default search action
A. J. Han Vinck
Person information
- affiliation: University of Duisburg-Essen, Institute for Experimental Mathematics, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j78]Ashot N. Harutyunyan, Arnak V. Poghosyan, Lilit Harutyunyan, Nelli Aghajanyan, Tigran Bunarjyan, A. J. Han Vinck:
Challenges and Experiences in Designing Interpretable KPI-diagnostics for Cloud Applications. J. Univers. Comput. Sci. 29(11): 1298-1318 (2023) - [j77]Fatma Rouissi, A. J. Han Vinck, Adel Ghazel:
Statistical analysis of the Middleton Class-A noise effects on multi-carrier OFDM-based communication system. Telecommun. Syst. 82(1): 115-123 (2023) - [i12]A. J. Han Vinck, Fatma Rouissi:
On the Binary Symmetric Channel with a Transition Probability Determined by a Poisson Distribution. CoRR abs/2307.06073 (2023) - 2022
- [i11]A. J. Han Vinck:
Coding Concepts and Reed-Solomon Codes. CoRR abs/2205.01044 (2022) - 2021
- [j76]Safa Najjar, Fatma Rouissi, Héla Gassara, A. J. Han Vinck, Adel Ghazel:
Novel low complexity decoding method for the binary coded frequency shift keying modulation. Concurr. Comput. Pract. Exp. 33(1) (2021) - [j75]Fatma Rouissi, A. J. Han Vinck, Adel Ghazel:
On the simulation of the Middleton Class-A noise model for single- and multi-carrier modulation in power line communication. Telecommun. Syst. 77(1): 143-153 (2021) - 2020
- [c66]Thokozani Shongwe, A. J. Han Vinck:
Analysis of Clipping a Digital Modulated Signal Affected by AWGN and Impulse Noise. CSNDSP 2020: 1-6
2010 – 2019
- 2019
- [j74]Daniel Peethala, Thomas Kaiser, A. J. Han Vinck:
Reliability Analysis of Centralized Radio Access Networks in Non-Line-of-Sight and Line-of-Sight Scenarios. IEEE Access 7: 18311-18318 (2019) - [j73]Yanling Chen, Feng Zheng, Thomas Kaiser, A. J. Han Vinck:
An Information-Theoretic Approach to the Chipless RFID Tag Identification. IEEE Access 7: 96984-97000 (2019) - [j72]Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation. J. Univers. Comput. Sci. 25(8): 904-924 (2019) - [c65]Yeow Meng Chee, Han Mao Kiah, A. J. Han Vinck, Van Khu Vu, Eitan Yaakobi:
Coding for Write ℓ-step-up Memories. ISIT 2019: 1597-1601 - [c64]Safa Najjar, Fatma Rouissi, Héla Gassara, A. J. Han Vinck, Adel Ghazel:
Short Block Code Concatenated with a Permutation Code for Narrowband PLC Communication Systems. MENACOMM 2019: 1-6 - [i10]A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, Jos H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hashimoto, Øyvind Ytrehus, Shigeaki Kuzuoka, Mikihiko Nishiara, Han Mao Kiah, Jun Muramatsu, Shigeki Miyake:
Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory. CoRR abs/1907.02944 (2019) - 2018
- [j71]Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:
Collective Secrecy Over the K-Transmitter Multiple Access Channel. IEEE Trans. Inf. Forensics Secur. 13(9): 2279-2293 (2018) - [j70]Yuan Gao, A. J. Han Vinck, Thomas Kaiser:
Massive MIMO Antenna Selection: Switching Architectures, Capacity Bounds, and Optimal Antenna Selection Algorithms. IEEE Trans. Signal Process. 66(5): 1346-1360 (2018) - [j69]Young Gil Kim, A. J. Han Vinck:
Anticollision Algorithms for FM0 Code and Miller Subcarrier Sequence in RFID Applications. IEEE Trans. Veh. Technol. 67(6): 5168-5173 (2018) - [c63]Safa Najjar, Fatma Rouissi, A. J. Han Vinck, Héla Gassara, Adel Ghazel:
SFSK versus OFDM Performances under the Narrowband PLC Channel Impairments. ICMCS 2018: 1-5 - [c62]Safa Najjar, Fatma Rouissi, A. J. Han Vinck, Adel Ghazel:
Coded Quaternary FSK and SFSK Performances Under the Narrow-Band PLC Channel Constraints. IINTEC 2018: 29-33 - [c61]Yanling Chen, A. J. Han Vinck:
Some classes of systematic polynomial codes correcting single- and adjacent transposition errors. ISITA 2018: 496-500 - [c60]Arnold S. de Beer, A. Sheri, Hendrik C. Ferreira, A. J. Han Vinck:
Channel frequency response for a low voltage indoor cable up to 1GHz. ISPLC 2018: 1-6 - [c59]Thokozani Shongwe, A. J. Han Vinck:
Waveform clipping in FSK modulated signal to combat impulse noise. ISPLC 2018: 1-5 - [c58]Yanling Chen, A. J. Han Vinck:
Systematic [n, n - 2] codes with capability of correcting single- and adjacent transposition errors. ITW 2018: 1-5 - 2017
- [j68]Chao Qi, Yanling Chen, A. J. Han Vinck:
On the Binary Input Gaussian Wiretap Channel with/without Output Quantization. Entropy 19(2): 59 (2017) - [j67]Guilherme R. Colen, Lucas Giroto de Oliveira, Camila Borelli Zeller, A. J. Han Vinck, Moisés Vidal Ribeiro:
Statistical analysis and modeling of a novel parameter for resource allocation in multicarrier PLC systems. Trans. Emerg. Telecommun. Technol. 28(11) (2017) - [j66]Babak Nikfar, A. J. Han Vinck:
Relay selection in cooperative power line communication: A multi-armed bandit approach. J. Commun. Networks 19(1): 1-9 (2017) - [j65]Guilherme R. Colen, Lucas Giroto de Oliveira, A. J. Han Vinck, Moisés Vidal Ribeiro:
A Spectral Compressive Resource Allocation Technique for PLC Systems. IEEE Trans. Commun. 65(2): 816-826 (2017) - [j64]Alain Richard Ndjiongue, Thokozani Shongwe, Hendrik C. Ferreira, Telex Magloire Nkouatchah Ngatched, A. J. Han Vinck:
PSK to CSK mapping for hybrid systems involving the radio frequency and the visible spectrum. Telecommun. Syst. 64(1): 173-192 (2017) - [c57]Babak Nikfar, Gerd Bumiller, A. J. Han Vinck:
An adaptive pursuit strategy for dynamic spectrum assignment in narrowband PLC. ISPLC 2017: 1-6 - [c56]Stephane M. Nlom, Alain Richard Ndjiongue, Khmaies Ouahada, Hendrik C. Ferreira, A. J. Han Vinck, Thokozani Shongwe:
A simplistic channel model for cascaded PLC-VLC systems. ISPLC 2017: 1-6 - [c55]Fatma Rouissi, A. J. Han Vinck, Héla Gassara, Adel Ghazel:
Statistical characterization and modelling of impulse noise on indoor narrowband PLC environment. ISPLC 2017: 1-6 - [c54]Timothy O. Sanya, Thokozani Shongwe, A. J. Han Vinck, Hendrik C. Ferreira:
Impedance analysis of a power line distribution network using short-time Fourier Transform. ISPLC 2017: 1-6 - [c53]Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:
Joint secrecy over the K-transmitter multiple access channel. ITW 2017: 394-398 - [c52]Allan Emleh, Arnold S. de Beer, Ling Cheng, Hendrik C. Ferreira, A. J. Han Vinck:
An overview of colour LED & CFL lighting interference on the low voltage PLC network. TSP 2017: 220-224 - [c51]Arnold S. de Beer, Allan Emleh, Hendrik C. Ferreira, A. J. Han Vinck:
Influence of LED tubes on the throughput of an indoor broadband PLC channel. TSP 2017: 251-254 - [i9]Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:
Joint secrecy over the K-Transmitter Multiple Access Channel. CoRR abs/1701.06187 (2017) - [i8]Babak Nikfar, A. J. Han Vinck:
Relay Selection in Cooperative Power Line Communication: A Multi-Armed Bandit Approach. CoRR abs/1702.00977 (2017) - [i7]Chao Qi, Yanling Chen, A. J. Han Vinck, Xiaohu Tang:
