default search action
Stephen B. Wicker
Person information
- affiliation: Cornell University, Ithaca, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j53]Stephen B. Wicker:
The ethics of zero-day exploits - : the NSA meets the trolley car. Commun. ACM 64(1): 97-103 (2021) - 2020
- [j52]Stephen B. Wicker, Dipayan P. Ghosh:
Reading in the panopticon - : your kindle may be spying on you, but you can't be sure. Commun. ACM 63(5): 68-73 (2020) - [j51]Stephen B. Wicker:
eBook surveillance and the threat to freedom of association. J. Inf. Secur. Appl. 55: 102643 (2020)
2010 – 2019
- 2019
- [c61]Stephen B. Wicker:
eBook Readers, Location Surveillance and the Threat to Freedom of Association. ARES 2019: 94:1-94:7 - 2018
- [j50]Stephen B. Wicker:
Smartphones, contents of the mind, and the fifth amendment. Commun. ACM 61(4): 28-31 (2018) - [j49]Stephen B. Wicker:
Forced Decryption and the Fifth Amendment: A Technical Perspective. Proc. IEEE 106(1): 3-6 (2018) - [c60]Kolbeinn Karlsson, Danny Adams, Gloire Rubambiza, Zangyueyang Xian, Robbert van Renesse, Hakim Weatherspoon, Stephen B. Wicker:
Untethered: Deployable Blockchains for IoT Environments. SoCC 2018: 508 - [c59]Kolbeinn Karlsson, Weitao Jiang, Stephen B. Wicker, Danny Adams, Edwin Ma, Robbert van Renesse, Hakim Weatherspoon:
Vegvisir: A Partition-Tolerant Blockchain for the Internet-of-Things. ICDCS 2018: 1150-1158 - 2017
- [j48]Stephen B. Wicker, Kolbeinn Karlsson:
Internet advertising: technology, ethics, and a serious difference of opinion. Commun. ACM 60(10): 70-79 (2017) - [c58]Kolbeinn Karlsson, Zhiming Shen, Weijia Song, Hakim Weatherspoon, Robbert van Renesse, Stephen B. Wicker:
Towards an emergency edge supercloud. SoCC 2017: 633 - 2016
- [j47]Stephanie M. Santoso, Stephen B. Wicker:
The future of three-dimensional printing: Intellectual property or intellectual confinement? New Media Soc. 18(1): 138-155 (2016) - [c57]Kolbeinn Karlsson, Stephen B. Wicker:
The Effect of Location Granularity on Semantic Location Inferences. HICSS 2016: 2197-2204 - 2015
- [j46]Amber Sami Kubesch, Stephen B. Wicker:
Digital rights management: The cost to consumers. Proc. IEEE 103(5): 726-733 (2015) - [c56]Shion Guha, Stephen B. Wicker:
Do Birds of a Feather Watch Each Other?: Homophily and Social Surveillance in Location Based Social Networks. CSCW 2015: 1010-1020 - [c55]Shion Guha, Stephen B. Wicker:
Spatial subterfuge: an experience sampling study to predict deceptive location disclosures. UbiComp 2015: 1131-1135 - 2014
- [c54]Christian D. Peer, Dominik Engel, Stephen B. Wicker:
Hierarchical key management for multi-resolution load data representation. SmartGridComm 2014: 926-932 - 2013
- [j45]Stephen B. Wicker, Stephanie M. Santoso:
Access to the internet is a human right. Commun. ACM 56(6): 43-46 (2013) - [c53]Xiao-an Wang, Stephen B. Wicker:
Channel estimation and feedback with continuous time domain parameters. GLOBECOM 2013: 4306-4312 - [c52]Dipayan P. Ghosh, Robert J. Thomas, Stephen B. Wicker:
A Privacy-Aware Design for the Vehicle-to-Grid Framework. HICSS 2013: 2283-2291 - [c51]Xiao-an Wang, Stephen B. Wicker:
Channel Estimation and Feedback in OFDM Systems. VTC Spring 2013: 1-5 - 2012
