Publications
Found 417 results
[ Author] Title Type Year Filters: First Letter Of Last Name is M [Clear All Filters]
Code and constellation optimization for efficient noncoherent communication. CONFERENCE RECORD OF THE ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS. :198-202.
.
2004. Cross-layer optimization of the reservation channel in a pseudocellular network: Mobile-centric fast handoffs via multiuser detection. CONFERENCE RECORD OF THE ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS. :1733-1737.
.
2003. Synchronization and noncoherent communication. FUNDAMENTALS OF DIGITAL COMMUNICATION. :153-198.
.
2008. Wireless communication. FUNDAMENTALS OF DIGITAL COMMUNICATION. :379-473.
.
2008. Information-theoretic limits and their computation. FUNDAMENTALS OF DIGITAL COMMUNICATION. :252-292.
.
2008. .
2012. Determining achievable rates for secure, zero divergence, steganography. IEEE International Conference on Image Processing ICIP. :121-+.
.
2006. Characterizing outage capacity for space-time communication over wideband wireless channels. CONFERENCE RECORD OF THE ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS. :1513-1517.
.
2002. Modulation. FUNDAMENTALS OF DIGITAL COMMUNICATION. :7-73.
.
2008. Near-Coherent QPSK Performance With Coarse Phase Quantization: A Feedback-Based Architecture for Joint Phase/Frequency Synchronization and Demodulation. IEEE TRANSACTIONS ON SIGNAL PROCESSING. 64:4432-4443.
.
2016. On Block Noncoherent Communication with Low-Precision Phase Quantization at the Receiver. :2199-2203.
.
2009. Channel coding. FUNDAMENTALS OF DIGITAL COMMUNICATION. :293-378.
.
2008. Spread-spectrum techniques for distributed space-time communication in sensor networks. CONFERENCE RECORD OF THE ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS. :908-912.
.
2004. Secure steganography: Statistical restoration of the second order dependencies for improved security. International Conference on Acoustics Speech and Signal Processing ICASSP. :277-+.
.
2007. .
2009. .
2010. BAD: Bidirectional arbitrated decision-feedback equalization. IEEE TRANSACTIONS ON COMMUNICATIONS. 53:214-218.
.
2005. 'Print and scan' resilient data hiding in images. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 1:464-478.
.
2006. Space-time communication for OFDM with implicit channel feedback. IEEE TRANSACTIONS ON INFORMATION THEORY. 50:3111-3129.
.
2004. ESTIMATION OF OPTIMUM CODING REDUNDANCY AND FREQUENCY DOMAIN ANALYSIS OF ATTACKS FOR YASS - A RANDOMIZED BLOCK BASED HIDING SCHEME. IEEE International Conference on Image Processing (ICIP). :1292-1295.
.
2008. Broadband Millimeter Wave Networks: Architectures and Applications. International Symposium on Advanced Networks and Telecommunication Systems. :25-27.
.
2008. Space-time communication for OFDM with implicit channel feedback. IEEE Global Telecommunications Conference (Globecom). :1321-1325.
.
2003. Provably secure steganography: Achieving zero K-L divergence using statistical restoration. IEEE International Conference on Image Processing ICIP. :125-+.
.
2006. Demodulation. FUNDAMENTALS OF DIGITAL COMMUNICATION. :74-152.
.
2008. Probability, random variables, and random processes. FUNDAMENTALS OF DIGITAL COMMUNICATION. :474-481.
.
2008.