![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Ken R. Duffy
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Kathleen Yang
, Muriel Médard
, Ken R. Duffy
:
Nonorthogonal Multiple Access With Guessing Random Additive Noise Decoding-Aided Macrosymbol (GRAND-AM). IEEE Internet Things J. 11(17): 28036-28049 (2024) - [c56]Alexander Mariona, Ken R. Duffy, Muriel Médard:
Finite-Length Coding Bounds via Guesswork. Allerton 2024: 1-8 - [c55]Peihong Yuan, Ken R. Duffy, Muriel Médard:
Near-Optimal Generalized Decoding of Polar-like Codes. ISIT 2024: 2939-2944 - [c54]Jiewei Feng, Ken R. Duffy, Muriel Médard:
Laplacian-ORBGRAND: Decoding for Impulsive Noise. MILCOM 2024: 1-6 - [c53]Charles Wiame, Ken R. Duffy, Muriel Médard:
Error correction in interference-limited wireless systems. MILCOM 2024: 1-6 - [c52]Jane A. Millward, Ken R. Duffy, Muralidhar Rangaswamy, Muriel Médard:
Enhancing Guessing Random Additive Noise Decoding using Channel Estimation. SPAWC 2024: 676-680 - [c51]Zhengnan Li, Diego Andres Cuji, Ken R. Duffy, Milica Stojanovic:
Guessing Random Additive Noise Decoding for Underwater Acoustic Communications. WUWNet 2024: 20:1-20:5 - [i54]Peihong Yuan, Ken R. Duffy
, Muriel Médard:
Near-Optimal Generalized Decoding of Polar-like Codes. CoRR abs/2402.05004 (2024) - [i53]Jongchan Woo, Vipindev Adat Vasudevan, Benjamin D. Kim, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Ken R. Duffy, Muriel Médard:
Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems. CoRR abs/2405.05107 (2024) - [i52]Ken R. Duffy, Peihong Yuan, Joseph Griffin, Muriel Médard:
Soft-output Guessing Codeword Decoding. CoRR abs/2406.11782 (2024) - [i51]Charles Wiame, Ken R. Duffy, Muriel Médard:
Error correction in interference-limited wireless systems. CoRR abs/2410.22650 (2024) - [i50]Joseph Griffin, Peihong Yuan, Ken R. Duffy, Muriel Médard:
Using a Single-Parity-Check to reduce the Guesswork of Guessing Codeword Decoding. CoRR abs/2411.09803 (2024) - [i49]Peihong Yuan, Ken R. Duffy, Muriel Médard:
Soft-Output Successive Cancellation List Decoding. CoRR abs/2412.03623 (2024) - [i48]Sarah Khalifeh, Ken R. Duffy, Muriel Médard:
Turbo product decoding of cubic tensor codes. CoRR abs/2412.14017 (2024) - 2023
- [j35]Alejandro Cohen
, Rafael G. L. D'Oliveira
, Ken R. Duffy
, Jongchan Woo
, Muriel Médard
:
AES as Error Correction: Cryptosystems for Reliable Communication. IEEE Commun. Lett. 27(8): 1964-1968 (2023) - [c50]Kevin Galligan, Muriel Médard, Ken R. Duffy
:
Block turbo decoding with ORBGRAND. CISS 2023: 1-6 - [c49]Muriel Médard, Ken R. Duffy
:
Physical layer insecurity. CISS 2023: 1-6 - [c48]Arslan Riaz, Amit Solomon, Furkan Ercan, Muriel Médard, Rabia Tugce Yazicigil
, Ken R. Duffy
:
Noise Recycling using GRAND for Improving the Decoding Performance. COMSNETS 2023: 171-173 - [c47]Peihong Yuan, Ken R. Duffy
, Evan P. Gabhart, Muriel Médard:
Guessing Random Additive Noise Decoding with Quantized Soft Information. GLOBECOM (Workshops) 2023: 1698-1703 - [c46]Ken R. Duffy
