|
Search the dblp DataBase
Xiang He:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xiang He, SiYa Wang, Wenjun Zhang, Xiaoyin Gan
Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System. [Citation Graph (0, 0)][DBLP] WiOpt, 2005, pp:389-395 [Conf]
- Andrew K. C. Wong, Peiyi Niu, Xiang He
Fast acquisition of dense depth data by a new structured light scheme. [Citation Graph (0, 0)][DBLP] Computer Vision and Image Understanding, 2005, v:98, n:3, pp:398-422 [Journal]
- Stanley Y. W. Su, Sanjay Ranka, Xiang He
Performance Analysis of Parallel Query Processing Algorithms for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:979-997 [Journal]
Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels. [Citation Graph (, )][DBLP]
Efficient Fast Algorithm for MQ Arithmetic Coder. [Citation Graph (, )][DBLP]
On the energy-delay trade-off of a two-way relay network. [Citation Graph (, )][DBLP]
Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming. [Citation Graph (, )][DBLP]
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling. [Citation Graph (, )][DBLP]
A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform. [Citation Graph (, )][DBLP]
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling [Citation Graph (, )][DBLP]
The Gaussian Many-to-One Interference Channel with Confidential Messages [Citation Graph (, )][DBLP]
K-user Interference Channels: Achievable Secrecy Rate and Degrees of Freedom [Citation Graph (, )][DBLP]
Providing Secrecy with Lattice Codes [Citation Graph (, )][DBLP]
Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels [Citation Graph (, )][DBLP]
Cooperation with an Untrusted Relay: A Secrecy Perspective [Citation Graph (, )][DBLP]
Interference Channels with Strong Secrecy [Citation Graph (, )][DBLP]
Two-hop Secure Communication Using an Untrusted Relay [Citation Graph (, )][DBLP]
The Role of Feedback in Two-way Secure Communications [Citation Graph (, )][DBLP]
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay [Citation Graph (, )][DBLP]
The Gaussian Many-to-1 Interference Channel with Confidential Messages [Citation Graph (, )][DBLP]
MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|