throbber
DR. STEPHEN B. WICKER
`Professor Emeritus of Electrical and Computer Engineering,
`Cornell University
`
`EDUCATION
`
`Ph.D.
`
`M.S.E.E.
`
`B.S.E.E.
`
`Electrical Engineering
`University of Southern California
`Electrical Engineering
`Purdue University
`Electrical Engineering
`University of Virginia
`
`EMPLOYMENT HISTORY
`
`1987
`
`1983
`
`1982
`
`Cornell University, Ithaca New York
`School of Electrical Engineering
`
`Professor Emeritus
`Associate Director for Research
`Professor
`Associate Professor
`
`Georgia Institute of Technology, Atlanta, Georgia
`School of Electrical and Computer Engineering
`
`Associate Professor
`
`Assistant Professor
`Hughes Aircraft, El Segundo, California, Information Sciences
`Department, System Laboratories, Space and Communications
`
`Staff Engineer
`Bell Laboratories, Network Architecture Research Group
`Columbus, Ohio
`
`2024 - present
`2000 - 2003
`1999 - 2024
`1996-1999
`
`1992-1996
`1987-1992
`
`1983-1987
`
`1982
`
`EXPERIENCE SUMMARY
`
`Professor Wicker teaches and conducts research in wireless information networks,
`security and privacy. His research has focused on the development and application
`of advanced technologies to adaptive networks. Current interests include privacy-
`aware design practices for wireless networks, infrastructure monitoring, and national
`security. Other interests include the downstream impact of design decisions, and
`the evolution of the nation’s telecommunications networks.
`
`From 2005 – 2018, Professor Wicker was the Cornell Principal Investigator for the
`TRUST Science and Technology Center – a National Science Foundation center
`dedicated to the development of technologies for securing the nation’s critical
`infrastructure. In 2010 Professor Wicker briefed the staff of the Congressional
`Committee on Science and Technology and was appointed to the Air Force
`Scientific Advisory Board. In 2011 he was made a Fellow of the IEEE for
`“contributions to wireless information systems.” In 2014 he briefed the staff of the
`National Economic Council at the White House on the subject of privacy-aware
`designs for cellular and the smart grid.
`
`Genius Sports Ex. 1002
`p. 1
`
`

`

`
`
`
`
`1.
`
`2.
`
`3.
`
`
`4.
`
`5.
`
`6.
`
`
`Principal System Engineer for advanced military satellite
`communications, new business.
`Team leader and principal author of study examining the use of
`60 and 94 GHz monolithic arrays in satellite cross-links.
`Team leader and principal author of study examining the use of
`High Electron Mobility Transistor (HEMT) devices in frequency
`synthesizers for frequency hopped communication systems.
`Responsible for analysis, design, and production of 800 Mbps
`demod-remod SQPSK receiver.
`Responsible for analysis and design of several receivers and
`digital signal processors for various military satellite programs.
`Conducted analysis and simulation of MILSTAR direct digital
`frequency synthesizers.
`
`Technical Duties at Hughes Aircraft included the following:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Technical Duties at Bell Laboratories included the development of synchronous
`protocols for a packet switch (no. 2 STP).
`
`CONSULTING
`Expert Witness (testifying, past five years):
`
`
`• SEVEN Networks v. Motorola Mobility (for the defendant)
`• Ax Wireless v Lenovo and Dell (for the defendants)
`•
`Identity Security v. Apple (for the defendant)
`• Netgear v. TP-Link (for the claimant, ITC)
`• Acceleration Bay v Activision (for the defendant)
`• State Farm v. Amazon (for the plaintiff)
`• GComm v. Samsung (for the defendant)
`• Unisys v. Atos et al. (for the plaintiff)
`• Alacritech v. Intel et al. (for the defendants)
`• University of Minnesota v. Ericsson and Nokia (for the defendants)
`• Viasat v. Adobe (for the defendant)
`• KPN v Ericsson (for the defendant)
`• TQ Delta v DISH (for the defendant)
`• AMO Development v. Alcon Vision, LLC (for the defendant)
`• Sonrai v. Samsung et al (for the defendants)
`•
`IPCom v AT&T et al (for the defendants)
`• Teradyne v. Astronics (for the defendant)
`• Huawei v. Verizon (for the defendant)
`• Google v. Sonos (for the defendant)
`• Barkan v. Sprint et al. (for the defendants)
`• Gigamon v. Apcon (for the defendant)
`•
`Impact Engine v. Google (for the plaintiff)
`• Sprint v. Altice et al. (for the plaintiff)
`• KAIFI v. AT&T (for the defendant)
`
`
`
`2
`
`Genius Sports Ex. 1002
`p. 2
`
`

