra Cooper , W. Eric Wong , Xiao Ma A Run-Time Adaptable Persistency Service using the SMART Framework. [Citation Graph (0, 0)][DBLP ] HICSS, 2005, pp:- [Conf ] W. Eric Wong , Yu Lei , Xiao Ma Effective Generation of Test Sequences for Structural Testing of Concurrent Programs. [Citation Graph (0, 0)][DBLP ] ICECCS, 2005, pp:539-548 [Conf ] J. Jenny Li , W. Eric Wong , Xiao Ma , David M. Weiss A Constraint Solver for Code-based Test Data Generation. [Citation Graph (0, 0)][DBLP ] SEKE, 2005, pp:300-305 [Conf ] Aleksandar Kavcic , Xiao Ma , Michael Mitzenmacher Binary intersymbol interference channels: Gallager codes, density evolution, and code performance bounds. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:7, pp:1636-1652 [Journal ] Aleksandar Kavcic , Xiao Ma , Nedeljko Varnica Matched information rate codes for Partial response channels. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:973-989 [Journal ] Xiao Ma , Aleksandar Kavcic Path partitions and forward-only trellis algorithms. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:1, pp:38-52 [Journal ] Xiao Ma , Li Ping Coded modulation using superimposed binary codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:50, n:12, pp:3331-3343 [Journal ] Xiao Ma , Xin-mei Wang On the minimal interpolation problem and decoding RS codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1573-1580 [Journal ] Xiao Ma , Xiao-Yi Zhang Correction to "Entropy bounds for constrained two-dimensional random fields". [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:7, pp:2763- [Journal ] Shan Lu , Soyeon Park , Chongfeng Hu , Xiao Ma , Weihang Jiang , Zhenmin Li , Raluca A. Popa , Yuanyuan Zhou MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:103-116 [Conf ] Design of q-ary Irregular Repeat-Accumulate Codes. [Citation Graph (, )][DBLP ] Semantic industrial categorisation based on Search Engine Index. [Citation Graph (, )][DBLP ] CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining. [Citation Graph (, )][DBLP ] Prioritized Constraints with Data Sampling Scores for Automatic Test Data Generation. [Citation Graph (, )][DBLP ] AutoISES: Automatically Inferring Security Specification and Detecting Violations. [Citation Graph (, )][DBLP ] Optimal estimation over unreliable communication links with application to cognitive radio. [Citation Graph (, )][DBLP ] Interference Avoidance Game in the Gaussian Interference Channel: Sub-Optimal and Optimal Schemes [Citation Graph (, )][DBLP ] Using Distributed Rate-Splitting Game to Approach Rate Region Boundary of the Gaussian Interference Channel [Citation Graph (, )][DBLP ] Upper Bounds on the Capacities of Non-Controllable Finite-State Channels with/without Feedback [Citation Graph (, )][DBLP ] A Low-Complexity Joint Detection-Decoding Algorithm for Nonbinary LDPC-Coded Modulation Systems [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs