default search action
George F. Elmasry
Person information
- affiliation: Rockwell Collins Advanced Technology Center, Cedar Rapids, USA
- affiliation: DSCI-XPRT Solutions, Inc.
- affiliation: New Jersey Institute of Technology, Department of Electrical & Compute Engineering, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c14]George F. Elmasry, Paul Corwin:
Operational Views of Vertical Tactical 5G. MILCOM 2021: 727-732 - [c13]George F. Elmasry, Paul Corwin:
Hiding the RF Signal Signature in Tactical 5G. MILCOM 2021: 733-738
2010 – 2019
- 2015
- [c12]George F. Elmasry, Brian Aanderud, Wayne Kraus, Robert J. McCabe:
Software-defined dynamic power-control and directional-reuse protocol for TDMA radios. MILCOM 2015: 139-144 - [c11]George F. Elmasry, Ben Haan, Robert J. McCabe:
Augmenting OLSR with Priority Aware Dynamic Routing for heterogeneous networking. MILCOM 2015: 401-406 - [c10]George F. Elmasry, Brian Aanderud, Timothy Arganbright:
A distributed, multi-tiered network agent for heterogeneous MANET resource optimization. MILCOM 2015: 738-743 - 2013
- [j7]George F. Elmasry:
The progress of tactical radios from legacy systems to cognitive radios. IEEE Commun. Mag. 51(10): 50-56 (2013) - [c9]George F. Elmasry, Jason Fournier, Gus Amouris, Matthew Weltman:
Aligning the Tactical GIG Server Hierarchy with HAIPE Dynamic Discovery Protocol. MILCOM 2013: 231-236 - 2012
- [c8]Junghoon Lee, George F. Elmasry, Keith Whittaker, Steve Lescrinier:
Wred performance analysis and design for tactical satellite communication. MILCOM 2012: 1-6 - [c7]Michael Vitt, George F. Elmasry, Manoj Jain:
Adaptation of RSVP-AGG protocol to tactical networks - A tactical edge open architecture concept. MILCOM 2012: 1-5 - 2011
- [j6]George F. Elmasry, Manoj Jain, Robert Welsh, Kimberly Jakubowski, Keith Whittaker:
Network management challenges for joint forces interoperability. IEEE Commun. Mag. 49(10): 81-89 (2011) - [c6]George F. Elmasry, Robert Welsh, Manoj Jain, Ben Hoe, Kimberly Jakubowski, Keith Whittaker, Giovanni Oddo:
The role of Network Operations in bringing commercial wireless to tactical networks. MILCOM 2011: 1416-1421 - 2010
- [j5]George F. Elmasry:
A comparative review of commercial vs. tactical wireless networks. IEEE Commun. Mag. 48(10): 54-59 (2010)
2000 – 2009
- 2009
- [j4]Yan L. Grushevsky, George F. Elmasry:
Adaptive RS codes for message delivery over an encrypted mobile network. IET Commun. 3(6): 1041-1049 (2009) - 2005
- [j3]George F. Elmasry, C. J. McCann, Robert Welsh:
Partitioning QoS management for secure tactical wireless ad hoc networks. IEEE Commun. Mag. 43(11): 116-123 (2005) - 2003
- [j2]Bin He, George F. Elmasry, Constantine N. Manikopoulos:
Joint lossless-source and channel coding using ARQ/go-back-(N, M) for image transmission. IEEE Trans. Image Process. 12(12): 1610-1617 (2003) - 2000
- [c5]George F. Elmasry, Yun Q. Shi:
2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images. IEEE International Conference on Multimedia and Expo (II) 2000: 731-734 - [c4]George F. Elmasry, Yun Q. Shi:
3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences. IEEE International Conference on Multimedia and Expo (II) 2000: 1037-
1990 – 1999
- 1999
- [j1]George F. Elmasry:
Joint lossless-source and channel coding using automatic repeat request. IEEE Trans. Commun. 47(7): 953-955 (1999) - [c3]George F. Elmasry, Yun-Qing Shi:
Maximum-likelihood sequence decoding of digital image watermarking. Security and Watermarking of Multimedia Contents 1999: 425-436 - [c2]George F. Elmasry, Yun Q. Shi:
MAP symbol decoding of arithmetic coding with embedded channel coding. WCNC 1999: 988-992 - 1998
- [c1]Jiwu Huang, George F. Elmasry, Yun Q. Shi:
Power constrained multiple signaling in digital image watermarking. MMSP 1998: 388-393
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint