The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jack K. Wolf: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Asser N. Tantawi, Jack K. Wolf, Donald F. Towsley
    Optimal Allocation of Multiple Class Resources in Computer Systems. [Citation Graph (1, 0)][DBLP]
    SIGMETRICS, 1988, pp:253-260 [Conf]
  2. Kelvin K. Y. Ho, Ramesh R. Rao, Jack K. Wolf
    Random Access Systems with a Time Varying Channel. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1989, pp:1121-1126 [Conf]
  3. Domenick Calabro, Jack K. Wolf
    On the Synthesis of Two-Dimensional Arrays with Desirable Correlation Properties [Citation Graph (0, 0)][DBLP]
    Information and Control, 1967, v:11, n:5/6, pp:537-560 [Journal]
  4. J. Chung-yaw Chiang, Jack K. Wolf
    On Channels and Codes for the Lee Metric [Citation Graph (0, 0)][DBLP]
    Information and Control, 1971, v:19, n:2, pp:159-173 [Journal]
  5. Stanley Wainberg, Jack K. Wolf
    Algebraic Decoding of Block Codes over a q-ary Input, Q-ary Output Channel, Q>q [Citation Graph (0, 0)][DBLP]
    Information and Control, 1973, v:22, n:3, pp:232-247 [Journal]
  6. Jack K. Wolf
    On an Extended Class of Error-Locating Codes [Citation Graph (0, 0)][DBLP]
    Information and Control, 1965, v:8, n:2, pp:163-169 [Journal]
  7. Jack K. Wolf, Aaron D. Wyner, Jacob Ziv
    The Channel Capacity of the Postal Channel [Citation Graph (0, 0)][DBLP]
    Information and Control, 1970, v:16, n:2, pp:167-172 [Journal]
  8. Shivendra S. Panwar, Donald F. Towsley, Jack K. Wolf
    Optimal scheduling policies for a class of queues with customer deadlines to the beginning of service. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1988, v:35, n:4, pp:832-844 [Journal]
  9. Brian H. Marcus, Paul H. Siegel, Jack K. Wolf
    Finite-State Modulation Codes for Data Storage. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1992, v:10, n:1, pp:5-37 [Journal]
  10. Sreenivasa A. Raghavan, Jack K. Wolf, Laurence B. Milstein
    On the Cutoff Rate of a Discrete Memoryless Channel with (d, k)-Constrained Input Sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1992, v:10, n:1, pp:233-241 [Journal]
  11. Jay W. Schwartz, Jack K. Wolf
    A Systematic (12, 8) Code for Correcting Single Errors and Detecting Adjacent Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1990, v:39, n:11, pp:1403-1404 [Journal]
  12. Wenlong Zang, Jack K. Wolf
    Rate 1/2 and 2/3 Majority Logic Decodable Binary Burst Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1987, v:36, n:2, pp:250-252 [Journal]
  13. Shirish A. Altekar, Magnus Berggren, Bruce E. Moision, Paul H. Siegel, Jack K. Wolf
    Error-Event Characterization on Partial-Response Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:1, pp:241-247 [Journal]
  14. Sharon Aviran, Paul H. Siegel, Jack K. Wolf
    An improvement to the bit stuffing algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:8, pp:2885-2891 [Journal]
  15. Paul E. Bender, Jack K. Wolf
    New asymptotic bounds and improvements on the Lempel-Ziv data compression algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:3, pp:721-729 [Journal]
  16. A. Robert Calderbank, Paul H. Siegel, Jack K. Wolf
    Introduction to special issue on coding for storage devices. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:3, pp:709-711 [Journal]
  17. Shih-Chun Chang, Jack K. Wolf
    On the T-user M-frequency noiseless multiple-access channel with and without intensity information. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1981, v:27, n:1, pp:41-48 [Journal]
  18. Ismail Demirkan, Jack K. Wolf
    Block codes for the hard-square model. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:8, pp:2836-2848 [Journal]
  19. Shirley Halevy, Jiangxin Chen, Ron M. Roth, Paul H. Siegel, Jack K. Wolf
    Improved bit-stuffing bounds on two-dimensional constraints. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:5, pp:824-838 [Journal]
  20. Kees A. Schouhamer Immink, Paul H. Siegel, Jack K. Wolf
    Codes for Digital Recorders. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:6, pp:2260-2299 [Journal]
  21. Brian M. Kurkoski, Paul H. Siegel, Jack K. Wolf
    Joint message-passing decoding of LDPC Codes and partial-response channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:6, pp:1410-1422 [Journal]
  22. Brian M. Kurkoski, Paul H. Siegel, Jack K. Wolf
    Joint message-passing decoding of ldpc codes and partial-response channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:8, pp:2076-0 [Journal]
  23. Patrick Lee, Jack K. Wolf
    A general error-correcting code construction for run-length limited binary channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1989, v:35, n:6, pp:1330-0 [Journal]
  24. Howard H. Ma, Jack K. Wolf
    Binary unequal error-protection block codes formed from convolutional codes by generalized tail-biting. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1986, v:32, n:6, pp:776-786 [Journal]
  25. Howard H. Ma, Jack K. Wolf
    Correction to 'Binary unequal error-protection block codes formed from convolutional codes by generalized tail-biting' (Nov 86 776-786). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:2, pp:299-0 [Journal]
  26. R. Padovani, Jack K. Wolf
    Poor error correction codes are poor error detection codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:1, pp:110-0 [Journal]
  27. Shivendra S. Panwar, Donald F. Towsley, Jack K. Wolf
    On the throughput of degenerate intersection and first-come first-served collision resolution algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1985, v:31, n:2, pp:274-279 [Journal]
  28. Thomas K. Philips, Donald F. Towsley, Jack K. Wolf
    On the diameter of a class of random graphs. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:2, pp:285-288 [Journal]
  29. Thomas K. Philips, Donald F. Towsley, Jack K. Wolf
    Correction to 'On the Diameter of a Class of Random Graphs'. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:1, pp:224- [Journal]
  30. Sreenivasa A. Raghavan, Jack K. Wolf, Laurence B. Milstein
    On the performance evaluation of ISI channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:957-965 [Journal]
  31. Ron M. Roth, Paul H. Siegel, Jack K. Wolf
    Efficient coding schemes for the hard-square model. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1166-1176 [Journal]
  32. Anthony D. Weathers, Jack K. Wolf
    A new rate 2/3 sliding block code for the (1, 7) runlength constraint with the minimal number of encoder states. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:3, pp:908-0 [Journal]
  33. Jack K. Wolf
    Born again group testing: Multiaccess communications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1985, v:31, n:2, pp:185-191 [Journal]
  34. Aaron D. Wyner, Jack K. Wolf, Frans M. J. Willems
    Communicating via a processing broadcast satellite. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:6, pp:1243-1249 [Journal]
  35. Ephraim Zehavi, Jack K. Wolf
    On the performance evaluation of trellis codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:2, pp:196-202 [Journal]
  36. Ephraim Zehavi, Jack K. Wolf
    On runlength codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:1, pp:45-54 [Journal]
  37. Wenlong Zhang, Jack K. Wolf
    A class of binary burst error-correcting quasi-cyclic codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:463-479 [Journal]
  38. Jack K. Wolf
    Efficient circuits for multiplying in GF(2m) for certain values of m. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1992, v:106, n:, pp:497-502 [Journal]

  39. Nonlinear Transition Shift and Write Precompensation in Perpendicular Magnetic Recording. [Citation Graph (, )][DBLP]


  40. Characterizing flash memory: anomalies, observations, and applications. [Citation Graph (, )][DBLP]


  41. Gaussian Belief Propagation for Solving Systems of Linear Equations: Theory and Application [Citation Graph (, )][DBLP]


  42. Gaussian Belief Propagation Based Multiuser Detection [Citation Graph (, )][DBLP]


  43. Gaussian Belief Propagation Solver for Systems of Linear Equations [Citation Graph (, )][DBLP]


  44. Multidimensional Flash Codes [Citation Graph (, )][DBLP]


  45. A Nearly Optimal Construction of Flash Codes [Citation Graph (, )][DBLP]


  46. Storage Coding for Wear Leveling in Flash Memories [Citation Graph (, )][DBLP]


Search in 0.060secs, Finished in 0.064secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002