, Muriel Médard:
Soft Detection Physical Layer Insecurity. GLOBECOM 2023: 1747-1752 - [c45]Kevin Galligan, Peihong Yuan, Muriel Médard, Ken R. Duffy
:
Upgrade error detection to prediction with GRAND. GLOBECOM 2023: 1818-1823 - [c44]Ken R. Duffy
, Moritz Grundei, Muriel Médard:
Using channel correlation to improve decoding - ORBGRAND-AI. GLOBECOM 2023: 3585-3590 - [c43]Furkan Ercan, Kevin Galligan, David Starobinski, Muriel Médard, Ken R. Duffy
, Rabia Tugce Yazicigil:
GRAND-EDGE: A Universal, Jamming-Resilient Algorithm with Error-and-Erasure Decoding. ICC 2023: 4501-4507 - [c42]Kathleen Yang, Muriel Médard, Ken R. Duffy
:
Multiuser Detection Using GRAND-Aided Macrosymbols. ICC 2023: 4646-4651 - [c41]Wei An, Muriel Médard, Ken R. Duffy
:
Soft decoding without soft demapping with ORBGRAND. ISIT 2023: 1080-1084 - [c40]Zeynep Ece Kizilates, Arslan Riaz, Giacomo F. Coraluppi, Muriel Médard, Ken R. Duffy
, Rabia Tugce Yazicigil:
Leveraging Noise Recycling in Soft Detection Decoding Using ORBGRAND. ISIT 2023: 1085-1089 - [c39]Hadi Sarieddeen
, Peihong Yuan, Muriel Médard, Ken R. Duffy
:
Soft-input, soft-output joint data detection and GRAND: A performance and complexity analysis. ISIT 2023: 1090-1095 - [c38]Arslan Riaz, Alperen Yasar, Furkan Ercan, Wei An, Jonathan Ngo, Kevin Galligan, Muriel Médard, Ken R. Duffy
, Rabia Tugce Yazicigl:
A Sub-0.8pJ/b 16.3Gbps/mm2 Universal Soft-Detection Decoder Using ORBGRAND in 40nm CMOS. ISSCC 2023: 432-433 - [c37]Joseph Griffin, Peihong Yuan, Petar Popovski
, Ken R. Duffy
, Muriel Médard:
Code at the Receiver, Decode at the Sender: GRAND with Feedback. ITW 2023: 341-346 - [c36]Peihong Yuan, Ken R. Duffy
, Muriel Médard:
Time-Shift Coding for Uncoordinated MACs. LATINCOM 2023: 1-6 - [c35]Kathleen Yang, Muriel Médard, Ken R. Duffy
:
Separating Interferers from Multiple Users in Interference Aware Guessing Random Additive Noise Decoding Aided Macrosymbol. MILCOM 2023: 643-648 - [c34]Arslan Riaz, Zeynep Ece Kizilates, Alperen Yasar, Furkan Ercan, Wei An, Kevin Galligan, Muriel Médard, Ken R. Duffy
, Rabia Tugce Yazicigil:
Demo: Universal Soft-Detection Decoder with Ultra-Low Energy Consumption Using ORBGRAND. WoWMoM 2023: 337-339 - [i47]Furkan Ercan, Kevin Galligan, David Starobinski, Muriel Médard, Ken R. Duffy
, Rabia Tugce Yazicigil:
GRAND-EDGE: A Universal, Jamming-resilient Algorithm with Error-and-Erasure Decoding. CoRR abs/2301.09778 (2023) - [i46]Ken R. Duffy
, Moritz Grundei, Muriel Médard:
Using channel correlation to improve decoding - ORBGRAND-AI. CoRR abs/2303.07461 (2023) - [i45]Homa Esfahanizadeh, Adam Yala, Rafael G. L. D'Oliveira, Andrea J. D. Jaba, Victor Quach, Ken R. Duffy
, Tommi S. Jaakkola, Vinod Vaikuntanathan, Manya Ghobadi, Regina Barzilay, Muriel Médard:
PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels. CoRR abs/2304.00047 (2023) - [i44]Kevin Galligan, Peihong Yuan, Muriel Médard, Ken R. Duffy:
Upgrade error detection to prediction with GRAND. CoRR abs/2305.05777 (2023) - [i43]Peihong Yuan, Muriel Médard, Kevin Galligan, Ken R. Duffy
:
Outperforming 5G LDPC codes with GRAND over long, low rate codes - making a long story short. CoRR abs/2310.10737 (2023) - 2022
- [j34]Ken R. Duffy
, Muriel Médard
, Wei An
:
Guessing Random Additive Noise Decoding With Symbol Reliability Information (SRGRAND). IEEE Trans. Commun. 70(1): 3-18 (2022) - [j33]Wei An
, Muriel Médard
, Ken R. Duffy
:
Keep the Bursts and Ditch the Interleavers. IEEE Trans. Commun. 70(6): 3655-3667 (2022) - [j32]Ken R. Duffy
, Wei An
, Muriel Médard
:
Ordered Reliability Bits Guessing Random Additive Noise Decoding. IEEE Trans. Signal Process. 70: 4528-4542 (2022) - [c33]Arslan Riaz, Muriel Médard, Ken R. Duffy
, Rabia Tugce Yazicigil
:
A Universal Maximum Likelihood GRAND Decoder in 40nm CMOS. COMSNETS 2022: 421-423 - [c32]Furkan Ercan, Kevin Galligan, Ken R. Duffy
, Muriel Médard, David Starobinski, Rabia Tugce Yazicigil
:
A General Security Approach for Soft-information Decoding against Smart Bursty Jammers. GLOBECOM (Workshops) 2022: 245-251 - [c31]Basak Ozaydin, Muriel Médard, Ken R. Duffy
:
GRAND-assisted Optimal Modulation. GLOBECOM 2022: 813-818 - [c30]Hadi Sarieddeen
, Muriel Médard, Ken R. Duffy
:
GRAND for Fading Channels using Pseudo-soft Information. GLOBECOM 2022: 3502-3507 - [c29]Hadi Sarieddeen
, Muriel Médard, Ken R. Duffy
:
Soft-Input, Soft-Output Joint Detection and GRAND. GLOBECOM 2022: 6182-6187 - [c28]Arslan Riaz, Amit Solomon, Furkan Ercan, Muriel Médard, Rabia Tugce Yazicigil
, Ken R. Duffy
:
Interleaved Noise Recycling using GRAND. ICC 2022: 2483-2488 - [c27]Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy
, Muriel Médard:
Partial Encryption after Encoding for Security and Reliability in Data Systems. ISIT 2022: 1779-1784 - [i42]Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard, Tommi S. Jaakkola, Regina Barzilay:
Syfer: Neural Obfuscation for Private Data Release. CoRR abs/2201.12406 (2022) - [i41]Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard:
Partial Encryption after Encoding for Security and Reliability in Data Systems. CoRR abs/2202.03002 (2022) - [i40]Ken R. Duffy, Wei An, Muriel Médard:
Ordered Reliability Bits Guessing Random Additive Noise Decoding. CoRR abs/2202.13951 (2022) - [i39]Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy
, Jongchan Woo, Muriel Médard:
AES as Error Correction. CoRR abs/2203.12047 (2022) - [i38]Ken R. Duffy
, Evan P. Gabhart, Muriel Médard:
Quantized Guessing Random Additive Noise Decoding. CoRR abs/2203.13552 (2022) - [i37]Hadi Sarieddeen
, Muriel Médard, Ken R. Duffy
:
Soft-input, soft-output joint detection and GRAND. CoRR abs/2207.10836 (2022) - [i36]Hadi Sarieddeen
, Muriel Médard, Ken R. Duffy
:
GRAND for Fading Channels using Pseudo-soft Information. CoRR abs/2207.10842 (2022) - [i35]Kevin Galligan, Muriel Médard, Ken R. Duffy
:
Block turbo decoding with ORBGRAND. CoRR abs/2207.11149 (2022) - [i34]Wei An, Muriel Médard, Ken R. Duffy
