The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiang He: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiang He, SiYa Wang, Wenjun Zhang, Xiaoyin Gan
    Ordered Statistics Based Rate Allocation Scheme for Closed Loop MIMO-OFDM System. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2005, pp:389-395 [Conf]
  2. Andrew K. C. Wong, Peiyi Niu, Xiang He
    Fast acquisition of dense depth data by a new structured light scheme. [Citation Graph (0, 0)][DBLP]
    Computer Vision and Image Understanding, 2005, v:98, n:3, pp:398-422 [Journal]
  3. Stanley Y. W. Su, Sanjay Ranka, Xiang He
    Performance Analysis of Parallel Query Processing Algorithms for Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:979-997 [Journal]

  4. Joint Power Scheduling and Estimator Design for Sensor Networks Across Parallel Channels. [Citation Graph (, )][DBLP]


  5. Efficient Fast Algorithm for MQ Arithmetic Coder. [Citation Graph (, )][DBLP]


  6. On the energy-delay trade-off of a two-way relay network. [Citation Graph (, )][DBLP]


  7. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming. [Citation Graph (, )][DBLP]


  8. Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling. [Citation Graph (, )][DBLP]


  9. A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform. [Citation Graph (, )][DBLP]


  10. Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling [Citation Graph (, )][DBLP]


  11. The Gaussian Many-to-One Interference Channel with Confidential Messages [Citation Graph (, )][DBLP]


  12. K-user Interference Channels: Achievable Secrecy Rate and Degrees of Freedom [Citation Graph (, )][DBLP]


  13. Providing Secrecy with Lattice Codes [Citation Graph (, )][DBLP]


  14. Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels [Citation Graph (, )][DBLP]


  15. Cooperation with an Untrusted Relay: A Secrecy Perspective [Citation Graph (, )][DBLP]


  16. Interference Channels with Strong Secrecy [Citation Graph (, )][DBLP]


  17. Two-hop Secure Communication Using an Untrusted Relay [Citation Graph (, )][DBLP]


  18. The Role of Feedback in Two-way Secure Communications [Citation Graph (, )][DBLP]


  19. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay [Citation Graph (, )][DBLP]


  20. The Gaussian Many-to-1 Interference Channel with Confidential Messages [Citation Graph (, )][DBLP]


  21. MIMO Wiretap Channels with Arbitrarily Varying Eavesdropper Channel States [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002