Effects of Feedback on the One-sided Secrecy of Two-way Wiretap through Multiple Transmissions. CoRR abs/1707.05932 (2017) - [i6]Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Héla Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot N. Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan, Fatma Rouissi, Yuta Sakai, Ulrich Tamm, Joost van der Putten, Fons van der Sommen, A. J. Han Vinck, Tadashi Wadayama, Dirk Wübben, Hirosuke Yamamoto:
Proceedings of Workshop AEW10: Concepts in Information Theory and Communications. CoRR abs/1707.08567 (2017) - 2016
- [j63]Yanling Chen, Markku Niemenmaa, A. J. Han Vinck:
A general check digit system based on finite groups. Des. Codes Cryptogr. 80(1): 149-163 (2016) - [j62]Thokozani Shongwe, A. J. Han Vinck, Hendrik C. Ferreira:
Application of symbol avoidance in Reed-Solomon codes to improve their synchronization. Telecommun. Syst. 63(1): 77-88 (2016) - [j61]Young Gil Kim, A. J. Han Vinck:
4-Ary Codebook Design Using Reed-Muller Codes for MIMO Beamforming Systems. IEEE Trans. Veh. Technol. 65(2): 959-966 (2016) - [j60]Wei Jiang, Thomas Kaiser, A. J. Han Vinck:
A Robust Opportunistic Relaying Strategy for Co-Operative Wireless Communications. IEEE Trans. Wirel. Commun. 15(4): 2642-2655 (2016) - [c50]Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:
On secure communication over the multiple access channel. ISITA 2016: 350-354 - [c49]Chao Qi, Yanling Chen, A. J. Han Vinck, Xiaohu Tang:
Secrecy coding for the binary multiplying wiretap channel. ISITA 2016: 621-625 - [c48]Chao Qi, Yanling Chen, A. J. Han Vinck, Xiaohu Tang:
One-sided secrecy over the two-way wiretap channel. ISITA 2016: 626-630 - [c47]Lucas Giroto de Oliveira, Guilherme Ribeiro Colen, Moisés Vidal Ribeiro, A. J. Han Vinck:
Narrow-band interference error correction in coded OFDM-based PLC systems. ISPLC 2016: 13-18 - [c46]Arnold S. de Beer, Frank Nonso Igboamalu, A. Sheri, Hendrik C. Ferreira, A. J. Han Vinck:
Contactless Power Line Communications at 2.45GHz. ISPLC 2016: 42-45 - [c45]Guilherme Ribeiro Colen, Lucas Giroto de Oliveira, A. J. Han Vinck, Moisés Vidal Ribeiro:
Resource allocation in OFDM-based PLC systems impaired by additive impulsive Gaussian noise. ISPLC 2016: 70-75 - 2015
- [j59]Zhuojun Zhuang, Bin Dai, Yuan Luo, A. J. Han Vinck:
Secure error-correcting network codes with side information leakage. IET Commun. 9(8): 1068-1075 (2015) - [j58]Bin Dai, A. J. Han Vinck, Yuan Luo, Zheng Ma:
Capacity-equivocation region of a special case of wiretap channel with noiseless feedback. J. Commun. Networks 17(1): 21-26 (2015) - [c44]Alain Richard Ndjiongue, Hendrik C. Ferreira, A. J. Han Vinck:
Segmental analysis of the transmission in CSK systems based on the Euclidean distance. AFRICON 2015: 1-5 - [c43]Allan Emleh, Arnold S. de Beer, Hendrik C. Ferreira, A. J. Han Vinck:
On mercury vapor lamps and their effect on the smart-grid plc channel. AMPS 2015: 1-6 - [c42]Alain Richard Ndjiongue, Thokozani Shongwe, Hendrik C. Ferreira, Telex Magloire Nkouatchah Ngatched, A. J. Han Vinck:
Cascaded PLC-VLC Channel Using OFDM and CSK Techniques. GLOBECOM 2015: 1-6 - [c41]Sean Jordaan, Petrus A. Janse van Rensburg, Arnold S. de Beer, Hendrik C. Ferreira, A. J. Han Vinck:
A preliminary investigation of the UHF properties of LV cable for WiFi over power line communications. ISPLC 2015: 35-40 - [c40]Allan Emleh, Arnold S. de Beer, Hendrik C. Ferreira, A. J. Han Vinck:
The influence of high pressure sodium lamps on the power line communications channel. ISPLC 2015: 172-177 - [c39]Thokozani Shongwe, A. J. Han Vinck, Hendrik C. Ferreira:
The effects of periodic impulsive noise on OFDM. ISPLC 2015: 189-194 - [c38]Allan Emleh, Arnold S. de Beer, Hendrik C. Ferreira, A. J. Han Vinck:
Noise generated by modern lamps and the influence on the smart-grid communication network. SmartGridComm 2015: 7-12 - [c37]Babak Nikfar, Setareh Maghsudi, A. J. Han Vinck:
Multi-armed bandit channel selection for power line communication. SmartGridComm 2015: 19-24 - [i5]A. J. Han Vinck, Fatma Rouissi, Thokozani Shongwe, Guilherme R. Colen, Lucas Giroto de Oliveira:
Impulse Noise and Narrowband PLC. CoRR abs/1509.07236 (2015) - 2014
- [j57]Zhuojun Zhuang, Bin Dai, Yuan Luo, A. J. Han Vinck:
On the relative profiles of a linear code and a subcode. Des. Codes Cryptogr. 72(2): 219-247 (2014) - [j56]Zhongtao Li, Shuai Zhao, A. J. Han Vinck, Ru Jia:
Efficient Codes for Writing Equal-bit Information in a WOM Twice. J. Multim. 9(4): 477-482 (2014) - [j55]Min Zeng, Yuan Luo, A. J. Han Vinck:
A Construction of Long-Period Sequences Based on Lightweight Generation and High Probability. IEEE Trans. Commun. 62(11): 4012-4023 (2014) - [j54]Yanling Chen, Markku Niemenmaa, A. J. Han Vinck, Danilo Gligoroski:
On the Error Detection Capability of One Check Digit. IEEE Trans. Inf. Theory 60(1): 261-270 (2014) - [c36]Reevana Balmahoon, A. J. Han Vinck, Ling Cheng:
Information leakage for correlated sources with compromised source symbols over wiretap channel II. Allerton 2014: 1302-1308 - [c35]Etuate Cocker, Firas Ghazzi, Ulrich Speidel, M.-C. Dong, V. Wong, A. J. Han Vinck, H. Yamamoto, H. Yokoo, Hiroyoshi Morita, Hendrik C. Ferreira, Allan Emleh, R. McFadzien, S. Palelei, Raimund Eimann:
Measurement of buffer requirement trends for real time traffic over TCP. HPSR 2014: 120-124 - [c34]Chao Qi, Yanling Chen, A. J. Han Vinck, Xiaohu Tang:
Binary transmissions over Gaussian wiretap channel under soft/hard decision decoding. ISITA 2014: 403-407 - [c33]A. J. Han Vinck, Aram Jivanyan, Jonas Winzen:
Gaussian fuzzy commitment. ISITA 2014: 571-574 - [i4]Reevana Balmahoon, A. J. Han Vinck, Ling Cheng:
Correlated Source Coded Sequences with Compromised Channel and Source Symbols using Shannon's Cipher System. CoRR abs/1410.8805 (2014) - 2013
- [j53]Bin Dai, A. J. Han Vinck, Yuan Luo, Xiaohu Tang:
Wiretap Channel with Action-Dependent Channel State Information. Entropy 15(2): 445-473 (2013) - [j52]Bin Dai, A. J. Han Vinck, Yuan Luo, Zhuojun Zhuang:
Capacity Region of a New Bus Communication Model. Entropy 15(2): 678-697 (2013) - [j51]Bin Dai, Adrianus J. Han Vinck, Yuan Luo:
Wiretap Channel in the Presence of Action-Dependent States and Noiseless Feedback. J. Appl. Math. 2013: 423619:1-423619:17 (2013) - [j50]Der-Feng Tseng, Yunghsiang S. Han, Wai Ho Mow, Po-Ning Chen, Jing Deng, A. J. Han Vinck:
Robust Decoding for Convolutionally Coded Systems Impaired by Memoryless Impulsive Noise. IEEE Trans. Commun. 61(11): 4640-4652 (2013) - [c32]Tarik Akbudak, Andreas Czylwik, A. J. Han Vinck:
System level evaluation of cooperative MIMO-OFDMA-based heterogeneous networks. ICC Workshops 2013: 1172-1177 - 2012
- [j49]Der-Feng Tseng, Yunghsiang Sam Han, Wai Ho Mow, Li-Chung Chang, A. J. Han Vinck:
Robust Clipping for OFDM Transmissions over Memoryless Impulsive Noise Channels. IEEE Commun. Lett. 16(7): 1110-1113 (2012) - [c31]Bin Dai, A. J. Han Vinck, Yuan Luo, Zhuojun Zhuang:
Capacity region of non-degraded wiretap channel with noiseless feedback. ISIT 2012: 244-248 - [c30]Bin Dai, Jiehua Hong, A. J. Han Vinck, Yuan Luo, Zhuojun Zhuang:
Degraded broadcast channel with noncausal side information, confidential messages and noiseless feedback. ISIT 2012: 438-442 - [c29]Martin A. Vinck, Francesco P. Battaglia, Vladimir B. Balakirsky, A. J. Han Vinck, Cyriel M. A. Pennartz:
Estimation of the entropy on the basis of its polynomial representation. ISIT 2012: 1054-1058 - [c28]Yanling Chen, Markku Niemenmaa, A. J. Han Vinck, Danilo Gligoroski:
On some properties of a check digit system. ISIT 2012: 1563-1567 - [c27]Vladimir B. Balakirsky, A. J. Han Vinck:
Authentication over noisy data with the use of memory containing metric functions. ISIT 2012: 1977-1981 - [i3]Bin Dai, A. J. Han Vinck, Zhuojun Zhuang, Yuan Luo:
Information-Theoretical Security for Several Models of Multiple-Access Channel. CoRR abs/1208.1697 (2012) - 2011
- [j48]Yanling Chen, A. J. Han Vinck:
Secrecy coding for the binary symmetric wiretap channel. Secur. Commun. Networks 4(8): 966-978 (2011) - [j47]Vladimir B. Balakirsky, A. J. Han Vinck:
Performance of the verification for binary memoryless channels. Secur. Commun. Networks 4(10): 1212-1225 (2011) - [c26]Allan Emleh, Hendrik C. Ferreira, A. J. Han Vinck, A. J. Snyders:
Received noise on powerline communications where the in-building wiring acts as an antenna. AFRICON 2011: 1-6 - [c25]Vladimir B. Balakirsky, A. J. Han Vinck:
Biometric Authentication Based on Significant Parameters. BIOID 2011: 13-24 - [c24]A. J. Han Vinck:
Applications of coding and information theory in biometrics. EUSIPCO 2011: 2254-2258 - [c23]Yanling Chen, A. J. Han Vinck:
A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel. SECRYPT 2011: 168-177 - [i2]A. J. Han Vinck:
Coded Modulation for Power Line Communications. CoRR abs/1104.1528 (2011) - 2010
- [j46]Vladimir B. Balakirsky, A. J. Han Vinck:
A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data. EURASIP J. Inf. Secur. 2010 (2010) - [j45]Hristo Kostadinov, Hiroyoshi Morita, Noboru Iijima, A. J. Han Vinck, Nikolai L. Manev:
Soft Decoding of Integer Codes and Their Application to Coded Modulation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(7): 1363-1370 (2010) - [j44]Yuan Luo, A. J. Han Vinck, Yanling Chen:
On the optimum distance profiles about linear block codes. IEEE Trans. Inf. Theory 56(3): 1007-1014 (2010) - [j43]Yanling Chen, A. J. Han Vinck:
A lower bound on the optimum distance profiles of the second-order Reed-Muller codes. IEEE Trans. Inf. Theory 56(9): 4309-4320 (2010) - [j42]Daniel J. J. Versfeld, A. J. Han Vinck, James N. Ridley, Hendrik C. Ferreira:
Constructing Coset Codes With Optimal Same-Symbol Weight for Detecting Narrowband Interference in M-FSK Systems. IEEE Trans. Inf. Theory 56(12): 6347-6353 (2010) - [c22]Vladimir B. Balakirsky, A. J. Han Vinck:
Direct biometric verification schemes with Gaussian data. ISITA 2010: 48-53
2000 – 2009
- 2009
- [j41]Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Mathematical model for constructing passwords from biometrical data. Secur. Commun. Networks 2(1): 1-9 (2009) - [c21]Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Constructing Passwords from Biometrical Data. ICB 2009: 889-898 - [c20]Anil Mengi, A. J. Han Vinck:
