Stephen Wicker
Affiliations: | Cornell University, Ithaca, NY, United States |
Area:
Electronics and Electrical Engineering, Computer ScienceGoogle:
"Stephen Wicker"Children
Sign in to add traineeEwald W. Hueffmeier | grad student | 2002 | Cornell |
Bhaskar Krishnamachari | grad student | 2002 | Cornell (E-Tree) |
Eric Sakk | grad student | 2002 | Cornell |
Allen B. MacKenzie | grad student | 2003 | Cornell |
Xi Xie | grad student | 2003 | Cornell |
Yasser M. Mourtada | grad student | 2004 | Cornell |
Prince Samar | grad student | 2004 | Cornell |
Hazer Inaltekin | grad student | 2006 | Cornell |
Christina R. Tavoularis | grad student | 2007 | Cornell |
Sameer K. Pai | grad student | 2008 | Cornell |
Hui Qu | grad student | 2008 | Cornell |
Philip J. Kuryloski | grad student | 2009 | Cornell |
Coalton Bennett | grad student | 2010 | Cornell |
Sergio A. Bermudez-Rodriguez | grad student | 2010 | Cornell |
Anna Kacewicz | grad student | 2010 | Cornell |
Mikhail A. Lisovich | grad student | 2010 | Cornell |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Lee DS, Wicker SB. (2010) Can a routing protocol be truly optimal? Dynamic load-balancing in wireless sensor networks 2010 Ieee 11th Annual Wireless and Microwave Technology Conference, Wamicon 2010 |
Liu KJR, Bourlard H, Krishnamurthy V, et al. (2010) Introduction to the special issue on signal and information processing for social networks Ieee Journal On Selected Topics in Signal Processing. 4: 673-676 |
Bennett C, Wicker SB. (2010) Decreased time delay and security enhancement recommendations for AMI smart meter networks Innovative Smart Grid Technologies Conference, Isgt 2010 |
Bermudez SA, Wicker SB. (2010) Partial connectivity of multi-hop two-dimensional finite hybrid wireless networks Ieee International Conference On Communications |
Kacewicz A, Wicker S. (2010) Application of reed-muller codes for localization of malicious nodes Ieee International Conference On Communications |
Kacewicz A, Wicker SB. (2009) Secrecy and reliability using raptor codes in the presence of a wiretapper in a multiple path wireless network 2009 International Conference On Wireless Communications and Signal Processing, Wcsp 2009 |
Kacewicz A, Wicker SB. (2009) Redundancy minimizing techniques for robust transmission in wireless networks Journal of Communications and Networks. 11: 564-573 |
Bermudez SA, Wicker SB. (2009) Connectivity analysis under shadowing in wireless networks with data correlation topology control 2009 4th International Symposium On Wireless and Pervasive Computing, Iswpc 2009 |
Bermudez SA, Wicker SB. (2009) Connectivity of finite wireless networks with random communication range nodes Ieee International Conference On Communications |
Inaltekin H, Wicker SB. (2008) The analysis of nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes Ieee/Acm Transactions On Networking. 16: 1094-1107 |