Follow
Hua Wang
Hua Wang
Verified email at qti.qualcomm.com
Title
Cited by
Cited by
Year
Gaussian interference channel capacity to within one bit
RH Etkin, NC David, H Wang
IEEE Transactions on information theory 54 (12), 5534-5562, 2008
14852008
A secure multicast protocol with copyright protection
H Chu, L Qiao, K Nahrstedt, H Wang, R Jain
ACM SIGCOMM Computer Communication Review 32 (2), 42-60, 2002
1282002
Vector Gaussian multiple description with individual and central receivers
H Wang, P Viswanath
IEEE Transactions on Information Theory 53 (6), 2133-2153, 2007
812007
Vector Gaussian multiple description with two levels of receivers
H Wang, P Viswanath
IEEE Transactions on Information Theory 55 (1), 401-410, 2008
452008
Gaussian interference channel capacity to within one bit: the symmetric case
R Etkin, NC David, H Wang
2006 IEEE Information Theory Workshop-ITW'06 Chengdu, 601-605, 2006
302006
Gaussian interference channel capacity to within one bit: the general case
RH Etkin, NC David, H Wang
2007 IEEE International Symposium on Information Theory, 2181-2185, 2007
292007
The capacity region of the source-type model for secret key and private key generation
H Zhang, L Lai, Y Liang, H Wang
IEEE Transactions on Information Theory 60 (10), 6389-6398, 2014
272014
On network interference management
A Jovičić, H Wang, P Viswanath
IEEE transactions on information theory 56 (10), 4941-4955, 2010
252010
Fixed binning schemes: An operational duality between channel and source coding problems with side information
H Wang, P Viswanath
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 197, 2004
92004
Fixed binning schemes for channel and source coding problems: An operational duality
H Wang, P Viswanath
IEEE Trans. Inf. Theory, 2004
92004
Secret key-private key generation over three terminals: Capacity region
H Zhang, L Lai, Y Liang, H Wang
2014 IEEE International Symposium on Information Theory, 1141-1145, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–11