:
Soft decoding without soft demapping with ORBGRAND. CoRR abs/2207.11991 (2022) - [i33]Furkan Ercan, Kevin Galligan, Ken R. Duffy
, Muriel Médard, David Starobinski, Rabia Tugce Yazicigil:
A General Security Approach for Soft-information Decoding against Smart Bursty Jammers. CoRR abs/2210.04061 (2022) - [i32]Basak Ozaydin, Muriel Médard, Ken Duffy
:
GRAND-assisted Optimal Modulation. CoRR abs/2210.16187 (2022) - [i31]Muriel Médard, Ken R. Duffy
:
Physical layer insecurity. CoRR abs/2212.01176 (2022) - [i30]Ken R. Duffy
, Muriel Médard:
Confident decoding with GRAND. CoRR abs/2212.05309 (2022) - 2021
- [j31]Hochan Cheon
, Andrey Kan, Giulio Prevedello, Simone C. Oostindie
, Simon J. Dovedi, Edwin D. Hawkins, Julia M. Marchingo, Susanne Heinzel, Ken R. Duffy
, Philip D. Hodgkin:
Cyton2: A Model of Immune Cell Population Dynamics That Includes Familial Instructional Inheritance. Frontiers Bioinform. 1 (2021) - [j30]Ken R. Duffy
, Seva Shneer:
MDS coding is better than replication for job completion times. Oper. Res. Lett. 49(1): 91-95 (2021) - [c26]Arslan Riaz, Vaibhav Bansal, Amit Solomon, Wei An, Qijun Liu
, Kevin Galligan, Ken R. Duffy
, Muriel Médard, Rabia Tugce Yazicigil
:
Multi-Code Multi-Rate Universal Maximum Likelihood Decoder using GRAND. ESSCIRC 2021: 239-246 - [c25]Kevin Galligan, Amit Solomon, Arslan Riaz, Muriel Médard, Rabia Tugce Yazicigil
, Ken R. Duffy
:
IGRAND: decode any product code. GLOBECOM 2021: 1-6 - [c24]Ken R. Duffy
:
Ordered Reliability Bits Guessing Random Additive Noise Decoding. ICASSP 2021: 8268-8272 - [c23]Wei An, Muriel Médard, Ken R. Duffy
:
CRC Codes as Error Correction Codes. ICC 2021: 1-6 - [c22]Amit Solomon, Ken R. Duffy
, Muriel Médard:
Managing Noise and Interference Separately - Multiple Access Channel Decoding using Soft GRAND. ISIT 2021: 2602-2607 - [i29]Luca D'Alessio, Litian Liu, Ken Duffy, Yonina C. Eldar, Muriel Médard, Mehrtash Babadi:
A Coding Theory Perspective on MultiplexedMolecular Profiling of Biological Tissues. CoRR abs/2101.11123 (2021) - [i28]Wei An, Muriel Médard, Ken R. Duffy:
CRC Codes as Error Correction Codes. CoRR abs/2104.13663 (2021) - [i27]Adam Yala, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Manya Ghobadi, Tommi S. Jaakkola, Vinod Vaikuntanathan, Regina Barzilay, Muriel Médard:
NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training. CoRR abs/2106.02484 (2021) - 2020
- [c21]Ken R. Duffy
, Amit Solomon, Kishori M. Konwar, Muriel Médard:
5G NR CA-Polar Maximum Likelihood Decoding by GRAND. CISS 2020: 1-5 - [c20]Wei An, Muriel Médard, Ken R. Duffy
:
Keep the bursts and ditch the interleavers. GLOBECOM 2020: 1-6 - [c19]Amit Solomon, Ken R. Duffy
, Muriel Médard:
Soft Maximum Likelihood Decoding using GRAND. ICC 2020: 1-6 - [c18]Alejandro Cohen, Amit Solomon, Ken R. Duffy
, Muriel Médard:
Noise Recycling. ISIT 2020: 315-320 - [c17]Luca D'Alessio, Litian Liu, Ken Duffy, Yonina C. Eldar, Muriel Médard, Mehrtash Babadi:
A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues. ISITA 2020: 309-313 - [i26]Ken R. Duffy:
Ordered Reliability Bits Guessing Random Additive Noise Decoding. CoRR abs/2001.00546 (2020) - [i25]Amit Solomon, Ken R. Duffy, Muriel Médard:
Soft Maximum Likelihood Decoding using GRAND. CoRR abs/2001.03089 (2020) - [i24]Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard:
Noise Recycling. CoRR abs/2006.04897 (2020) - [i23]Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard:
Noise Recycling. CoRR abs/2010.07791 (2020) - [i22]Wei An, Muriel Médard, Ken R. Duffy:
Keep the bursts and ditch the interleavers. CoRR abs/2011.03565 (2020)
2010 – 2019
- 2019
- [j29]Ahmad Beirami
, A. Robert Calderbank, Mark M. Christiansen, Ken R. Duffy
, Muriel Médard:
A Characterization of Guesswork on Swiftly Tilting Curves. IEEE Trans. Inf. Theory 65(5): 2850-2871 (2019) - [j28]Ken R. Duffy
, Jiange Li
, Muriel Médard:
Capacity-Achieving Guessing Random Additive Noise Decoding. IEEE Trans. Inf. Theory 65(7): 4023-4040 (2019) - [j27]Hao Wang
, Lisa Vo, Flávio P. Calmon
, Muriel Médard, Ken R. Duffy
, Mayank Varia
:
Privacy With Estimation Guarantees. IEEE Trans. Inf. Theory 65(12): 8025-8042 (2019) - [j26]Soheil Feizi
, Muriel Médard, Gerald T. Quon, Manolis Kellis, Ken Duffy
:
Network Infusion to Infer Information Sources in Networks. IEEE Trans. Netw. Sci. Eng. 6(3): 402-417 (2019) - [c16]Ken R. Duffy
, Muriel Médard:
Guessing random additive noise decoding with soft detection symbol reliability information - SGRAND. ISIT 2019: 480-484 - [i21]Ken R. Duffy, Muriel Médard:
Guessing random additive noise decoding with soft detection symbol reliability information (SGRAND). CoRR abs/1902.03796 (2019) - [i20]Ken Duffy, Amit Solomon, Kishori M. Konwar, Muriel Médard:
5G NR CA-Polar Maximum Likelihood Decoding by GRAND. CoRR abs/1907.01077 (2019) - [i19]Ken Duffy, Seva Shneer:
MDS coding is better than replication for job completion times. CoRR abs/1907.11052 (2019) - 2018
- [j25]Ying Cui
, Muriel Médard, Edmund M. Yeh
, Douglas J. Leith
, Ken R. Duffy
:
Optimization-Based Linear Network Coding for General Connections of Continuous Flows. IEEE/ACM Trans. Netw. 26(5): 2033-2047 (2018) - [c15]Ken R. Duffy
, Jiange Li, Muriel Médard:
Guessing noise, not code-words. ISIT 2018: 671-675 - [i18]Ahmad Beirami, A. Robert Calderbank, Mark M. Christiansen, Ken Duffy, Muriel Médard:
A Characterization of Guesswork on Swiftly Tilting Curves. CoRR abs/1801.09021 (2018) - [i17]Ken R. Duffy, Jiange Li, Muriel Médard:
Capacity-achieving decoding by guessing noise. CoRR abs/1802.07010 (2018) - 2017
- [j24]Flávio du Pin Calmon
, Ali Makhdoumi, Muriel Médard, Mayank Varia, Mark M. Christiansen, Ken R. Duffy
:
Principal Inertia Components and Applications. IEEE Trans. Inf. Theory 63(8): 5011-5038 (2017) - [j23]Soheil Feizi
, Ali Makhdoumi, Ken Duffy
, Manolis Kellis, Muriel Médard:
Network Maximal Correlation. IEEE Trans. Netw. Sci. Eng. 4(4): 229-247 (2017) - [j22]Ying Cui
, Muriel Médard, Edmund M. Yeh, Douglas J. Leith
, Fan Lai, Ken R. Duffy
:
A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem. IEEE/ACM Trans. Netw. 25(6): 3441-3454 (2017) - [c14]Arman Rezaee, Ahmad Beirami, Ali Makhdoumi, Muriel Médard, Ken Duffy
:
Guesswork subject to a total entropy budget. Allerton 2017: 1008-1015 - [i16]Flávio du Pin Calmon, Ali Makhdoumi, Muriel Médard, Mayank Varia, Mark M. Christiansen, Ken R. Duffy:
Principal Inertia Components and Applications. CoRR abs/1704.00820 (2017) - [i15]Arman Rezaee, Ahmad Beirami, Ali Makhdoumi, Muriel Médard, Ken Duffy:
Guesswork Subject to a Total Entropy Budget. CoRR abs/1712.09082 (2017) - 2016
- [j21]Tom Serge Weber
, Mark Dukes
, Denise C. Miles, Stefan P. Glaser, Shalin H. Naik
, Ken R. Duffy
:
Site-specific recombinatorics: in situ cellular barcoding with the Cre Lox system. BMC Syst. Biol. 10: 43 (2016) - [i14]Soheil Feizi, Muriel Médard, Gerald T. Quon, Manolis Kellis, Ken R. Duffy:
Network Infusion to Infer Information Sources in Networks. CoRR abs/1606.07383 (2016) - 2015
- [j20]Mark M. Christiansen, Ken R. Duffy
, Flávio du Pin Calmon, Muriel Médard:
Multi-User Guesswork and Brute Force Security. IEEE Trans. Inf. Theory 61(12): 6876-6886 (2015) - [c13]Ahmad Beirami, A. Robert Calderbank, Mark M. Christiansen, Ken R. Duffy
, Ali Makhdoumi, Muriel Médard:
A geometric perspective on guesswork. Allerton 2015: 941-948 - [c12]Ying Cui, Muriel Médard, Dhaivat Pandya, Edmund M. Yeh, Douglas J. Leith
, Ken R. Duffy
:
A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem. GLOBECOM 2015: 1-7 - [c11]Ying Cui, Muriel Médard, Edmund M. Yeh, Douglas J. Leith
, Ken R. Duffy
:
Optimization-based linear network coding for general connections of continuous flows. ICC 2015: 4492-4498 - [c10]Ahmad Beirami, A. Robert Calderbank, Ken R. Duffy
, Muriel Médard:
Quantifying computational security subject to source constraints, guesswork and inscrutability. ISIT 2015: 2757-2761 - [i13]Ying Cui, Muriel Médard, Edmund M. Yeh, Douglas J. Leith, Ken R. Duffy:
A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem. CoRR abs/1502.06321 (2015) - [i12]Ying Cui, Muriel Médard, Edmund M. Yeh, Douglas J. Leith, Ken R. Duffy:
Optimization-Based Linear Network Coding for General Connections of Continuous Flows. CoRR abs/1502.06601 (2015) - [i11]Flávio du Pin Calmon, Muriel Médard, Mayank Varia, Ken R. Duffy, Mark M. Christiansen, Linda M. Zeger:
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security. CoRR abs/1503.08513 (2015) - [i10]Jeffrey G. Andrews, Alexandros G. Dimakis, Lara Dolecek, Michelle Effros, Muriel Médard, Olgica Milenkovic, Andrea Montanari, Sriram Vishwanath, Edmund M. Yeh, Randall Berry, Ken R. Duffy, Soheil Feizi, Saul Kato, Manolis Kellis, Stuart Licht, Jon Sorenson, Lav R. Varshney, Haris Vikalo:
A Perspective on Future Research Directions in Information Theory. CoRR abs/1507.05941 (2015) - 2014
- [c9]Ullrich J. Mönich, Catherine M. Grgicak
, Viveck R. Cadambe
, Jason Yonglin Wu, Genevieve Wellner, Ken Duffy
, Muriel Médard:
A signal model for forensic DNA mixtures. ACSSC 2014: 429-433 - [i9]Mark M. Christiansen, Ken R. Duffy, Flávio du Pin Calmon, Muriel Médard:
Quantifying the computational security of multi-user systems. CoRR abs/1405.5024 (2014) - 2013
- [j19]Mark M. Christiansen, Ken R. Duffy
:
Guesswork, Large Deviations, and Shannon Entropy. IEEE Trans. Inf. Theory 59(2): 796-802 (2013) - [j18]Kaidi D. Huang, Ken R. Duffy
, David Malone
:
H-RCA: 802.11 Collision-Aware Rate Control. IEEE/ACM Trans. Netw. 21(4): 1021-1034 (2013) - [j17]Ken R. Duffy
, Charles Bordenave, Douglas J. Leith
:
Decentralized Constraint Satisfaction. IEEE/ACM Trans. Netw. 21(4): 1298-1308 (2013) - [j16]Minyu Fang, David Malone
, Ken R. Duffy
, Douglas J. Leith
:
Decentralised learning MACs for collision-free access in WLANs. Wirel. Networks 19(1): 83-98 (2013) - [c8]Mark M. Christiansen, Ken R. Duffy
, Flávio du Pin Calmon, Muriel Médard:
Guessing a password over a wireless channel (on the effect of noise non-uniformity). ACSSC 2013: 51-55 - [c7]Flávio P. Calmon, Mayank Varia, Muriel Médard, Mark M. Christiansen, Ken R. Duffy
, Stefano Tessaro:
Bounds on inference. Allerton 2013: 567-574 - [c6]Mark M. Christiansen, Ken R. Duffy
, Flávio du Pin Calmon, Muriel Médard:
Brute force searching, the typical set and Guesswork. ISIT 2013: 1257-1261 - [i8]Mark M. Christiansen, Ken R. Duffy, Flávio du Pin Calmon, Muriel Médard:
Brute force searching, the typical set and Guesswork. CoRR abs/1301.6356 (2013) - [i7]Flávio du Pin Calmon, Mayank Varia, Muriel Médard, Mark M. Christiansen, Ken R. Duffy, Stefano Tessaro:
Bounds on inference. CoRR abs/1310.1512 (2013) - [i6]Mark M. Christiansen, Ken R. Duffy, Flávio du Pin Calmon, Muriel Médard:
Guessing a password over a wireless channel (on the effect of noise non-uniformity). CoRR abs/1311.1053 (2013) - 2012
- [c5]Flávio du Pin Calmon, Muriel Médard, Linda M. Zeger, João Barros
, Mark M. Christiansen, Ken R. Duffy
:
Lists that are smaller than their parts: A coding approach to tunable secrecy. Allerton Conference 2012: 1387-1394 - [c4]Giuseppe Bianchi, Ken Duffy, Douglas J. Leith, Vsevolod Shneer:
Modeling conservative updates in multi-hash approximate count sketches. ITC 2012: 1-8 - [i5]Mark M. Christiansen, Ken R. Duffy:
Guesswork, large deviations and Shannon entropy. CoRR abs/1205.4135 (2012) - [i4]Flávio du Pin Calmon, Muriel Médard, Linda M. Zeger, João Barros, Mark M. Christiansen, Ken R. Duffy:
Lists that are smaller than their parts: A coding approach to tunable secrecy. CoRR abs/1210.2126 (2012) - 2011
- [j15]Ken R. Duffy
, Sean P. Meyn:
Estimating Loynes' exponent. Queueing Syst. Theory Appl. 68(3-4): 285-293 (2011) - [j14]Kaidi D. Huang, David Malone
, Ken R. Duffy
:
The 802.11g 11 Mb/s Rate is More Robust than 6 Mb/s. IEEE Trans. Wirel. Commun. 10(4): 1015-1020 (2011) - [i3]Douglas J. Leith, Vijay G. Subramanian, Ken R. Duffy:
Log-Convexity of Rate Region in 802.11e WLANs. CoRR abs/1102.4469 (2011) - [i2]Ken R. Duffy, Charles Bordenave, Douglas J. Leith:
Decentralized Constraint Satisfaction. CoRR abs/1103.3240 (2011) - 2010
- [j13]Douglas J. Leith
, Vijay G. Subramanian
, Ken R. Duffy
:
Log-convexity of rate region in 802.11e WLANs. IEEE Commun. Lett. 14(1): 57-59 (2010) - [j12]Ken R. Duffy
, Sean P. Meyn:
Most likely paths to error when estimating the mean of a reflected random walk. Perform. Evaluation 67(12): 1290-1303 (2010) - [j11]Kaidi D. Huang, Ken R. Duffy
, David Malone
:
On the Validity of IEEE 802.11 MAC Modeling Hypotheses. IEEE/ACM Trans. Netw. 18(6): 1935-1948 (2010) - [i1]Minyu Fang, David Malone, Ken R. Duffy, Douglas J. Leith:
Decentralised Learning MACs for Collision-free Access in WLANs. CoRR abs/1009.4386 (2010)
2000 – 2009
- 2009
- [j10]Kaidi D. Huang, Ken R. Duffy
:
On a buffering hypothesis in 802.11 analytic models. IEEE Commun. Lett. 13(5): 312-314 (2009) - [j9]Vijay G. Subramanian
, Ken R. Duffy
, Douglas J. Leith
:
Existence and uniqueness of fair rate allocations in lossy wireless networks. IEEE Trans. Wirel. Commun. 8(7): 3401-3406 (2009) - 2008
- [j8]Ken R. Duffy
, Neil O'Connell
, Artëm Sapozhnikov:
Complexity analysis of a decentralised graph colouring algorithm. Inf. Process. Lett. 107(2): 60-63 (2008) - [j7]Ken R. Duffy
, David Malone
:
Logarithmic asymptotics for a single-server processing distinguishable sources. Math. Methods Oper. Res. 68(3): 509-537 (2008) - [c3]Kaidi D. Huang, Ken R. Duffy
, David Malone
, Douglas J. Leith
:
Investigating the validity of IEEE 802.11 MAC modeling hypotheses. PIMRC 2008: 1-6 - 2007
- [j6]David Malone
, Ken Duffy
, Christopher King:
Some remarks on ld plots for heavy-tailed traffic. Comput. Commun. Rev. 37(1): 41-42 (2007) - [j5]Ken Duffy
, Ayalvadi J. Ganesh:
Modeling the Impact of Buffering on 802.11. IEEE Commun. Lett. 11(2): 219-221 (2007) - [j4]David Malone, Ken Duffy, Douglas J. Leith:
Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans. Netw. 15(1): 159-172 (2007) - 2006
- [j3]Ken Duffy
, Douglas J. Leith
, Tianji Li, David Malone
:
Modeling 802.11 mesh networks. IEEE Commun. Lett. 10(8): 635-637 (2006) - [c2]Peter Clifford, Ken Duffy
, John Foy, Douglas J. Leith
, David Malone
:
Modeling 802.11e for data traffic parameter design. WiOpt 2006: 28-37 - 2005
- [j2]Ken Duffy
, David Malone
, Douglas J. Leith
:
Modeling the 802.11 distributed coordination function in non-saturated conditions. IEEE Commun. Lett. 9(8): 715-717 (2005) - [c1]Ken R. Duffy
, David Malone
, Douglas J. Leith
:
Modelling 802.11 Wireless Links. CDC/ECC 2005: 6952-6957
1990 – 1999
- 1999
- [j1]László Györfi, András Rácz, Ken Duffy, John T. Lewis, Raymond Russell, Fergal Toomey:
Distribution-free confidence intervals for measurement of effective bandwidths. SIGMETRICS Perform. Evaluation Rev. 27(3): 19 (1999)
Coauthor Index
aka: Flávio du Pin Calmon
aka: Rafael G. L. D'Oliveira
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint