The SCEAS System
| |||||||

## Search the dblp DataBase
A. J. Han Vinck:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Young Gil Kim, A. J. Han Vinck
**A New Collision Arbitration Algorithm for FM0 Code in RFID Applications.**[Citation Graph (0, 0)][DBLP] MUE, 2007, pp:992-994 [Conf] - Yuan Luo, Wende Chen, A. J. Han Vinck
**The Determination of the Chain Good Weight Hierarchies with High Dimension.**[Citation Graph (0, 0)][DBLP] SIAM J. Discrete Math., 2003, v:17, n:2, pp:196-209 [Journal] - Hendrik C. Ferreira, A. J. Han Vinck, Theo G. Swart, Ian de Beer
**Permutation trellis codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Communications, 2005, v:53, n:11, pp:1782-1789 [Journal] - Fang-Wei Fu, A. J. Han Vinck
**On the Capacity of Generalized Write-Once Memory with State Transitions Described by an Arbitrary Directed Acyclic Graph.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:1, pp:308-313 [Journal] - J. Martin Borden, A. J. Han Vinck
**On coding for 'stuck-at' defects.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:729-0 [Journal] - W. C. Ferreira, W. A. Clarke, Albertus S. J. Helberg, Khaled A. S. Abdel-Ghaffar, A. J. Han Vinck
**Insertion/deletion correction with spectral nulls.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1997, v:43, n:2, pp:722-732 [Journal] - Fang-Wei Fu, A. J. Han Vinck, Shi-Yi Shen
**On the Constructions of Constant-Weight Codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1998, v:44, n:1, pp:328-333 [Journal] - Fang-Wei Fu, A. J. Han Vinck, Victor K. Wei, Raymond W. Yeung
**On the capacity of write-unidirectional memories with nonperiodic codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2004, v:50, n:4, pp:649-656 [Journal] - Jurgen Haring, A. J. Han Vinck
**Iterative decoding of codes over complex numbers for impulsive noise channels.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2003, v:49, n:5, pp:1251-1260 [Journal] - Jurgen Haring, A. J. Han Vinck
**Coding and signal space diversity for a class of fading and impulsive noise channels.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2004, v:50, n:5, pp:887-895 [Journal] - Christoph Haslach, A. J. Han Vinck
**Correction to "A decoding algorithm with restrictions for array codes".**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:1, pp:479- [Journal] - Christoph Haslach, A. J. Han Vinck
**A decoding algorithm with restrictions for array codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2339-2344 [Journal] - Alexander V. Kuznetsov, Francis Swarts, A. J. Han Vinck, Hendrik C. Ferreira
**On the undetected error probability of linear block codes on channels with memory.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:1, pp:303-309 [Journal] - Alexander V. Kuznetsov, A. J. Han Vinck
**A coding scheme for single peak-shift correction in (d, k)-constrained channels.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1993, v:39, n:4, pp:1444-0 [Journal] - Alexander V. Kuznetsov, A. J. Han Vinck
**On the general defective channel with informed encoder and capacities of some constrained memories.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1994, v:40, n:6, pp:1866-1871 [Journal] - Vladimir I. Levenshtein, A. J. Han Vinck
**Perfect (d, k)-codes capable of correcting single peak-shifts.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1993, v:39, n:2, pp:656-0 [Journal] - Yuan Luo, Fang-Wei Fu, A. J. Han Vinck, Wende Chen
**On constant-composition codes over Z**[Citation Graph (0, 0)][DBLP]_{q}. IEEE Transactions on Information Theory, 2003, v:49, n:11, pp:3010-3016 [Journal] - Yuan Luo, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen
**Some new characters on the wire-tap channel of type II.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1222-1229 [Journal] - Chaichana Mitrpant, A. J. Han Vinck, Yuan Luo
**An achievable region for the Gaussian wiretap channel with side information.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2181-2190 [Journal] - Hiroyoshi Morita, Adriaan J. de Lind van Wijngaarden, A. J. Han Vinck
**On the construction of maximal prefix-synchronized codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:6, pp:2158-2166 [Journal] - Feng-Wen Sun, A. J. Han Vinck
**An algorithm for identifying rate (n-1)/n catastrophic punctured convolutional encoders.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:3, pp:1010-1013 [Journal] - A. J. Han Vinck, Petr Dolezal, Young Gil Kim
**Convolutional Encoder State Estimation.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1998, v:44, n:4, pp:1604-1608 [Journal] - A. J. Han Vinck, Wim L. M. Hoeks, Karel A. Post
**On the capacity of the two-user M -ary multiple-access channel with feedback.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1985, v:31, n:4, pp:540-0 [Journal] - A. J. Han Vinck, K. J. Keuning
**On the capacity of the asynchronous T-user M-frequency noiseless multiple-access channel without intensity information.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1996, v:42, n:6, pp:2235-2238 [Journal] - A. J. Han Vinck, Karel A. Post
**On the influence of coding on the mean time to failure for degrading memories with defects.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1989, v:35, n:4, pp:902-0 [Journal] - Tadashi Wadayama, A. J. Han Vinck
**DC-free binary convolutional coding.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:1, pp:162-173 [Journal] - Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck
**An Algorithm for Biometric Authentication Based on the Model of Non-Stationary Random Processes.**[Citation Graph (0, 0)][DBLP] ICB, 2007, pp:319-327 [Conf] **Constructing Passwords from Biometrical Data.**[Citation Graph (, )][DBLP]**Wiretap Channel with Side Information from Part of Encoder.**[Citation Graph (, )][DBLP]**Additive Block Coding Schemes for Biometric Authentication with the DNA Data.**[Citation Graph (, )][DBLP]**Notes on Reed-Muller Codes**[Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.006secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |