default search action
Kenneth W. Shum
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j67]Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yixian Yang:
Optimal ternary locally repairable codes. Des. Codes Cryptogr. 92(9): 2685-2704 (2024) - [j66]Wei Zhao, Kenneth W. Shum, Shenghao Yang:
A characterization of optimal constacyclic locally repairable codes. Discret. Math. 347(5): 113901 (2024) - [j65]Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong, Yijin Zhang:
Corrections to "Multichannel Conflict-Avoiding Codes of Weights Three and Four". IEEE Trans. Inf. Theory 70(8): 6118-6120 (2024) - 2023
- [c74]Zhihang Deng, Bing Zhu, Kenneth W. Shum, Weiping Wang:
Secure Fractional Repetition Codes for Distributed Storage Systems. GLOBECOM 2023: 2209-2214 - [c73]Linglin Kong, Kenneth W. Shum, Chi Wan Sung:
Bayesian Inference and Greedy Task Allocation for Edge Computing Systems with Uncertainty. ICC 2023: 2798-2803 - [c72]Xianzhi Du, Bing Zhu, Zhihang Deng, Kenneth W. Shum, Weiping Wang:
ISAA: Boost Repair Process by Constructing the Degree Constrained Optimal Repair Tree for Erasure-coded Systems. ICPADS 2023: 194-199 - [c71]Haojun Li, Yi Chen, Kenneth W. Shum, Chi Wan Sung:
Data Allocation for Approximate Gradient Coding in Edge Networks. ISIT 2023: 2541-2546 - [c70]Yongna Guo, Chi Wan Sung, Kenneth W. Shum:
Power Allocation and Data Assignment for Over-The-Air Distributed Learning. WiOpt 2023: 231-238 - [i35]Wei Zhao, Weixian Li, Shenghao Yang, Kenneth W. Shum:
Several Classes of Optimal Cyclic Locally Repairable Codes of Unbounded Code Lengths. CoRR abs/2304.00762 (2023) - 2022
- [j64]Bing Zhu, Kenneth W. Shum, Weiping Wang, Jianxin Wang:
An Improved Bound and Singleton-Optimal Constructions of Fractional Repetition Codes. IEEE Trans. Commun. 70(2): 749-758 (2022) - [c69]Zhihang Deng, Bing Zhu, Xianzhi Du, Kenneth W. Shum:
A Genetic Algorithm-based Construction of Fractional Repetition Codes. GLOBECOM 2022: 4244-4249 - [c68]Xuyu Zhao, Bing Zhu, Zhiwei Zeng, Weiping Wang, Kenneth W. Shum:
G-Update: A Group-based Update Scheme for Heterogenous Erasure-coded Storage Systems. HPCC/DSS/SmartCity/DependSys 2022: 1135-1140 - 2021
- [j63]Wei Zhao, Shenghao Yang, Kenneth W. Shum, Xilin Tang:
Repeated-Root Constacyclic Codes With Pair-Metric. IEEE Commun. Lett. 25(8): 2502-2506 (2021) - [j62]Fang Liu, Kenneth W. Shum, Yijin Zhang, Wing Shing Wong:
Sequence-Based Schemes for Broadcast and Unicast under Frequency Division Duplex. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(2): 376-383 (2021) - [j61]Tao Guo, Xuan Guang, Kenneth W. Shum:
On the Rate Region of Symmetric Multilevel Imperfect Secret Sharing. IEEE Trans. Commun. 69(1): 470-485 (2021) - [j60]Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong, Yijin Zhang:
Multichannel Conflict-Avoiding Codes of Weights Three and Four. IEEE Trans. Inf. Theory 67(6): 3557-3568 (2021) - [j59]Fang Liu, Kenneth W. Shum, Yijin Zhang, Wing Shing Wong:
Schedule Sequence Design for Broadcast in Multi-Channel Ad Hoc Networks. IEEE Trans. Veh. Technol. 70(5): 4767-4783 (2021) - [j58]Jun Zou, Chi Wan Sung, Kenneth W. Shum:
High-Dimensional Superposition NOMA and its User Pairing Strategy. IEEE Trans. Wirel. Commun. 20(6): 3800-3814 (2021) - [c67]Xiaopeng Cheng, Ximing Fu, Yuanxin Guo, Kenneth W. Shum, Shenghao Yang:
Successively Solvable Shift-Add Systems - a Graphical Characterization. ISIT 2021: 946-951 - [c66]Yiheng Zhang, Ximing Fu, Xuanchen Wu, Shenghao Yang, Kenneth W. Shum:
Solving Monoshift Systems and Applications in Random Coding. ISIT 2021: 1296-1301 - [c65]Jie Hao, Kenneth W. Shum, Shu-Tao Xia, Fang-Wei Fu, Yixian Yang:
On Optimal Quaternary Locally Repairable Codes. ISIT 2021: 3267-3272 - [i34]Wei Zhao, Kenneth W. Shum, Shenghao Yang:
Repeated-root Constacyclic Codes with Optimal Locality. CoRR abs/2111.12489 (2021) - [i33]Kenneth W. Shum, Jie Hao:
Optimal Quaternary (r, delta)-Locally Repairable Codes Achieving the Singleton-type Bound. CoRR abs/2112.05377 (2021) - 2020
- [j57]Jie Hao, Kenneth W. Shum, Shu-Tao Xia, Deyin Li:
Optimal Locally Repairable Codes for Parallel Reading. IEEE Access 8: 80447-80453 (2020) - [j56]Jingzhao Wang, Yuan Luo, Kenneth W. Shum:
Storage and repair bandwidth tradeoff for heterogeneous cluster distributed storage systems. Sci. China Inf. Sci. 63(2): 122301 (2020) - [j55]Xiyang Li, Kenneth W. Shum:
A mixed construction of variable-weight optical orthogonal code for optical code division multiple access networks. Phys. Commun. 39: 101025 (2020) - [j54]Fang Liu, Kenneth W. Shum, Wing Shing Wong:
Sequence-Based Unicast in Wireless Sensor Networks. IEEE Trans. Commun. 68(1): 429-444 (2020) - [j53]Shiqiu Liu, Kenneth W. Shum, Congduan Li:
Exact-Repair Codes With Partial Collaboration in Distributed Storage Systems. IEEE Trans. Commun. 68(7): 4012-4021 (2020) - [j52]Fangwei Ye, Shiqiu Liu, Kenneth W. Shum, Raymond W. Yeung:
On Secure Exact-Repair Regenerating Codes With a Single Pareto Optimal Point. IEEE Trans. Inf. Theory 66(1): 176-201 (2020) - [j51]Bing Zhu, Kenneth W. Shum, Hui Li:
Fractional Repetition Codes With Optimal Reconstruction Degree. IEEE Trans. Inf. Theory 66(2): 983-994 (2020) - [j50]Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yixian Yang:
Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach. IEEE Trans. Inf. Theory 66(12): 7465-7474 (2020) - [c64]Bing Zhu, Kenneth W. Shum, Weiping Wang, Jianxin Wang:
On the Optimal Minimum Distance of Fractional Repetition Codes. GLOBECOM 2020: 1-6 - [c63]Jun Zou, Kenneth W. Shum, Chi Wan Sung:
Spherical Code Superposition NOMA and Its User Pairing Strategy. GLOBECOM 2020: 1-6 - [c62]Wei Zhao, Kenneth W. Shum, Shenghao Yang:
Optimal Locally Repairable Constacyclic Codes of Prime Power Lengths. ISIT 2020: 7-12 - [c61]Kenneth W. Shum, Hanxu Hou:
Network Coding Based on Byte-wise Circular Shift and Integer Addition. ISIT 2020: 1641-1645 - [i32]Bing Zhu, Kenneth W. Shum, Weiping Wang, Jianxin Wang:
On the Optimal Minimum Distance of Fractional Repetition Codes. CoRR abs/2005.06823 (2020) - [i31]Kenneth W. Shum, Hanxu Hou:
Network Coding Based on Byte-wise Circular Shift and Integer Addition. CoRR abs/2005.07336 (2020) - [i30]Fang Liu, Kenneth W. Shum, Yijin Zhang, Wing Shing Wong:
Schedule Sequence Design for Broadcast in Multi-channel Ad Hoc Networks. CoRR abs/2009.09190 (2020) - [i29]Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong, Yijin Zhang:
Multichannel Conflict-Avoiding Codes of Weights Three and Four. CoRR abs/2009.11754 (2020)
2010 – 2019
- 2019
- [j49]Bing Zhu, Kenneth W. Shum, Hui Li:
On the Duality and File Size Hierarchy of Fractional Repetition Codes. Comput. J. 62(1): 150-160 (2019) - [j48]Xiyang Li, Kenneth W. Shum:
Mixed construction of OOC for optical code division multiple access networks. IET Commun. 13(7): 837-841 (2019) - [j47]Hanxu Hou, Patrick P. C. Lee, Kenneth W. Shum, Yuchong Hu:
Rack-Aware Regenerating Codes for Data Centers. IEEE Trans. Inf. Theory 65(8): 4730-4745 (2019) - [j46]Yijin Zhang, Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong:
New CRT sequence sets for a collision channel without feedback. Wirel. Networks 25(4): 1697-1709 (2019) - [c60]Yaru Fu, Kenneth W. Shum, Chi Wan Sung, Ye Liu:
Optimal User Pairing in Cache-Based NOMA Systems with Index Coding. ICC 2019: 1-6 - [c59]Yi Chen, Kenneth W. Shum, Wing Shing Wong:
CRT Sequences for Medium Access Control. ICCC 2019: 931-936 - [c58]Bing Zhu, Kenneth W. Shum, Hui Li, Weiping Wang:
On the Optimal Reconstruction Degree of Fractional Repetition Codes. ISIT 2019: 1557-1561 - [c57]Jie Hao, Kenneth W. Shum, Shu-Tao Xia, Yi-Xian Yang:
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound. ISIT 2019: 2828-2832 - [c56]Chi Wan Sung, Kenneth W. Shum:
Lattice-Superposition NOMA for Near-Far Users. ISPACS 2019: 1-2 - [i28]Jingzhao Wang, Tinghan Wang, Yuan Luo, Kenneth W. Shum:
Capacity of Distributed Storage Systems with Clusters and Separate Nodes. CoRR abs/1901.03000 (2019) - 2018
- [j45]Hanxu Hou, Yunghsiang S. Han, Kenneth W. Shum, Hui Li:
A Unified Form of EVENODD and RDP Codes and Their Efficient Decoding. IEEE Trans. Commun. 66(11): 5053-5066 (2018) - [j44]Xueqing Gong, Ping Hu, Kenneth W. Shum, Chi Wan Sung:
A Zigzag-Decodable Ramp Secret Sharing Scheme. IEEE Trans. Inf. Forensics Secur. 13(8): 1906-1916 (2018) - [j43]Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum, Pan Zhou:
Proxy-Assisted Regenerating Codes With Uncoded Repair for Distributed Storage Systems. IEEE Trans. Inf. Theory 64(4): 2512-2528 (2018) - [j42]Yi Chen, Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong, Yijin Zhang:
CRT Sequences With Applications to Collision Channels Allowing Successive Interference Cancellation. IEEE Trans. Inf. Theory 64(4): 2910-2923 (2018) - [c55]Jie Hao, Yi-Xian Yang, Kenneth W. Shum, Shu-Tao Xia:
On the Maximal Code Length of Optimal Linear Locally Repairable Codes. ISIT 2018: 1326-1330 - [c54]Fangwei Ye, Shiqiu Liu, Kenneth W. Shum, Raymond W. Yeung:
On a Simple Characterization of Secure Exact-repair Regenerating Codes. ISIT 2018: 1695-1699 - [c53]Tao Guo, Xuan Guang, Kenneth W. Shum:
Symmetric Multilevel Imperfect Secret Sharing. ITW 2018: 1-5 - [c52]Fang Liu, Kenneth W. Shum, Wing Shing Wong:
A Distributed Unicast Scheme Based on Schedule Sequences in Ad Hoc Networks. ITW 2018: 1-5 - [i27]Hanxu Hou, Patrick P. C. Lee, Kenneth W. Shum, Yuchong Hu:
Rack-Aware Regenerating Codes for Data Centers. CoRR abs/1802.04031 (2018) - [i26]Hanxu Hou, Yunghsiang S. Han, Kenneth W. Shum, Hui Li:
A Unified Form of EVENODD and RDP Codes and Their Efficient Decoding. CoRR abs/1803.03508 (2018) - [i25]Fangwei Ye, Shiqiu Liu, Kenneth W. Shum, Raymond W. Yeung:
On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point. CoRR abs/1805.02989 (2018) - [i24]Bing Zhu, Kenneth W. Shum, Hui Li:
On the Duality and File Size Hierarchy of Fractional Repetition Codes. CoRR abs/1808.01933 (2018) - 2017
- [j41]Huayu Zhang, Hui Li, Kenneth W. Shum, Hanxu Hou, Shuo-Yen Robert Li:
Concurrent regenerating codes. IET Commun. 11(3): 362-369 (2017) - [j40]Fangwei Ye, Kenneth W. Shum, Raymond W. Yeung:
The Rate Region for Secure Distributed Storage Systems. IEEE Trans. Inf. Theory 63(11): 7038-7051 (2017) - [c51]Chi Wan Sung, Kenneth W. Shum, Quan Yu, Guangping Xu:
Maximally recoverable codes: Connections to generic network coding and maximal matching. ITW 2017: 36-40 - [c50]Bing Zhu, Kenneth W. Shum, Hui Li:
On the duality of fractional repetition codes. ITW 2017: 56-60 - [c49]Kenneth W. Shum, Yi Chen, Yuan-Hsun Lo, Wing Shing Wong, Yijin Zhang:
Protocol-sequence-based media-access control with successive interference cancellation (invited paper). WCSP 2017: 1-6 - [i23]Bing Zhu, Kenneth W. Shum, Hui Li:
On the Duality of Fractional Repetition Codes. CoRR abs/1710.07909 (2017) - 2016
- [j39]Majid Gerami, Ming Xiao, Mikael Skoglund, Kenneth W. Shum, DengSheng Lin:
Optimal-cost repair in multi-hop distributed storage systems with network coding. Trans. Emerg. Telecommun. Technol. 27(11): 1539-1549 (2016) - [j38]Hanxu Hou, Kenneth W. Shum, Hui Li:
On the MDS Condition of Blaum-Bruck-Vardy Codes With Large Number Parity Columns. IEEE Commun. Lett. 20(4): 644-647 (2016) - [j37]Kenneth W. Shum, Junyu Chen:
Cooperative repair of multiple node failures in distributed storage systems. Int. J. Inf. Coding Theory 3(4): 299-323 (2016) - [j36]Chi Wan Sung, Kenneth W. Shum, Linyu Huang, Ho Yuet Kwan:
Linear Network Coding for Erasure Broadcast Channel With Feedback: Complexity and Algorithms. IEEE Trans. Inf. Theory 62(5): 2493-2503 (2016) - [j35]Hanxu Hou, Kenneth W. Shum, Minghua Chen, Hui Li:
BASIC Codes: Low-Complexity Regenerating Codes for Distributed Storage Systems. IEEE Trans. Inf. Theory 62(6): 3053-3069 (2016) - [c48]Bing Zhu, Xin Li, Hui Li, Kenneth W. Shum:
Replicated convolutional codes: A design framework for repair-efficient distributed storage codes. Allerton 2016: 1018-1024 - [c47]Fangwei Ye, Kenneth W. Shum, Raymond W. Yeung:
The rate region of secure exact-repair regenerating codes for 5 nodes. ISIT 2016: 1406-1410 - [i22]Huayu Zhang, Hui Li, Hanxu Hou, Kenneth W. Shum, Shuo-Yen Robert Li:
Concurrent Regenerating Codes and Scalable Application in Network Storage. CoRR abs/1604.06567 (2016) - [i21]Kenneth W. Shum, Junyu Chen:
Cooperative Repair of Multiple Node Failures in Distributed Storage Systems. CoRR abs/1607.08322 (2016) - [i20]Yijin Zhang, Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong:
New User-Irrepressible Protocol Sequences. CoRR abs/1611.03012 (2016) - 2015
- [j34]Kenneth W. Shum:
Optimal three-dimensional optical orthogonal codes of weight three. Des. Codes Cryptogr. 75(1): 109-126 (2015) - [j33]Quan Yu, Kenneth W. Shum, Chi Wan Sung:
Tradeoff between storage cost and repair cost in heterogeneous distributed storage systems. Trans. Emerg. Telecommun. Technol. 26(10): 1201-1211 (2015) - [j32]Bing Zhu, Kenneth W. Shum, Hui Li:
Heterogeneity-Aware Codes With Uncoded Repair for Distributed Storage Systems. IEEE Commun. Lett. 19(6): 901-904 (2015) - [j31]Bing Zhu, Hui Li, Kenneth W. Shum, Shuo-Yen Robert Li:
HFR code: a flexible replication scheme for cloud storage systems. IET Commun. 9(17): 2095-2100 (2015) - [j30]Fan Cheng, Raymond W. Yeung, Kenneth W. Shum:
Imperfect Secrecy in Wiretap Channel II. IEEE Trans. Inf. Theory 61(1): 628-636 (2015) - [c46]Shuo Yang, Ping Luo, Chen Change Loy, Kenneth W. Shum, Xiaoou Tang:
Deep Representation Learning with Target Coding. AAAI 2015: 3848-3854 - [c45]Bin Wang, Haibin Kan, Kenneth W. Shum:
Hermitian codes in distributed storage systems with optimal error-correcting capacity. ISIT 2015: 601-605 - [c44]Junyu Chen, Kenneth W. Shum, Quan Yu, Chi Wan Sung:
Sector-disk codes and partial MDS codes with up to three global parities. ISIT 2015: 1876-1880 - [c43]Kenneth W. Shum, Qifu Tyler Sun:
Lattice network codes over optimal lattices in low dimensions. IWSDA 2015: 113-117 - [i19]Bing Zhu, Hui Li, Kenneth W. Shum, Shuo-Yen Robert Li:
HFR Code: A Flexible Replication Scheme for Cloud Storage Systems. CoRR abs/1509.03800 (2015) - 2014
- [j29]Hung-Lin Fu, Yuan-Hsun Lo, Kenneth W. Shum:
Optimal conflict-avoiding codes of odd length and weight three. Des. Codes Cryptogr. 72(2): 289-309 (2014) - [j28]Bing Zhu, Kenneth W. Shum, Hui Li, Hanxu Hou:
General Fractional Repetition Codes for Distributed Storage Systems. IEEE Commun. Lett. 18(4): 660-663 (2014) - [j27]Yijin Zhang, Kenneth W. Shum, Wing Shing Wong, Feng Shu:
Binary Sequences for Multiple Access Collision Channel: Identification and Synchronization. IEEE Trans. Commun. 62(2): 667-675 (2014) - [j26]Xiaogang Liu, Yuan Luo, Kenneth W. Shum:
On the Optimum Cyclic Subcode Chains of RM(2, m)* for Increasing Message Length. IEEE Trans. Commun. 62(7): 2145-2155 (2014) - [j25]Yi Wu, Kenneth W. Shum, Wing Shing Wong, Lianfeng Shen:
Safety-Message Broadcast in Vehicular Ad Hoc Networks Based on Protocol Sequences. IEEE Trans. Veh. Technol. 63(3): 1467-1479 (2014) - [j24]Mingjun Dai, Kenneth W. Shum, Chi Wan Sung:
Data Dissemination With Side Information and Feedback. IEEE Trans. Wirel. Commun. 13(9): 4708-4720 (2014) - [c42]Bing Zhu, Hui Li, Kenneth W. Shum:
Repair efficient storage codes via combinatorial configurations. IEEE BigData 2014: 80-81 - [c41]Yijin Zhang, Kenneth W. Shum, Wing Shing Wong, Feng Shu:
An energy-aware reliable deterministic broadcast protocol for wireless sensor networks. GLOBECOM Workshops 2014: 1427-1432 - [c40]Hanxu Hou, Kenneth W. Shum, Minghua Chen, Hui Li:
New MDS array code correcting multiple disk failures. GLOBECOM 2014: 2369-2374 - [c39]Bing Zhu, Kenneth W. Shum, Hui Li, Shuo-Yen Robert Li:
On low repair complexity storage codes via group divisible designs. ISCC 2014: 1-5 - [c38]Kenneth W. Shum, Hanxu Hou, Minghua Chen, Huanle Xu, Hui Li:
Regenerating codes over a binary cyclic code. ISIT 2014: 1046-1050 - [c37]Ping Hu, Kenneth W. Shum, Chi Wan Sung:
The fundamental theorem of distributed storage systems revisited. ITW 2014: 65-69 - [c36]Bing Zhu, Hui Li, Hanxu Hou, Kenneth W. Shum:
Replication-based distributed storage systems with variable repetition degrees. NCC 2014: 1-5 - 2013
- [j23]Riccardo Bassoli, Hugo Marques, Jonathan Rodriguez, Kenneth W. Shum, Rahim Tafazolli:
Network Coding Theory: A Survey. IEEE Commun. Surv. Tutorials 15(4): 1950-1978 (2013) - [j22]Qifu Tyler Sun, Jinhong Yuan, Tao Huang, Kenneth W. Shum:
Lattice Network Codes Based on Eisenstein Integers. IEEE Trans. Commun. 61(7): 2713-2725 (2013) - [j21]Kenneth W. Shum, Yuchong Hu:
Cooperative Regenerating Codes. IEEE Trans. Inf. Theory 59(11): 7229-7258 (2013) - [c35]Hanxu Hou, Kenneth W. Shum, Hui Li:
Construction of exact-BASIC codes for distributed storage systems at the MSR point. IEEE BigData 2013: 33-38 - [c34]Yi Wu, Kenneth W. Shum:
Deterministic vs random access schemes - A case study in mobile ad hoc networks. ICAIT 2013: 216-218 - [c33]Yi Wu, Kenneth W. Shum, Zihuai Lin, Wing Shing Wong, Lianfeng Shen:
Protocol sequences for mobile ad hoc networks. ICC 2013: 1730-1735 - [c32]Hanxu Hou, Hui Li, Kenneth W. Shum:
General self-repairing codes for distributed storage systems. ICC 2013: 4358-4362 - [c31]Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum:
Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems. INFOCOM 2013: 2355-2363 - [c30]Satyajit Thakor, Terence Chan, Kenneth W. Shum:
Symmetry in distributed storage systems. ISIT 2013: 1242-1246 - [c29]Junyu Chen, Kenneth W. Shum:
Repairing multiple failures in the Suh-Ramchandran regenerating codes. ISIT 2013: 1441-1445 - [c28]Hanxu Hou, Kenneth W. Shum, Minghua Chen, Hui Li:
BASIC regenerating code: Binary addition and shift for exact repair. ISIT 2013: 1621-1625 - [c27]Chung Chan, Kenneth W. Shum, Qifu Tyler Sun:
Combinatorial flow over cyclic linear networks. ITW 2013: 1-5 - [c26]Chun Meng, Hulya Seferoglu, Athina Markopoulou, Kenneth W. Shum, Chung Chan:
Multicast packing for coding across multiple unicasts. NetCod 2013: 1-6 - [i18]Junyu Chen, Kenneth W. Shum:
Repairing Multiple Failures in the Suh-Ramchandran Regenerating Codes. CoRR abs/1302.1256 (2013) - [i17]Majid Gerami, Ming Xiao, Mikael Skoglund, Kenneth W. Shum, DengSheng Lin:
Optimized-Cost Repair in Multi-hop Distributed Storage Systems with Network Coding. CoRR abs/1303.6046 (2013) - [i16]Satyajit Thakor, Terence Chan, Kenneth W. Shum:
Symmetry in Distributed Storage Systems. CoRR abs/1305.3358 (2013) - [i15]Xiaogang Liu, Yuan Luo, Kenneth W. Shum:
On the Optimum Cyclic Subcode Chains of (2, m)* for Increasing Message Length. CoRR abs/1306.0710 (2013) - 2012
- [j20]Xiyang Li, Pingzhi Fan, Kenneth W. Shum:
Construction of Space/Wavelength/Time Spread Optical Code with Large Family Size. IEEE Commun. Lett. 16(6): 893-896 (2012) - [c25]Fan Cheng, Raymond W. Yeung, Kenneth W. Shum:
Imperfect secrecy in wiretap channel II. ISIT 2012: 71-75 - [c24]Kenneth W. Shum, Yuchong Hu:
Functional-repair-by-transfer regenerating codes. ISIT 2012: 1192-1196 - [c23]Kenneth W. Shum, Mingjun Dai, Chi Wan Sung:
Broadcasting with coded side information. PIMRC 2012: 89-94 - [i14]Fan Cheng, Raymond W. Yeung, Kenneth W. Shum:
Imperfect Secrecy in Wiretap Channel II. CoRR abs/1202.0859 (2012) - [i13]Ho Yuet Kwan, Kenneth W. Shum, Chi Wan Sung:
Linear Network Code for Erasure Broadcast Channel with Feedback: Complexity and Algorithms. CoRR abs/1205.5324 (2012) - [i12]Kenneth W. Shum, Yuchong Hu:
Cooperative Regenerating Codes. CoRR abs/1207.6762 (2012) - [i11]Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum:
Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems. CoRR abs/1208.2787 (2012) - 2011
- [j19]Chung Shue Chen, Kenneth W. Shum, Chi Wan Sung:
Round-robin power control for the weighted sum rate maximisation of wireless networks over multiple interfering links. Eur. Trans. Telecommun. 22(8): 458-470 (2011) - [j18]Yijin Zhang, Kenneth W. Shum, Wing Shing Wong:
Strongly Conflict-Avoiding Codes. SIAM J. Discret. Math. 25(3): 1035-1053 (2011) - [j17]Cho Yiu Ng, Kenneth W. Shum, Chi Wan Sung, Tat-Ming Lok:
A Layered Decomposition Framework for Resource Allocation in Multiuser Communications. IEEE Trans. Veh. Technol. 60(2): 729-733 (2011) - [j16]Yijin Zhang, Kenneth W. Shum, Wing Shing Wong:
Completely Irrepressible Sequences for the Asynchronous Collision Channel Without Feedback. IEEE Trans. Veh. Technol. 60(4): 1859-1866 (2011) - [c22]Quan Yu, Kenneth W. Shum, Chi Wan Sung:
Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration. GLOBECOM 2011: 1-5 - [c21]Kenneth W. Shum:
Cooperative Regenerating Codes for Distributed Storage Systems. ICC 2011: 1-5 - [c20]Ho Yuet Kwan, Kenneth W. Shum, Chi Wan Sung:
Generation of innovative and sparse encoding vectors for broadcast systems with feedback. ISIT 2011: 1161-1165 - [c19]Kenneth W. Shum, Yuchong Hu:
Exact minimum-repair-bandwidth cooperative regenerating codes for distributed storage systems. ISIT 2011: 1442-1446 - [c18]Kenneth W. Shum:
On conflict-avoiding codes of weight three and odd length. IWSDA 2011: 134-137 - [i10]Kenneth W. Shum:
Cooperative Regenerating Codes for Distributed Storage Systems. CoRR abs/1101.5257 (2011) - [i9]Kenneth W. Shum, Yuchong Hu:
Exact Minimum-Repair-Bandwidth Cooperative Regenerating Codes for Distributed Storage Systems. CoRR abs/1102.1609 (2011) - [i8]Ho Yuet Kwan, Kenneth W. Shum, Chi Wan Sung:
Generation of Innovative and Sparse Encoding Vectors for Broadcast Systems with Feedback. CoRR abs/1102.3527 (2011) - [i7]Quan Yu, Kenneth W. Shum, Chi Wan Sung:
Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration. CoRR abs/1107.5645 (2011) - 2010
- [j15]Kenneth W. Shum, Wing Shing Wong:
A tight asymptotic bound on the size of constant-weight conflict-avoiding codes. Des. Codes Cryptogr. 57(1): 1-14 (2010) - [j14]Ping Hu, Chi Wan Sung, Kenneth W. Shum:
Joint Channel-Network Coding for the Gaussian Two-Way Two-Relay Network. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j13]Cho Yiu Ng, Kenneth W. Shum, Chi Wan Sung, Tat-Ming Lok:
Rate Allocation for Cooperative Orthogonal-Division Channels with Dirty-Paper Coding. IEEE Trans. Commun. 58(10): 2949-2959 (2010) - [j12]Kenneth W. Shum, Wing Shing Wong, Chung Shue Chen:
A general upper bound on the size of constant-weight conflict-avoiding codes. IEEE Trans. Inf. Theory 56(7): 3265-3276 (2010) - [j11]Kenneth W. Shum, Wing Shing Wong:
Construction and Applications of CRT Sequences. IEEE Trans. Inf. Theory 56(11): 5780-5795 (2010) - [c17]Kenneth W. Shum, Wing Shing Wong:
Construction of short protocol sequences with worst-case throughput guarantee. ISIT 2010: 1828-1832 - [c16]Yijin Zhang, Kenneth W. Shum, Wing Shing Wong:
User-detectable sequences for the collision channel without feedback. ISWCS 2010: 770-774 - [c15]Kenneth W. Shum, Yijin Zhang, Wing Shing Wong:
User-Irrepressible Sequences. SETA 2010: 88-101 - [c14]Peng Zhang, Kenneth W. Shum, Chi Wan Sung:
Resource Allocation for Wireless Multi-Carrier Network with Receiver Cooperation. VTC Spring 2010: 1-5 - [i6]Chi Wan Sung, Kenneth W. Shum, Wing Ho A. Yuen:
Information Flow in One-Dimensional Vehicular Ad Hoc Networks. CoRR abs/1003.0953 (2010) - [i5]Kenneth W. Shum, Wing Shing Wong:
Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee. CoRR abs/1004.4713 (2010) - [i4]Kenneth W. Shum, Wing Shing Wong:
Construction and Applications of CRT Sequences. CoRR abs/1006.5762 (2010)
2000 – 2009
- 2009
- [j10]Chi Wan Sung, Qi Wang, Kenneth W. Shum:
Capacity region of the linear four-node half-duplex wireless relay network. IEEE Commun. Lett. 13(4): 224-226 (2009) - [j9]Yijin Zhang, Kenneth W. Shum, Wing Shing Wong:
On pairwise shift-invariant protocol sequences. IEEE Commun. Lett. 13(6): 453-455 (2009) - [j8]Chi Wan Sung, Kenneth W. Shum, Cho Yiu Ng:
Fair Resource Allocation for the Gaussian Broadcast Channel with ISI. IEEE Trans. Commun. 57(5): 1381-1389 (2009) - [j7]Kenneth W. Shum, Chung Shue Chen, Chi Wan Sung, Wing Shing Wong:
Shift-invariant protocol sequences for the collision channel without feedback. IEEE Trans. Inf. Theory 55(7): 3312-3322 (2009) - [c13]Wing Shing Wong, Kenneth W. Shum, Chung Shue Chen, Chi Wan Sung:
Design and construction of protocol sequences: Shift invariance and user irrepressibility. ISIT 2009: 1368-1372 - [c12]Chung Shue Chen, Kenneth W. Shum, Chi Wan Sung:
A power control algorithm for the sum rate maximization of wireless networks. PIMRC 2009: 1512-1516 - [c11]Kenneth W. Shum, Peng Zhang, Chi Wan Sung:
A transmission scheme for wireless network with receiver cooperation. PIMRC 2009: 2901-2905 - [i3]Kenneth W. Shum, Chi Wan Sung:
Achieving Capacity of Bi-Directional Tandem Collision Network by Joint Medium-Access Control and Channel-Network Coding. CoRR abs/0909.5007 (2009) - [i2]Kenneth W. Shum, Wing Shing Wong, Chung Shue Chen:
A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes. CoRR abs/0910.5073 (2009) - 2008
- [j6]Chi Wan Sung, Kenneth Wing-Kin Lui, Kenneth W. Shum, Hing-Cheung So:
Sum Capacity of One-Sided Parallel Gaussian Interference Channels. IEEE Trans. Inf. Theory 54(1): 468-472 (2008) - [c10]Kenneth W. Shum, Chi Wan Sung:
Transmitter cooperation by recycling dirty paper. ISIT 2008: 777-781 - 2007
- [j5]Kenneth W. Shum, Kin Kwong Leung, Chi Wan Sung:
Convergence of Iterative Waterfilling Algorithm for Gaussian Interference Channels. IEEE J. Sel. Areas Commun. 25(6): 1091-1100 (2007) - [c9]Cho Yiu Ng, Chi Wan Sung, Kenneth W. Shum:
Rate Allocation for Cooperative Transmission in Parallel Channels. GLOBECOM 2007: 3921-3925 - 2006
- [j4]Chi Wan Sung, Kenneth W. Shum, Kin Kwong Leung:
Stability of distributed power and signature sequence control for CDMA Systems-a game-theoretic framework. IEEE Trans. Inf. Theory 52(4): 1775-1780 (2006) - [c8]Ho Yuet Kwan, Chi Wan Sung, Kin Kwong Leung, Kenneth W. Shum:
Opportunistic Power Control with Rate Adaptation for Video Conferencing Services. ICC 2006: 5331-5335 - [c7]Kin Kwong Leung, Chi Wan Sung, Kenneth W. Shum:
Iterative Waterfilling for Parallel Gaussian Interference Channels. ICC 2006: 5491-5494 - [c6]Kenneth W. Shum, Chi Wan Sung:
Fair Rate Allocation in Some Gaussian Multiaccess Channels. ISIT 2006: 163-167 - [i1]Kenneth W. Shum, Chi Wan Sung:
On the Fairness of Rate Allocation in Gaussian Multiple Access Channel and Broadcast Channel. CoRR abs/cs/0611015 (2006) - 2004
- [c5]Kenneth W. Shum, Ian F. Blake, V. Kumar Murty:
On the zeta functions of two towers of function fields. ISIT 2004: 546 - 2003
- [c4]Kenneth W. Shum, Ian F. Blake:
Expander graphs and codes. Algebraic Coding Theory and Information Theory 2003: 57-68 - 2002
- [c3]Chi Wan Sung, Kenneth W. Shum:
Evaluation on the stability of discrete power control algorithms. PIMRC 2002: 1097-1101 - [c2]Kenneth W. Shum:
Permutation coding and MFSK modulation for frequency selective channel. PIMRC 2002: 2063-2066 - 2001
- [j3]Ilia Aleshnikov, P. Vijay Kumar, Kenneth W. Shum, Henning Stichtenoth:
On the splitting of places in a tower of function fields meeting the Drinfeld-Vladut bound. IEEE Trans. Inf. Theory 47(4): 1613-1619 (2001) - [j2]Kenneth W. Shum, Ilia Aleshnikov, P. Vijay Kumar, Henning Stichtenoth, Vinay Deolalikar:
A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound. IEEE Trans. Inf. Theory 47(6): 2225-2241 (2001) - [j1]Chi Wan Sung, Kenneth W. Shum:
Channel assignment and layer selection in hierarchical cellular system with fuzzy control. IEEE Trans. Veh. Technol. 50(3): 657-663 (2001)
1990 – 1999
- 1995
- [c1]Kenneth W. Shum:
Fuzzy distributed power control in cellular radio network. PIMRC 1995: 51-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint