Dr. Helen Y. Tang
Research Assistant
SPIE Involvement:
Author
Publications (6)

Proceedings Article | 28 May 2013
Proc. SPIE. 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013
KEYWORDS: Mathematical modeling, Defense and security, Sensors, Matrices, Computing systems, Computer programming, Systems modeling, Information security, Computer security, Network security

Proceedings Article | 28 May 2013
Proc. SPIE. 8755, Mobile Multimedia/Image Processing, Security, and Applications 2013
KEYWORDS: Defense and security, Tumor growth modeling, Data modeling, Reliability, Computing systems, Computer simulations, Information security, Computer security, Network security, Bayesian inference

Proceedings Article | 22 May 2013
Proc. SPIE. 8742, Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IV
KEYWORDS: Sensors, Receivers, Cryptography, Sensor networks, Telecommunications, Network architectures, Computer security, Network security, Symmetric-key encryption, Tin

Proceedings Article | 4 May 2012
Proc. SPIE. 8404, Wireless Sensing, Localization, and Processing VII
KEYWORDS: Warfare, Detection and tracking algorithms, Sensors, Computer simulations, Monte Carlo methods, Antennas, Signal detection, RF communications, Mobile communications, Received signal strength

Proceedings Article | 8 August 2003
Proc. SPIE. 5244, Performance and Control of Next-Generation Communications Networks
KEYWORDS: Signal attenuation, Complex systems, Computing systems, Control systems, Linear filtering, Computer simulations, Mathematics, Information technology, Analytical research, Computer engineering

Showing 5 of 6 publications
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Advertisement
Advertisement
Back to Top