Coded modulation with a constraint on the minimum channel symbol duration. ISIT 2009: 1544-1548 - [c19]Yanling Chen, A. J. Han Vinck:
The optimum distance profiles of the second order Reed-Muller codes. ISIT 2009: 2236-2240 - [c18]Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Combinatorial data reduction algorithm and its applications to biometric verification. ISIT 2009: 2246-2250 - [i1]Yanling Chen, A. J. Han Vinck:
Notes on Reed-Muller Codes. CoRR abs/0901.2062 (2009) - 2008
- [j40]Peisheng Wang, Luo Yuan, A. J. Han Vinck:
Some Upper Bounds on the Inverse Relative Dimension/Length Profile. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(12): 3731-3737 (2008) - [j39]Yanling Chen, A. J. Han Vinck:
Wiretap Channel With Side Information. IEEE Trans. Inf. Theory 54(1): 395-402 (2008) - [j38]Simon Plass, Gerd Richter, A. J. Han Vinck:
Coding Schemes for Crisscross Error Patterns. Wirel. Pers. Commun. 47(1): 39-49 (2008) - [c17]Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Additive Block Coding Schemes for Biometric Authentication with the DNA Data. BIOID 2008: 160-169 - [c16]A. J. Han Vinck, Yuan Luo:
Optimum distance profiles of linear block codes. ISIT 2008: 1958-1962 - [c15]Bin Dai, Yuan Luo, A. J. Han Vinck:
Wiretap Channel with Side Information from Part of Encoder. NPC Workshops 2008: 353-357 - [c14]Ulrike Korte, Michael Krawczak, Johannes Merkle, Rainer Plaga, Matthias Niesing, Carsten Tiemann, A. J. Han Vinck, Ulrich Martini:
A Cryptographic Biometric Authentication System based on Genetic Fingerprints. Sicherheit 2008: 263-276 - 2007
- [j37]Hsiao-Hwa Chen, Shin-Wei Chu, Noriyoshi Kuroyanagi, A. J. Han Vinck:
An algebraic approach to generate super-set of perfect complementary codes for interference-free CDMA. Wirel. Commun. Mob. Comput. 7(5): 605-622 (2007) - [c13]Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
An Algorithm for Biometric Authentication Based on the Model of Non-Stationary Random Processes. ICB 2007: 319-327 - [c12]Samvel Martirosyan, A. J. Han Vinck, Ashot N. Harutyunyan:
On Optical Orthogonal, Cyclically Permutable, and Super Optical Orthogonal Codes. ISIT 2007: 2406-2410 - [c11]Yanling Chen, A. J. Han Vinck:
An Achievable Region of Gaussian Wiretap Channel with Side Information. ISIT 2007: 2476-2480 - [c10]Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Testing the Independence of Two Non-Stationary Random Processes with Applications to Biometric Authentication. ISIT 2007: 2671-2675 - [c9]Young Gil Kim, A. J. Han Vinck:
A New Collision Arbitration Algorithm for FM0 Code in RFID Applications. MUE 2007: 992-994 - 2006
- [j36]Hsiao-Hwa Chen, Yu-Ching Yeh, Xi Zhang, Aiping Huang, Yang Yang, Jie Li, Yang Xiao, Hamid Sharif, A. J. Han Vinck:
Generalized pairwise complementary codes with set-wise uniform interference-free windows. IEEE J. Sel. Areas Commun. 24(1): 65-74 (2006) - [j35]Chaichana Mitrpant, A. J. Han Vinck, Luo Yuan:
An achievable region for the Gaussian wiretap channel with side information. IEEE Trans. Inf. Theory 52(5): 2181-2190 (2006) - [c8]Vladimir B. Balakirsky, A. J. Han Vinck:
Coding Schemes for Data Transmission over Bus Systems. ISIT 2006: 1778-1782 - [c7]Ashot N. Harutyunyan, A. J. Han Vinck:
Error Exponent in AVS Coding. ISIT 2006: 2166-2170 - [c6]Yanling Chen, A. J. Han Vinck:
Wiretap channel with side information. ISIT 2006: 2607-2611 - 2005
- [j34]Hendrik C. Ferreira, A. J. Han Vinck, Theo G. Swart, Ian de Beer:
Permutation trellis codes. IEEE Trans. Commun. 53(11): 1782-1789 (2005) - [j33]Luo Yuan, Chaichana Mitrpant, A. J. Han Vinck, Kefei Chen:
Some new characters on the wire-tap channel of type II. IEEE Trans. Inf. Theory 51(3): 1222-1229 (2005) - 2004
- [j32]Fang-Wei Fu, A. J. Han Vinck, Victor K. Wei, Raymond W. Yeung:
On the capacity of write-unidirectional memories with nonperiodic codes. IEEE Trans. Inf. Theory 50(4): 649-656 (2004) - [j31]Jürgen Häring, Adrianus J. Han Vinck:
Coding and signal space diversity for a class of fading and impulsive noise channels. IEEE Trans. Inf. Theory 50(5): 887-895 (2004) - [c5]Young Gil Kim, A. J. Han Vinck:
Capacity of BPSK signaling in fading channels with generalized selection combining. ICC 2004: 224-228 - [c4]Chaichana Mitrpant, Yuan Luo, A. J. Han Vinck:
Achieving the perfect secrecy for the Gaussian wiretap channel with side information. ISIT 2004: 47 - [c3]Vladimir B. Balakirsky, A. J. Han Vinck:
Achievable rates and decoding error probability for parallel channels with dependent noise and restricted number of active users. ISIT 2004: 480 - [c2]Yuan Luo, Fang-Wei Fu, Chaichana Mitrpant, A. J. Han Vinck:
A generalization of MDS codes. ISIT 2004: 525 - 2003
- [j30]Niovi Pavlidou, A. J. Han Vinck, Javad Yazdani, Bahram Honary:
Power line communications: state of the art and future trends. IEEE Commun. Mag. 41(4): 34-40 (2003) - [j29]Fotini-Niovi Pavlidou, Haniph A. Latchman, A. J. Han Vinck, Richard E. Newman:
Powerline communications and applications. Int. J. Commun. Syst. 16(5): 357-361 (2003) - [j28]Vladimir B. Balakirsky, A. J. Han Vinck:
On the Performance of Permutation Codes for Multi-User Communication. Probl. Inf. Transm. 39(3): 239-254 (2003) - [j27]Luo Yuan, Wende Chen, A. J. Han Vinck:
The Determination of the Chain Good Weight Hierarchies with High Dimension. SIAM J. Discret. Math. 17(2): 196-209 (2003) - [j26]Jürgen Häring, Adrianus J. Han Vinck:
Iterative decoding of codes over complex numbers for impulsive noise channels. IEEE Trans. Inf. Theory 49(5): 1251-1260 (2003) - [j25]Luo Yuan, Fang-Wei Fu, A. J. Han Vinck, Wende Chen:
On constant-composition codes over Zq. IEEE Trans. Inf. Theory 49(11): 3010-3016 (2003) - 2002
- [j24]Samvel Martirosyan, A. J. Han Vinck:
A Construction for Optical Orthogonal Codes with Correlation 1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 269-272 (2002) - [j23]Jürgen Häring, Adrianus J. Han Vinck:
Performance bounds for optimum and suboptimum reception under Class-A impulsive noise. IEEE Trans. Commun. 50(7): 1130-1136 (2002) - [j22]Tadashi Wadayama, A. J. Han Vinck:
DC-free binary convolutional coding. IEEE Trans. Inf. Theory 48(1): 162-173 (2002) - 2001
- [j21]Christoph Haslach, A. J. Han Vinck:
Correction to "A decoding algorithm with restrictions for array codes". IEEE Trans. Inf. Theory 47(1): 479 (2001) - [c1]Vladimir B. Balakirsky, A. J. Han Vinck:
Constructions of specific permutation codes for multi-user communication. ITW 2001: 79-81
1990 – 1999
- 1999
- [j20]Fang-Wei Fu, A. J. Han Vinck:
On the Capacity of Generalized Write-Once Memory with State Transitions Described by an Arbitrary Directed Acyclic Graph. IEEE Trans. Inf. Theory 45(1): 308-313 (1999) - [j19]Christoph Haslach, A. J. Han Vinck:
A decoding algorithm with restrictions for array codes. IEEE Trans. Inf. Theory 45(7): 2339-2344 (1999) - 1998
- [j18]Fang-Wei Fu, A. J. Han Vinck, Shi-Yi Shen:
On the Constructions of Constant-Weight Codes. IEEE Trans. Inf. Theory 44(1): 328-333 (1998) - [j17]A. J. Han Vinck, Petr Dolezal, Young Gil Kim:
Convolutional Encoder State Estimation. IEEE Trans. Inf. Theory 44(4): 1604-1608 (1998) - 1997
- [j16]W. C. Ferreira, Willem A. Clarke, Albertus S. J. Helberg, Khaled A. S. Abdel-Ghaffar, A. J. Han Vinck:
Insertion/deletion correction with spectral nulls. IEEE Trans. Inf. Theory 43(2): 722-732 (1997) - 1996
- [j15]Alexander V. Kuznetsov, Francis Swarts, A. J. Han Vinck, Hendrik C. Ferreira:
On the undetected error probability of linear block codes on channels with memory. IEEE Trans. Inf. Theory 42(1): 303-309 (1996) - [j14]Feng-Wen Sun, A. J. Han Vinck:
An algorithm for identifying rate (n-1)/n catastrophic punctured convolutional encoders. IEEE Trans. Inf. Theory 42(3): 1010-1013 (1996) - [j13]Hiroyoshi Morita, Adriaan J. de Lind van Wijngaarden, A. J. Han Vinck:
On the construction of maximal prefix-synchronized codes. IEEE Trans. Inf. Theory 42(6): 2158-2166 (1996) - [j12]A. J. Han Vinck, K. Jeroen Keuning:
On the capacity of the asynchronous T-user M-frequency noiseless multiple-access channel without intensity information. IEEE Trans. Inf. Theory 42(6): 2235-2238 (1996) - 1994
- [j11]Alexander V. Kuznetsov, A. J. Han Vinck:
On the general defective channel with informed encoder and capacities of some constrained memories. IEEE Trans. Inf. Theory 40(6): 1866-1871 (1994) - 1993
- [j10]Vladimir I. Levenshtein, A. J. Han Vinck:
Perfect (d, k)-codes capable of correcting single peak-shifts. IEEE Trans. Inf. Theory 39(2): 656-662 (1993) - [j9]Alexander V. Kuznetsov, A. J. Han Vinck:
A coding scheme for single peak-shift correction in (d, k)-constrained channels. IEEE Trans. Inf. Theory 39(4): 1444-1450 (1993) - 1991
- [j8]Robert Schweikert, Adrianus J. Han Vinck:
A convolutional single-parity-check concatenated coding scheme for high-data-rate applications. IEEE Trans. Commun. 39(1): 4-7 (1991)
1980 – 1989
- 1989
- [j7]A. J. Han Vinck, Karel A. Post:
On the influence of coding on the mean time to failure for degrading memories with defects. IEEE Trans. Inf. Theory 35(4): 902-906 (1989) - 1987
- [j6]J. Martin Borden, A. J. Han Vinck:
On coding for 'stuck-at' defects. IEEE Trans. Inf. Theory 33(5): 729-735 (1987) - 1985
- [j5]A. J. Han Vinck, Wim L. M. Hoeks, Karel A. Post:
On the capacity of the two-user M -ary multiple-access channel with feedback. IEEE Trans. Inf. Theory 31(4): 540-543 (1985) - 1984
- [j4]A. J. Han Vinck:
A Low Complexity Stack Decoder for a Class of Binary Rate (n-1)/n Convolutional Codes. IEEE Trans. Commun. 32(4): 476-479 (1984) - 1980
- [j3]Adrianus J. Han Vinck, Anne De Paepe, Joost Schalkwijk:
A class of binary rate one-half convolutional codes that allows an improved stack decoder. IEEE Trans. Inf. Theory 26(4): 389-392 (1980)
1970 – 1979
- 1978
- [j2]Joost Schalkwijk, A. J. Han Vinck, Karel A. Post:
Syndrome decoding of binary-rate k/n convolutional codes. IEEE Trans. Inf. Theory 24(5): 553-562 (1978) - 1975
- [j1]Joost Schalkwijk, A. J. Han Vinck:
Syndrome Decoding of Convolutional Codes. IEEE Trans. Commun. 23(7): 789-792 (1975)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-26 19:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint