The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hesham El Gamal: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hesham El Gamal, Bassel F. Beidas, Stan Kay
    Turbo Decoding for High Spectral Efficiency Satellite Communications. [Citation Graph (0, 0)][DBLP]
    ICC (1), 2000, pp:440-445 [Conf]
  2. Praveen Kumar Gopala, Hesham El Gamal
    On the scaling laws of Multi-modal Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  3. Praveen Kumar Gopala, Hesham El Gamal
    On the scaling laws of dense wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:318-319 [Conf]
  4. Marie-Hélène Bourles-Hamon, Hesham El Gamal
    On the design of adaptive space-time codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2004, v:52, n:10, pp:1670-1674 [Journal]
  5. Kambiz Azarian, Hesham El Gamal, Philip Schniter
    On the achievable diversity-multiplexing tradeoff in half-duplex cooperative channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:12, pp:4152-4172 [Journal]
  6. Mohamed Oussama Damen, Hesham El Gamal, Norman C. Beaulieu
    Linear threaded algebraic space-time constellations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:10, pp:2372-2388 [Journal]
  7. Mohamed Oussama Damen, Hesham El Gamal, Norman C. Beaulieu
    Systematic construction of full diversity algebraic constellations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:12, pp:3344-3349 [Journal]
  8. Mohamed Oussama Damen, Hesham El Gamal, Giuseppe Caire
    On maximum-likelihood detection and the search for the closest lattice point. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:10, pp:2389-2402 [Journal]
  9. Hesham El Gamal
    On the scaling laws of dense wireless sensor networks: the data gathering channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1229-1234 [Journal]
  10. Hesham El Gamal, Defne Aktas, Mohamed Oussama Damen
    Noncoherent space-time coding: An algebraic perspective. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:7, pp:2380-2390 [Journal]
  11. Hesham El Gamal, Giuseppe Caire, Mohamed Oussama Damen
    Lattice Coding and Decoding Achieve the Optimal Diversity-Multiplexing Tradeoff of MIMO Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:6, pp:968-985 [Journal]
  12. Hesham El Gamal, Mohamed Oussama Damen
    Universal space-time coding. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:1097-1119 [Journal]
  13. Hesham El Gamal, A. Roger Hammons Jr.
    Analyzing the turbo decoder using the Gaussian approximation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:2, pp:671-686 [Journal]
  14. Hesham El Gamal, A. Roger Hammons Jr.
    A new approach to layered space-Time coding and signal processing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:6, pp:2321-2334 [Journal]
  15. Hesham El Gamal, A. Roger Hammons Jr.
    On the design of algebraic space-time codes for MIMO block-fading channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:1, pp:151-163 [Journal]
  16. Hesham El Gamal, A. Roger Hammons Jr., Youjian Liu, Michael P. Fitz, Oscar Y. Takeshita
    On the design of space-time and space-frequency codes for MIMO frequency-selective fading channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:9, pp:2277-2292 [Journal]
  17. A. Roger Hammons Jr., Hesham El Gamal
    On the theory of space-time codes for PSK modulation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:524-542 [Journal]
  18. Lifeng Lai, Ke Liu, Hesham El Gamal
    The three-node wireless network: achievable rates and Cooperation strategies. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:3, pp:805-828 [Journal]
  19. A. D. Murugan, Hesham El Gamal, Mohamed Oussama Damen, Giuseppe Caire
    A unified framework for tree search decoding: rediscovering the sequential decoder. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:3, pp:933-953 [Journal]
  20. Mohamed Oussama Damen, Hesham El Gamal, Norman C. Beaulieu
    A New Representation of TAST Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:9, pp:4248-4251 [Journal]
  21. Hesham El Gamal, Giuseppe Caire, Mohamed Oussama Damen
    The MIMO ARQ Channel: Diversity-Multiplexing-Delay Tradeoff. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:8, pp:3601-3621 [Journal]
  22. Kambiz Azarian, Hesham El Gamal
    The Throughput-Reliability Tradeoff in Block-Fading MIMO Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:2, pp:488-501 [Journal]
  23. Young-Han Nam, Praveen Kumar Gopala, Hesham El Gamal
    Resolving Collisions Via Incremental Redundancy: ARQ Diversity. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:285-293 [Conf]
  24. Lifeng Lai, Hesham El Gamal
    On Cooperation in Energy Limited Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:508-516 [Conf]
  25. Lifeng Lai, Hesham El Gamal, H. Vincent Poor
    The Wiretap Channel with Feedback: Encryption over the Channel [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  26. Lifeng Lai, Hesham El Gamal
    The Relay-Eavesdropper Channel: Cooperation for Secrecy [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  27. Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal
    On the Secrecy Capacity of Fading Channels [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  28. Young-Han Nam, Praveen Kumar Gopala, Hesham El Gamal
    ARQ Diversity in Fading Random Access Channels [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  29. Praveen Kumar Gopala, Young-Han Nam, Hesham El Gamal
    On the Error Exponents of ARQ Channels with Deadlines [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  30. Kambiz Azarian, Hesham El Gamal, Philip Schniter
    On the Optimality of the ARQ-DDF Protocol [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  31. Arul Murugan, Kambiz Azarian, Hesham El Gamal
    Cooperative Lattice Coding and Decoding [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  32. Lifeng Lai, Hesham El Gamal, H. Vincent Poor
    Secrecy Capacity of the Wiretap Channel with Noisy Feedback [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  33. Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent Poor
    Cognitive Medium Access: Exploration, Exploitation and Competition [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  34. Shih-Chun Lin, Mohammad Shahmohammadi, Hesham El Gamal
    Fingerprinting with Minimum Distance Decoding [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  35. ARQ-Based Secret Key Sharing. [Citation Graph (, )][DBLP]


  36. Blind Cognitive MAC Protocols. [Citation Graph (, )][DBLP]


  37. Joint Power and Secret Key Queue Management for Delay Limited Secure Communication. [Citation Graph (, )][DBLP]


  38. Randomization for Security in Half-Duplex Two-Way Gaussian Channels. [Citation Graph (, )][DBLP]


  39. On the secrecy rate region for the interference channel. [Citation Graph (, )][DBLP]


  40. Optimal medium access control in cognitive radios: A sequential design approach. [Citation Graph (, )][DBLP]


  41. On the Achievable Diversity-Multiplexing Tradeoffs in Half-Duplex Cooperative Channels [Citation Graph (, )][DBLP]


  42. On the Throughput-Delay Tradeoff in Cellular Multicast [Citation Graph (, )][DBLP]


  43. A Unified Framework for Tree Search Decoding : Rediscovering the Sequential Decoder [Citation Graph (, )][DBLP]


  44. The Three Node Wireless Network: Achievable Rates and Cooperation Strategies [Citation Graph (, )][DBLP]


  45. The Throughput-Reliability Tradeoff in MIMO Channels [Citation Graph (, )][DBLP]


  46. The Water-Filling Game in Fading Multiple Access Channels [Citation Graph (, )][DBLP]


  47. Optimal Medium Access Control in Cognitive Radios: A Sequential Design Approach [Citation Graph (, )][DBLP]


  48. Authentication over Noisy Channels [Citation Graph (, )][DBLP]


  49. Optimal Medium Access Protocols for Cognitive Radio Networks [Citation Graph (, )][DBLP]


  50. On the Secure Degrees of Freedom in the K-User Gaussian Interference Channel [Citation Graph (, )][DBLP]


  51. Interference Alignment for Secrecy [Citation Graph (, )][DBLP]


  52. ARQ-Based Secret Key Sharing [Citation Graph (, )][DBLP]


  53. Blind Cognitive MAC Protocols [Citation Graph (, )][DBLP]


  54. On Power Control and Frequency Reuse in the Two User Cognitive Channel [Citation Graph (, )][DBLP]


  55. The MIMO Wireless Switch: Relaying Can Increase the Multiplexing Gain [Citation Graph (, )][DBLP]


  56. On the Delay Limited Secrecy Capacity of Fading Channels [Citation Graph (, )][DBLP]


  57. On the Secrecy Rate Region for the Interference Channel [Citation Graph (, )][DBLP]


  58. Cooperative Binning and Channel Prefixing for Secrecy in Interference Channels [Citation Graph (, )][DBLP]


  59. Opportunistic Secrecy with a Strict Delay Constraint [Citation Graph (, )][DBLP]


  60. Cognitive MAC Protocols for General Primary Network Models [Citation Graph (, )][DBLP]


  61. Keys through ARQ [Citation Graph (, )][DBLP]


  62. On Secrecy Capacity Scaling in Wireless Networks [Citation Graph (, )][DBLP]


  63. ARQ Secrecy: From Theory to Practice [Citation Graph (, )][DBLP]


  64. Randomization for Security in Half-Duplex Two-Way Gaussian Channels [Citation Graph (, )][DBLP]


  65. A New Class of TAST Codes With A Simplified Tree Structure [Citation Graph (, )][DBLP]


  66. Polar Coding for Secure Transmission and Key Agreement [Citation Graph (, )][DBLP]


  67. Keys through ARQ: Theory and Practice [Citation Graph (, )][DBLP]


  68. The Two Way Wiretap Channel: Theory and Practice [Citation Graph (, )][DBLP]


Search in 0.043secs, Finished in 0.046secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002