- [j44]Stephen B. Wicker:
The loss of location privacy in the cellular age. Commun. ACM 55(8): 60-68 (2012) - [j43]Hazer Inaltekin, Mung Chiang, H. Vincent Poor, Stephen B. Wicker:
Selfish Random Access over Wireless Channels with Multipacket Reception. IEEE J. Sel. Areas Commun. 30(1): 138-152 (2012) - [j42]Nathaniel J. Karst, Stephen B. Wicker:
On the Rekeying Load in Group Key Distributions Using Cover-Free Families. IEEE Trans. Inf. Theory 58(10): 6667-6671 (2012) - [c50]Dipayan P. Ghosh, Dawn E. Schrader, William D. Schulze, Stephen B. Wicker:
Economic analysis of privacy-aware Advanced Metering Infrastructure adoption. ISGT 2012: 1-4 - 2011
- [j41]Stephen B. Wicker:
Cellular telephony and the question of privacy. Commun. ACM 54(7): 88-98 (2011) - [j40]Stephen B. Wicker, Dawn E. Schrader:
Privacy-Aware Design Principles for Information Networks. Proc. IEEE 99(2): 330-350 (2011) - [c49]Stephen B. Wicker, Robert J. Thomas:
A Privacy-Aware Architecture for Demand Response Systems. HICSS 2011: 1-9 - [c48]Dipayan P. Ghosh, Stephen B. Wicker, Lawrence E. Blume:
Game theoretic analysis of privacy-aware Advanced Metering Infrastructure. ISGT Europe 2011: 1-4 - 2010
- [j39]Mikhail A. Lisovich, Deirdre K. Mulligan, Stephen B. Wicker:
Inferring Personal Information from Demand-Response Systems. IEEE Secur. Priv. 8(1): 11-20 (2010) - [j38]K. J. Ray Liu, Hervé Bourlard, Vikram Krishnamurthy, Alex Pentland, Stephen B. Wicker:
Introduction to the Special Issue on Signal and Information Processing for Social Networks. IEEE J. Sel. Top. Signal Process. 4(4): 673-676 (2010) - [c47]Sergio A. Bermudez, Stephen B. Wicker:
Partial Connectivity of Multi-hop Two-Dimensional Finite Hybrid Wireless Networks. ICC 2010: 1-5 - [c46]Anna Kacewicz, Stephen B. Wicker:
Application of Reed-Muller Codes for Localization of Malicious Nodes. ICC 2010: 1-7
2000 – 2009
- 2009
- [j37]Anna Kacewicz, Stephen B. Wicker:
Redundancy minimizing techniques for robust transmission in wireless networks. J. Commun. Networks 11(6): 564-573 (2009) - [j36]Hazer Inaltekin, Stephen B. Wicker, Mung Chiang, H. Vincent Poor:
On Unbounded Path-Loss Models: Effects of Singularity on Wireless Network Performance. IEEE J. Sel. Areas Commun. 27(7): 1078-1092 (2009) - [c45]Philip Kuryloski, Annarita Giani, Roberta Giannantonio, Katherine Gilani, Raffaele Gravina, Ville-Pekka Seppä, Edmund Y. W. Seto, Victor Shia, Curtis Wang, Posu Yan, Allen Y. Yang, Jari A. K. Hyttinen, Shankar Sastry, Stephen B. Wicker, Ruzena Bajcsy:
DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and its Applications. BSN 2009: 92-97 - [c44]Sergio A. Bermudez, Stephen B. Wicker:
Connectivity of Finite Wireless Networks with Random Communication Range Nodes. ICC 2009: 1-5 - 2008
- [j35]Parv Venkitasubramaniam, Ting He, Lang Tong, Stephen B. Wicker:
Toward an analytical approach to anonymous wireless networking. IEEE Commun. Mag. 46(2): 140-146 (2008) - [j34]Sameer Pai, Sergio A. Bermudez, Stephen B. Wicker, Marci Meingast, Tanya G. Roosta, Shankar Sastry, Deirdre K. Mulligan:
Transactional Confidentiality in Sensor Networks. IEEE Secur. Priv. 6(4): 28-35 (2008) - [j33]Hui Qu, Stephen B. Wicker:
A Combined Localization and Geographic Routing Algorithm for Rapidly-Deployed Wireless Sensor Networks. Int. J. Distributed Sens. Networks 4(1): 44-63 (2008) - [j32]Hui Qu, Stephen B. Wicker:
Co-designed anchor-free localization and location-based routing algorithm for rapidly-deployed wireless sensor networks. Inf. Fusion 9(3): 425-439 (2008) - [j31]Narayan B. Mandayam, Stephen B. Wicker, Jean C. Walrand, Tamer Basar, Jianwei Huang, Daniel Pérez Palomar:
Game Theory in Communication Systems [Guest Editorial]. IEEE J. Sel. Areas Commun. 26(7): 1042-1046 (2008) - [j30]Hazer Inaltekin, Stephen B. Wicker:
The analysis of Nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes. IEEE/ACM Trans. Netw. 16(5): 1094-1107 (2008) - [c43]Shanshan Jiang, Yanchuan Cao, Sameer Iyengar, Philip Kuryloski, Roozbeh Jafari, Yuan Xue, Ruzena Bajcsy, Stephen B. Wicker:
CareNet: an integrated wireless sensor networking environment for remote healthcare. BODYNETS 2008: 9 - [c42]Anna Kacewicz, Stephen B. Wicker:
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks. CISS 2008: 1093-1098 - [c41]Sergio A. Bermudez, Stephen B. Wicker:
On the Connectivity of Finite Wireless Networks with Multiple Base Stations. ICCCN 2008: 875-880 - [c40]Sergio A. Bermudez, Stephen B. Wicker:
Taking advantage of data correlation to control the topology of wireless sensor networks. ICT 2008: 1-6 - [c39]Hazer Inaltekin, Mung Chiang, H. Vincent Poor, Stephen B. Wicker:
On the asymptotic behavior of selfish transmitters sharing a common channel. ISIT 2008: 2026-2030 - [c38]Mikhail A. Lisovich, Sergio A. Bermudez, Stephen B. Wicker:
Reconfiguration in heterogeneous mobile wireless sensor networks. ISWPC 2008: 349-354 - [i2]Hazer Inaltekin, Mung Chiang, Harold Vincent Poor, Stephen B. Wicker:
On the Asymptotic Behavior of Selfish Transmitters Sharing a Common Channel. CoRR abs/0804.4187 (2008) - 2007
- [j29]Xin Zhang, Jun Chen, Stephen B. Wicker, Toby Berger:
Successive Coding in Multiuser Information Theory. IEEE Trans. Inf. Theory 53(6): 2246-2254 (2007) - [c37]Sameer Pai, Philip Kuryloski, Henry Yip, Srikant Yennamandra, Stephen B. Wicker, Kirsten Boehner, Geri Gay:
Networks of Sensors in Public Spaces: Combining Technology with Art. AINA Workshops (2) 2007: 396-402 - [c36]Sameer Pai, Tanya G. Roosta, Stephen B. Wicker, Shankar Sastry:
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust. AINA Workshops (1) 2007: 443-450 - [c35]Hazer Inaltekin, Christina Tavoularis, Stephen B. Wicker:
Event Detection Time for Mobile Sensor Networks Using First Passage Processes. GLOBECOM 2007: 1174-1179 - [c34]Tanya G. Roosta, Sameer Pai, Phoebus Chen, Shankar Sastry, Stephen B. Wicker:
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks. GLOBECOM 2007: 1273-1278 - [c33]Christina Tavoularis, Stephen B. Wicker:
Optimal Sleep Strategies with Respect to Traffic Patterns in Wireless Sensor Networks. ICC 2007: 3847-3852 - [c32]Hazer Inaltekin, Stephen B. Wicker:
Random access game over noisy channels with capture effect. MSWiM 2007: 181-188 - [c31]Hazer Inaltekin, Stephen B. Wicker:
The Behavior of Unbounded Path-loss Models and the Effect of Singularity on Computed Network Interference. SECON 2007: 431-440 - [c30]Hazer Inaltekin, Tom Wexler, Stephen B. Wicker:
A Duopoly Pricing Game for Wireless IP Services. SECON 2007: 600-609 - 2006
- [j28]Prince Samar, Stephen B. Wicker:
Link Dynamics and Protocol Design in a Multihop Mobile Environment. IEEE Trans. Mob. Comput. 5(9): 1156-1172 (2006) - [c29]Hui Qu, Stephen B. Wicker:
Anchor-Free Localization in Rapidly-Deployed Wireless Sensor Networks. MASS 2006: 627-632 - [c28]Hazer Inaltekin, Stephen B. Wicker:
The Analysis of a Game Theoretic MAC Protocol for Wireless Networks. SECON 2006: 296-305 - [e2]John A. Stankovic, Phillip B. Gibbons, Stephen B. Wicker, Joseph A. Paradiso:
Proceedings of the Fifth International Conference on Information Processing in Sensor Networks, IPSN 2006, Nashville, Tennessee, USA, April 19-21, 2006. ACM 2006, ISBN 1-59593-334-4 [contents] - 2005
- [j27]Xin Zhang, Stephen B. Wicker:
On the optimal distribution of sensors in a random field. ACM Trans. Sens. Networks 1(2): 301-306 (2005) - [c27]Xin Zhang, Stephen B. Wicker:
Robustness vs. efficiency in sensor networks. IPSN 2005: 225-230 - 2004
- [j26]Jun Chen, Xin Zhang, Toby Berger, Stephen B. Wicker:
An upper bound on the sum-rate distortion function and its corresponding rate allocation schemes for the CEO problem. IEEE J. Sel. Areas Commun. 22(6): 977-987 (2004) - [j25]Bhaskar Krishnamachari, Rung-Hung Gau, Stephen B. Wicker, Zygmunt J. Haas:
Optimal Sequential Paging in Cellular Wireless Networks. Wirel. Networks 10(2): 121-131 (2004) - [c26]Prince Samar, Stephen B. Wicker:
Characterizing the communication links of a node in a mobile ad hoc network. ICC 2004: 4092-4096 - [c25]Xin Zhang, Stephen B. Wicker:
How to distribute sensors in a random field? IPSN 2004: 243-250 - [c24]Prince Samar, Stephen B. Wicker:
On the behavior of communication links of a node in a multi-hop mobile environment. MobiHoc 2004: 145-156 - [c23]Martin Roth, Stephen B. Wicker:
Asymptotic Pheromone Behavior in Swarm Intelligent Manets. MWCN 2004: 335-346 - 2003
- [j24]Bhaskar Krishnamachari, Stephen B. Wicker, Ramón Béjar, Cèsar Fernández:
On the Complexity of Distributed Self-Configuration in Wireless Networks. Telecommun. Syst. 22(1-4): 33-59 (2003) - [c22]Martin Roth, Stephen B. Wicker:
Termite: ad-hoc networking with stigmergy. GLOBECOM 2003: 2937-2941 - [c21]Yurong Chen, Emin Gün Sirer, Stephen B. Wicker:
On Selection of Optimal Transmission Power for Ad hoc Networks. HICSS 2003: 300 - [c20]Bhaskar Krishnamachari, Yasser Mourtada, Stephen B. Wicker:
The energy-robustness tradeoff for routing in wireless sensor networks. ICC 2003: 1833-1837 - [c19]Allen B. MacKenzie, Stephen B. Wicker:
Stability of Multipacket Slotted Aloha with Selfish Users and Perfect Information. INFOCOM 2003: 1583-1590 - 2002
- [j23]Andrea J. Goldsmith, Stephen B. Wicker:
Design challenges for energy-constrained ad hoc wireless networks. IEEE Wirel. Commun. 9(4): 8-27 (2002) - [c18]Bhaskar Krishnamachari, Ramón Béjar, Stephen B. Wicker:
Distributed Problem Solving and the Boundaries of Self-Configuration in Multi-hop Wireless Networks. HICSS 2002: 297 - [c17]Bhaskar Krishnamachari, Deborah Estrin, Stephen B. Wicker:
The Impact of Data Aggregation in Wireless Sensor Networks. ICDCS Workshops 2002: 575-578 - 2001
- [j22]Allen B. MacKenzie, Stephen B. Wicker:
Game theory and the design of self-configuring, adaptive wireless networks. IEEE Commun. Mag. 39(11): 126-131 (2001) - [c16]Allen B. MacKenzie, Stephen B. Wicker:
Game theory in communications: motivation, explanation, and application to power control. GLOBECOM 2001: 821-826 - [c15]Bhaskar Krishnamachari, Stephen B. Wicker, Ramón Béjar:
Phase transition phenomena in wireless ad hoc networks. GLOBECOM 2001: 2921-2925 - [c14]Bhaskar Krishnamachari, Rung-Hung Gau, Stephen B. Wicker, Zygmunt J. Haas:
On the performance of sequential paging for mobile user location. VTC Fall 2001: 92-96 - [c13]Allen B. MacKenzie, Stephen B. Wicker:
Selfish users in Aloha: a game-theoretic approach. VTC Fall 2001: 1354-1357 - 2000
- [j21]Michael Eoin Buckley, Stephen B. Wicker:
The design and performance of a neural network for predicting turbo decoding error with application to hybrid ARQ protocols. IEEE Trans. Commun. 48(4): 566-576 (2000) - [j20]Jong-Il Park, Stephen B. Wicker, Henry L. Owen:
Trellis-based soft-output adaptive equalization techniques for TDMA cellular systems. IEEE Trans. Veh. Technol. 49(1): 83-94 (2000) - [c12]Bhaskar Krishnamachari, Xi Xie, Bart Selman, Stephen B. Wicker:
Analysis of Random Noise and Random Walk Algorithms. CP 2000: 278-290 - [c11]Zygmunt J. Haas, Joseph Y. Halpern, Li Li, Stephen B. Wicker:
A decision-theoretic approach to resource allocation in wireless multimedia networks. DIAL-M 2000: 86-95 - [c10]Xi Xie, Stephen B. Wicker:
Solving Large Scale Channel Allocation Problems with Splitting Algorithms. ICC (1) 2000: 500-504 - [c9]Michael Eoin Buckley, Marcia G. Ramos, Sheila S. Hemami, Stephen B. Wicker:
Perceptually-Based Robust Image Transmission over Wireless Channels. ICIP 2000: 128-131 - [i1]Zygmunt J. Haas, Joseph Y. Halpern, Li Li, Stephen B. Wicker:
A Decision-Theoretic Approach to Resource Allocation in Wireless Multimedia Networks. CoRR cs.NI/0006037 (2000)
1990 – 1999
- 1999
- [j19]Xiao-an Wang, Stephen B. Wicker:
The BCJR Trellis and Trellis Decoders for Some BCH Codes. Appl. Algebra Eng. Commun. Comput. 9(6): 521-546 (1999) - [j18]Michael Eoin Buckley, Stephen B. Wicker:
A neural network for predicting decoder error in turbo decoders. IEEE Commun. Lett. 3(5): 145-147 (1999) - [j17]Thomas L. Tapp, Amjad A. Luna, Xiao-an Wang, Stephen B. Wicker:
Extended Hamming and BCH soft decision decoders for mobile data applications. IEEE Trans. Commun. 47(3): 333-337 (1999) - [j16]Amjad A. Luna, Frédéric M. Fontaine, Stephen B. Wicker:
Iterative maximum-likelihood trellis decoding for block codes. IEEE Trans. Commun. 47(3): 338-342 (1999) - [c8]James J. Kosmach, Stephen B. Wicker:
Reconfigurable two-stage trellis Reed-Solomon decoding. ICC 1999: 451-455 - 1998
- [j15]Daniel J. Costello Jr., Joachim Hagenauer, Hideki Imai, Stephen B. Wicker:
Applications of Error-Control Coding. IEEE Trans. Inf. Theory 44(6): 2531-2560 (1998) - 1997
- [j14]M. Y. Zaidan, Christopher F. Barnes, Stephen B. Wicker:
Use of sigma-trees as constellations in trellis-coded modulation. IEEE Trans. Inf. Theory 43(6): 2005-2012 (1997) - [c7]Jong-Il Park, Stephen B. Wicker, Henry L. Owen:
Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio. ICC (3) 1997: 1503-1507 - 1996
- [j13]Xiao-an Wang, Stephen B. Wicker:
An artificial neural net Viterbi decoder. IEEE Trans. Commun. 44(2): 165-171 (1996) - [j12]Xiao-an Wang, Stephen B. Wicker:
A soft-output decoding algorithm for concatenated systems. IEEE Trans. Inf. Theory 42(2): 543-553 (1996) - 1995
- [j11]Lars K. Rasmussen, Stephen B. Wicker:
Trellis-coded, type-I hybrid-ARQ protocols based on CRC error-detecting codes. IEEE Trans. Commun. 43(10): 2569-2575 (1995) - [j10]Lars K. Rasmussen, Michael J. Bartz, Stephen B. Wicker:
A comparison of trellis coded and Reed-Solomon coded hybrid-ARQ protocols over slowly fading Rayleigh channels. Wirel. Pers. Commun. 2(4): 393-413 (1995) - [c6]Slim Souissi, Stephen B. Wicker:
Dynamic performance of a random access code combining CDMA system. PIMRC 1995: 628-632 - 1994
- [j9]Michael D. Rice, Stephen B. Wicker:
Adaptive error control for slowly varying channels. IEEE Trans. Commun. 42(234): 917-926 (1994) - [j8]Stephen B. Wicker, Michael J. Bartz:
The design and implementation of type-I and type-II hybrid-ARQ protocols based on first-order Reed-Muller codes. IEEE Trans. Commun. 42(234): 979-987 (1994) - [j7]Stephen B. Wicker, Michael J. Bartz:
Type-II hybrid-ARQ protocols using punctured MDS codes. IEEE Trans. Commun. 42(234): 1431-1440 (1994) - [j6]Michael D. Rice, Stephen B. Wicker:
A sequential scheme for adaptive error control over slowly varying channels. IEEE Trans. Commun. 42(234): 1533-1543 (1994) - [j5]Bruce A. Harvey, Stephen B. Wicker:
Packet combining systems based on the Viterbi decoder. IEEE Trans. Commun. 42(234): 1544-1557 (1994) - [j4]Lars K. Rasmussen, Stephen B. Wicker:
The performance of type-I trellis coded hybrid-ARQ protocols over AWGN and slowly fading channels. IEEE Trans. Inf. Theory 40(2): 418-428 (1994) - [c5]Mohssen Alabbadi, Stephen B. Wicker:
A Digital Signature Scheme Based on Linear Error-correcting Block Codes. ASIACRYPT 1994: 238-248 - [c4]Lars K. Rasmussen, Stephen B. Wicker:
A performance analysis for two TCM code combining diversity receivers. PIMRC 1994: 85-89 - [e1]Andrew Chmora, Stephen B. Wicker:
Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers. Lecture Notes in Computer Science 829, Springer 1994, ISBN 3-540-58265-7 [contents] - 1993
- [c3]Mohssen Alabbadi, Stephen B. Wicker:
Susceptibility of Digital Signature Schemes Based on Error-Correcting Codes to Universal Forgery. Error Control, Cryptology, and Speech Compression 1993: 6-12 - 1992
- [j3]Michael D. Rice, Stephen B. Wicker:
Modified majority logic decoding of cyclic codes in hybrid-ARQ systems. IEEE Trans. Commun. 40(9): 1413-1417 (1992) - 1991
- [j2]Stephen B. Wicker:
Adaptive rate error control through the use of diversity combining and majority-logic decoding in a hybrid-ARQ protocol. IEEE Trans. Commun. 39(3): 380-385 (1991) - [c2]Stephen B. Wicker:
Reed-Solomon Hybrid-ARQ Error Control With Erasure Decoding For Mobile Communication Networks. PIMRC 1991: 58-62 - 1990
- [j1]