Search the dblp DataBase
Stephen B. Wicker :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Sameer Pai , Tanya Roosta , Stephen Wicker , Shankar Sastry Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:443-450 [Conf ] Sameer Pai , Philip Kuryloski , Henry Yip , Srikant Yennamandra , Stephen Wicker , Kirsten Boehner , Geri Gay Networks of Sensors in Public Spaces: Combining Technology with Art. [Citation Graph (0, 0)][DBLP ] AINA Workshops (2), 2007, pp:396-402 [Conf ] Mohssen Alabbadi , Stephen B. Wicker A Digital Signature Scheme Based on Linear Error-correcting Block Codes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:238-248 [Conf ] Bhaskar Krishnamachari , Xi Xie , Bart Selman , Stephen B. Wicker Analysis of Random Noise and Random Walk Algorithms. [Citation Graph (0, 0)][DBLP ] CP, 2000, pp:278-290 [Conf ] Zygmunt J. Haas , Joseph Y. Halpern , Erran L. Li , Stephen B. Wicker A decision-theoretic approach to resource allocation in wireless multimedia networks. [Citation Graph (0, 0)][DBLP ] DIAL-M, 2000, pp:86-95 [Conf ] Mohssen Alabbadi , Stephen B. Wicker Susceptibility of Digital Signature Schemes Based on Error-Correcting Codes to Universal Forgery. [Citation Graph (0, 0)][DBLP ] Error Control, Cryptology, and Speech Compression, 1993, pp:6-12 [Conf ] Yurong Chen , Emin Gün Sirer , Stephen B. Wicker On Selection of Optimal Transmission Power for Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] HICSS, 2003, pp:300- [Conf ] Bhaskar Krishnamachari , Ramón Béjar , Stephen B. Wicker Distributed Problem Solving and the Boundaries of Self-Configuration in Multi-hop Wireless Networks. [Citation Graph (0, 0)][DBLP ] HICSS, 2002, pp:297- [Conf ] Jong-Il Park , Stephen B. Wicker , Henry L. Owen Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio. [Citation Graph (0, 0)][DBLP ] ICC (3), 1997, pp:1503-1507 [Conf ] Xi Xie , Stephen B. Wicker Solving Large Scale Channel Allocation Problems with Splitting Algorithms. [Citation Graph (0, 0)][DBLP ] ICC (1), 2000, pp:500-504 [Conf ] Bhaskar Krishnamachari , Deborah Estrin , Stephen B. Wicker The Impact of Data Aggregation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2002, pp:575-578 [Conf ] M. Eotn Buckley , Marcia G. Ramos , Sheila S. Hemami , Stephen B. Wicker Perceptually-Based Robust Image Transmission over Wireless Channels. [Citation Graph (0, 0)][DBLP ] ICIP, 2000, pp:- [Conf ] Allen MacKenzie , Stephen B. Wicker Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2003, pp:- [Conf ] Stephen B. Wicker An Error Control Technique for High Data Rate Communication Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1989, pp:594-601 [Conf ] Xin Zhang , Stephen B. Wicker How to distribute sensors in a random field? [Citation Graph (0, 0)][DBLP ] IPSN, 2004, pp:243-250 [Conf ] Xin Zhang , Stephen B. Wicker Robustness vs. efficiency in sensor networks. [Citation Graph (0, 0)][DBLP ] IPSN, 2005, pp:225-230 [Conf ] Prince Samar , Stephen B. Wicker On the behavior of communication links of a node in a multi-hop mobile environment. [Citation Graph (0, 0)][DBLP ] MobiHoc, 2004, pp:145-156 [Conf ] Xiao-an Wang , Stephen B. Wicker The BCJR Trellis and Trellis Decoders for Some BCH Codes. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 1999, v:9, n:6, pp:521-546 [Journal ] Zygmunt J. Haas , Joseph Y. Halpern , Erran L. Li , Stephen B. Wicker A Decision-Theoretic Approach to Resource Allocation in Wireless Multimedia Networks [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Bhaskar Krishnamachari , Stephen B. Wicker , Ramón Béjar , Cèsar Fernández On the Complexity of Distributed Self-Configuration in Wireless Networks. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2003, v:22, n:1-4, pp:33-59 [Journal ] Daniel J. Costello Jr. , Joachim Hagenauer , H. Imai , Stephen B. Wicker Applications of Error-Control Coding. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:6, pp:2531-2560 [Journal ] Lars K. Rasmussen , Stephen B. Wicker The performance of type-I trellis coded hybrid-ARQ protocols over AWGN and slowly fading channels. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:2, pp:418-428 [Journal ] Xiao-an Wang , Stephen B. Wicker A soft-output decoding algorithm for concatenated systems. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:2, pp:543-553 [Journal ] M. Y. Zaidan , Christopher F. Barnes , Stephen B. Wicker Use of sigma-trees as constellations in trellis-coded modulation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1997, v:43, n:6, pp:2005-2012 [Journal ] Prince Samar , Stephen B. Wicker Link Dynamics and Protocol Design in a Multihop Mobile Environment. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2006, v:5, n:9, pp:1156-1172 [Journal ] Xin Zhang , Stephen B. Wicker On the optimal distribution of sensors in a random field. [Citation Graph (0, 0)][DBLP ] TOSN, 2005, v:1, n:2, pp:301-306 [Journal ] Bhaskar Krishnamachari , Rung-Hung Gau , Stephen B. Wicker , Zygmunt J. Haas Optimal Sequential Paging in Cellular Wireless Networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2004, v:10, n:2, pp:121-131 [Journal ] Optimal Sleep Strategies with Respect to Traffic Patterns in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Connectivity of Finite Wireless Networks with Random Communication Range Nodes. [Citation Graph (, )][DBLP ] On the Connectivity of Finite Wireless Networks with Multiple Base Stations. [Citation Graph (, )][DBLP ] Random access game over noisy channels with capture effect. [Citation Graph (, )][DBLP ] DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and its Applications. [Citation Graph (, )][DBLP ] Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks. [Citation Graph (, )][DBLP ] Event Detection Time for Mobile Sensor Networks Using First Passage Processes. [Citation Graph (, )][DBLP ] Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks. [Citation Graph (, )][DBLP ] The Behavior of Unbounded Path-loss Models and the Effect of Singularity on Computed Network Interference. [Citation Graph (, )][DBLP ] A Duopoly Pricing Game for Wireless IP Services. [Citation Graph (, )][DBLP ] On the Asymptotic Behavior of Selfish Transmitters Sharing a Common Channel [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.304secs