`

`
`
`
`
`
`
`
`
`
`
`1999 – 2000
`
`1997 - 2005
`
`1997 – 1998
`
`• Sprint v. Charter et al. (for the plaintiff)
`• Live Person v. 24/7 (for the plaintiff)
`• Motorola v. Hytera (for the plaintiff)
`
`Technical:
`• Mesh Networks, Maitland FL
`
`
`
`o Wireless Networking, Medium Access Control
`• Mitre Corporation., Eatontown, NJ.
`
`
`o Turbo Error Control for Wireless Applications.
`• Motorola Inc. Advanced Mobile Messaging Division
`o Wireless Networking
`• Digital Technics Inc., Baltimore, MD.
`1995 - 1997
`
`
`
`o Design of SS7/SONET/ATM interface for telephone switch.
`Integrated Device Technology, Santa Clara, CA.
`
`1995 - 1996
`o Development of Reed-Solomon error control chip for high-speed mass
`memory applications.
`• Lockheed Sanders, Avionics Division, Nashua, N.H.
`1994 - 1995
`
`o Development of error control chips for magnetic recording in space
`applications.
`• Mobile Telecommunication Technologies, Jackson, MS.
`1993 - 1998
`o Design and analysis of mobile networks for paging and data transfer,
`bulk data transfer using frame relay.
`• Al-Elm Research and Development Corp., Raleigh, N.C.
`1992 - 1994
`o Design and development of advanced digital voice and FAX
`encryption techniques.
`1992 - 1993
`
`
`
`
`Intellivision, Atlanta, GA.
`
`o Design and development of automated telephone switching equipment.
`• Unisys Corporation, San Jose, CA.
`
`
`
`1991 - 1992
`o Design and development of error control algorithms for internodal
`communication in multiprocessing computer systems.
`1990 - 1992
`II Morrow Inc., UPS Technical Systems, Salem, OR.
`
`o Analysis, design, and development of error control systems for mobile
`radio networks.
`• Charter Leasing Corporation, Richmond, VA.
`1990 - 1993
`
`
`o Analysis and design of digital switching systems for commercial
`telephony.
`
`•
`
`•
`
`•
`
`
`CURRICULUM DEVELOPMENT
`
`
`• Developed and implemented a course for Graduate Students entitled
`“Modern Cellular Communications: LTE to 5G” for the College of
`Engineering, Cornell University, Ithaca, New York (Fall 2019).
`
`• Developed and implemented a course for Freshmen entitled “Wiretaps to
`Facebook: Security and Privacy in Information Networks” for the College
`of Engineering, Cornell University, Ithaca, New York (Fall 2010).
`
`
`
`3
`
`Genius Sports Ex. 1002
`p. 3
`
`

`

`• Academic Coordinator, Georgia Tech - Lorraine, Metz, France, September
`1990 - March 1992.
`
`• Developed and implemented two graduate courses in Error Control Coding
`and one graduate course in Cryptography and Data Security for the School of
`Electrical Engineering, Georgia Institute of Technology, Atlanta, Georgia.
`
`• Developed and taught numerous short courses on digital communication
`systems, wireless information networks, error control, and cryptology.
`
`Stephanie Santoso (“Navigating the IP Issues of 3D Printing,” graduated Fall
`2019)
`Kolbeinn Karlsson (“Design And Analysis Of Privacy Mechanisms For The
`Internet Of Things,” graduated Summer 2018)
`Shion Goha (“Aspects of Privacy in Social Networks,” graduated Summer
`2016)
`Dipayan Ghosh (“Privacy-Aware Demand Response Systems,” graduated
`Summer 2014)
`Daniel Lee (“Reliable and Energy-Efficient Wireless Sensor Networks for
`Mobile Healthcare Systems,” graduated Summer 2011)
`Nathan Karst (“Combinatorial Designs For Key Distribution And Secure
`Re-Keying In Group Communication Systems,” graduated Summer 2011)
`Sergio Bermudez (“Analysis of Topological Properties of Random Wireless
`Sensor Networks,” graduated Summer 2010)
`Mikhail Lisovich (“Mobility And Privacy: Exploring Technical And Social
`
`4
`
`
`
`
`
`
`
`
`
`
`
` •
`
`
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`
`
`
`
`• Developed and implemented a course for Juniors entitled “Networks and
`Systems” for the School of Electrical Engineering, Cornell University,
`Ithaca, New York (Spring 2005).
`
` •
`
`for Seniors entitled “Artificial
`implemented a course
` Developed and
`Intelligence and Expert Systems for Telecommunications Networks” for the
`School of Electrical Engineering, Cornell University, Ithaca, New York (Spring
`1998).
`
` Developed and implemented a course for Freshmen entitled “Introduction to
`Telecommunications” for the College of Engineering, Cornell University,
`Ithaca, New York (Spring 1997).
`
` Developed and implemented a graduate course in Cryptography and Data
`Security for the School of Electrical Engineering, Cornell University, Ithaca,
`New York (Fall 1996).
`
` •
`
` •
`
`
`PH. D. STUDENTS (GRADUATED)
`
`Cornell University
`
`Genius Sports Ex. 1002
`p. 4
`
`

`

`
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
` •
`
`
`
`•
`
`
`
`
`
`Issues In Emerging Pervasive Sensor Networks,” graduated Spring 2010)
`Michael Eoin Buckley (“Side Information Inference For Turbo Code Based
`Systems,” graduated Fall 2009)
`Coalton Bennett (“Secure Data Reporting for Demand Response
`Systems,” graduated Fall 2009)
`Ania Kacewicz (“Coding Theory for Security and Reliability in Wireless
`Networks,” graduated Fall 2009)
`Phillip Kuryloski (“Design Strategies For Human Centered Sensor
`Networks,” graduated Spring 2009)
`Sameer Pai, (“Co-Design Of Sensor Networking Technology And Privacy
`Policy,” graduated Spring 2008)
`Hui Qu, (“Co-Designed Localization And Geographic Routing Algorithm For
`Sensor Networks,” graduated Spring 2008)
`Christina Tavoularis, (“Event Detection and Queueing in Wireless Sensor
`Networks,” Graduated Fall 2006)
`Hazer Inaltekin, (“Game Theoretic Mac Protocol Design And Interference
`Analysis For Wireless Networks,” Graduated Spring 2006)
`Xin Zhang, (“Distributed Source Coding in Sensor Networks,” graduated
`Spring 2006)
`Martin Roth, (“TERMITE: A Swarm Intelligent Routing Algorithm for Mobile
`Wireless Ad Hoc Networks,” graduated Winter 2005)
`Prince Samar. (“Optimizing Protocols for Mobility in Ad Hoc Networks,”
`graduated Summer, 2004)
`Yasser Mourtada. (“Content-Aware Routing Schemes,” graduated Summer,
`2004)
`Allen MacKenzie. (“Game Theoretic Analysis of Medium Access Control
`Protocols,” graduated Spring, 2003)
`Ewald Hueffmeier, Jr. (Applied Mathematics - Turbo Decoding Architectures
`and Algorithms for Wireless Data Systems, graduated Summer, 2002)
`Xie Xi (AI and Expert Systems for Random Access Protocols, graduated
`Summer, 2002)
`Bhaskar Krishnamarchari ("Complexity and Phase Transitions in Wireless
`Networks," graduated Spring, 2002)
`Sarah Spence ("Subfield Subcodes of Reed-Solomon Codes," graduated
`Spring, 2002)
`Eric Sakk ("Wavelets Based on Reed-Muller Coding," graduated Spring,
`2002)
`Frederic Fontaine ("Iterative Trellis Decoding for Block Codes," graduated
`Summer, 1999)
`Saejoon Kim (“Belief Propagation, Parameter Estimation, and Issues in
`Turbo Decoding,” graduated Summer 1998)
`
`Andreas Yankopolus. (“Adaptive Error Control for Wireless Multimedia"),
`graduated Winter, 2004)
`James Kosmach (“Soft Decision Decoding for Wireless Mobile Systems,”
`graduated Fall. 1998)
`
`5
`
`
`Georgia Tech
`
`Genius Sports Ex. 1002
`p. 5
`
`

`

`
`
`
`
`Amjad Luna (“DSP Implementation of Advanced Decoder Architectures,”
`graduated Winter, 1998
`Jong-Il Park (“Turbo Equalization Algorithms,” graduated Winter, 1998)
`Thomas Tapp (“Advanced Error Control Systems for Mobile Messaging
`Systems,” graduated Summer, 1996)
`Mahdi Zaidan (“Tree Structure Trellis Codes,” graduated Spring, 1996)
`Xiao-An Wang
`(“Trellis-Based Decoders
`and Neural Network
`Implementations,” graduated Winter, 1996)
`Ahmed El-Rifai (“Application of Linear Block Codes to the McEliece
`Cryptosystem,” graduated Fall, 1995)
`Miin-Jong Hao (“Performance Evaluation of Practical FSK, CPFSK, and
`ASK Detection Schemes
`for Coherent Optical Fiber Communication
`Systems,” graduated Summer, 1995)
`Slim Souissi
`(“Adaptive Packet Combining
`graduated Summer, 1994)
`Deidre Williams (“Key Management
`graduated Summer, 1994)
`Lars Rasmussen (“Trellis Coded Adaptive Rate Hybrid-ARQ Protocols
`over AWGN and Slowly Fading Rician Channels,” graduated Summer
`1993)
`Mohssen Alabbadi (“Integration of Error Correction, Encryption, and
`Signature Using Linear Error-Correcting Block Codes,” graduated Summer
`1993)
`Michael Bartz (“Soft Decision Decoders Based on Artificial Neural
`Networks,” graduated Summer 1992)
`Michael Rice (“Adaptive Error Control Over Slowly Varying Channels,”
`graduated Spring 1991)
`Bruce Harvey (“Adaptive Rate Convolutional Coding Using the Viterbi
`Decoder,” graduated Spring 1991)
`
`in CDMA Systems,”
`
`in
`
`the McEliece Cryptosystem,”
`
`•
`
`•
`•
`
`•
`•
`
`•
`
`•
`
`
`•
`
`•
`
`•
`
`
`•
`
`
`•
`
`•
`
`•
`
`
`PUBLICATIONS
`
`Theses
`
` •
`
`
`
`
`
`Wicker, S. B., “The Geometry of Error Correcting Codes,” Ph.D. Thesis,
`University of Southern California, Los Angeles, California, May 1987.
`
`
`
`Wicker, S. B., “A Microprocessor Based Diagnostic System,” BS Thesis,
`University of Virginia, Charlottesville, Virginia, May 1982.
`
` •
`
`
`
`Books
`
`Wicker, S. B., Cellular Convergence and the Death of Privacy, Oxford
`University Press, 2013.
`
`Wicker, S. B. and Kim, S., Fundamentals of Codes, Graphs, and Iterative
`Decoding, Boston: Kluwer Academic Press, 2002.
`
`6
`
`
`
` •
`
` •
`
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 6
`
`

`

`
`
`Heegard, C. and Wicker, S. B., Turbo Coding, Boston: Kluwer Academic
`Press, 1999.
`
`Wicker, S. B., Error Control Systems for Digital Communication and
`Storage, Englewood Cliffs: Prentice Hall, 1995.
`
`Wicker, S. B. and Bhargava, V. K. (editors), Reed-Solomon Codes and
`Their Applications, Piscataway: IEEE Press, 1994.
`
`Chmora, A., and Wicker, S. B. (editors), Error Control, Cryptology, and
`Speech Compression: Workshop on
`Information Protection, Moscow,
`Russia, Lecture Notes in Computer Science, Volume 829, Heidelberg:
`Springer Verlag, 1994.
`
`
`
`•
`
` •
`
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
`
`Parts of Books
`
`S. B. Wicker, “Privacy-Aware Design for the Monitoring, Control, and
`Protection of Critical
`Infrastructure,”
`in Homeland Security Threats,
`Countermeasures, and Privacy Issues (ed. Giorgio Franceschetti), Artech
`House, 2010
`
`Z. Haas, J. Y. Halpern, L. Li, and S. B. Wicker, “A decision-theoretic approach
`to resource allocation in wireless multimedia networks,” Resource Allocation
`in Next Generation Wireless Networks (W. Li and Y. Pan, eds.), Nova
`Science Publishers, 2005.
`
`P. Samar and S.B. Wicker, "On the Behavior of Communication Links in a
`Multi-Hop Mobile Environment," Frontiers in Distributed Sensor Networks,
`S.S. Iyengar and R.R. Brooks (eds.), CRC Press, 2005.
`
`B. Krishnamachari and S. B. Wicker, "Base Station Location Optimization in
`Cellular Wireless Networks using Heuristic Search Algorithms," book chapter
`in Soft Computing in Communications, Ed. L. Wang, Springer-Verlag, 2004.
`
`Wicker, S. B., "Cyclic Codes" in Wiley Encyclopedia of Telecommunications,
`(ed: J. Proakis), 2002.
`
`Bhaskar Krishnamachari, Stephen B. Wicker, Ramon Bejar, and Marc
`Pearlman, "Critical Density Thresholds in Distributed Wireless Networks,"
`Advances in Coding and Information Theory, eds. H. Bhargava, H.V. Poor
`and V. Tarokh, Kluwer Publishers, 2002.
`
`Carla Games, Xi Xie, Stephen B. Wicker, and Bart Selman, “Heavy Tails,
`Phae Transitions, and the Nature of Cutoff,” in Codes, Graphs, and Systems,
`Boston: Kluwer, 2002.
`
`Bhaskar Krishnamachari, Xi Xie, Bart Selman, and Stephen B. Wicker,
`"Analysis of Random Walk and Random Noise Algorithms for Satisfiability
`
`7
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 7
`
`

`

`
`
`Testing," Principles and Practice of Constraint Programming - CP 2000,
`Lecture Notes in Computer Science, vol. 1894, Springer, September 2000.
`
`Bhaskar Krishnamachari and Stephen B. Wicker, "Global Search Techniques
`for Problems
`in Mobile Communications,"
`in Telecommunications
`Optimization: Adaptive and Heuristic Approaches, Eds. David Corne et al.,
`John Wiley & Sons Publishers, October 2000.
`
`Costello, D., Hagenauer, J., Imai, H., and Wicker, S. B., “Applications of Error
`Control Coding,” Information Theory: 50 Years of Discovery (S. Verdú and S.
`McLaughlin, ed), IEEE Press, 1999.
`
`Wicker, S. B., “Deep Space Applications,” Handbook of Coding Theory, (Vera
`Pless and William Cary Huffman, ed.), Amsterdam: Elsevier, 1998.
`
`Wicker, S. B. and Bhargava, V. K., “Introduction,” in Reed-Solomon Codes
`and Their Applications, (S. B. Wicker and V. K. Bhargava, ed.), IEEE Press,
`1994.
`
`Wicker, S. B. and Bartz, M., “Reed-Solomon Codes in Hybrid Automatic-
`Repeat-Request Protocols,”
`in Reed-Solomon Codes and Their
`Applications, (S. B. Wicker and V. K. Bhargava, ed.), IEEE Press, 1994.
`
`Alabbadi, M. and Wicker, S. B., “Susceptibility of Digital Signature Schemes
`Based on Error-Correcting Codes to Universal Forgery,” in Error Control,
`Cryptology, and Speech Compression: Workshop on Information Protection,
`Moscow, Russia (A. Chmora and S. B. Wicker, ed.), Lecture Notes on
`Computer Science, Volume 829, Heidelberg: Springer Verlag, 1994.
`
`Souissi, Slim and Wicker, S. B., "Application of Packet Combining
`Techniques to a DS/CDMA System Using Convolutional Encoding and
`Sequential Decoding", in Communication Theory and Applications II (B.
`Honary, M. Darnell, and P. Farrell, ed.) London: HW Communications
`Publishing Ltd, 1993.
`
`Wicker, S. B., “Trellis Coded Hybrid-ARQ Protocols,” in Communication,
`Control, and Signal Processing, pp. 339 - 346, (Erdal Erikan, ed.),
`Amsterdam: Elsevier Publishing (1990).
`
`
`
` •
`
`
`
`
`
` •
`
`
`
` •
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
`
`Refereed Journal Articles
`
`
`
`S. B. Wicker, "The Ethics of Zero-Day Exploits – The NSA Meets the Trolley
`Car,” Communications of the ACM, January 2021.
`
`
` •
`
`
`
`8
`
`Genius Sports Ex. 1002
`p. 8
`
`

`

`
`
`S. B. Wicker, "eBook Surveillance and the Threat to Freedom of Association,”
`Journal of Information Security and Applications, Volume 55, December 2020.
`
`S. B. Wicker and D. Ghosh, "Reading in the Panopticon – Your Kindle May
`Be Spying on You, But You Can’t Be Sure,” Communications of the ACM,
`Volume 63, No. 5, May 2020.
`
`S. B. Wicker, "Smartphones, Contents of the Mind, and the 5th Amendment,”
`Communications of the ACM, April 2018.
`
`S. B. Wicker, “Forced Decryption and the Fifth Amendment: A Technical
`Perspective,” The Proceedings of the IEEE, January 2018.
`
`S. B. Wicker and K. Karlsson, “Ad Blockers: Technology, Ethics, and a
`Serious Difference of Opinion,” Communications of the ACM, October, 2017.
`
`A. S. Kubesch and S. B. Wicker, “Digital rights management: The cost to
`consumers,” in Proceedings of the IEEE, vol.103, no.5, pp.726-733, May
`2015
`
`S. M. Santoso and S. B. Wicker, “The future of three-dimensional printing:
`Intellectual property or intellectual confinement?” New Media & Society, June
`12, 2014
`
`Wicker, S. B. and Santoso, S., “Access to the Internet is a Human Right,”
`Communications of the ACM, June 2013.
`
`N. Karst, S. B. Wicker. “On the rekeying load in group key distributions using
`cover-free families,” IEEE Transactions on Information Theory, Vol. 58, No.
`10, October 2012, pp. 6667 – 6671.
`
`S. B. Wicker, “The Loss of Location Privacy in the Cellular Age,”
`Communications of the ACM, Vol. 55, No. 8, August 2012, pp. 60 - 68.
`
`S. B. Wicker, “Digital Telephony and the Question of Privacy,”
`Communications of the ACM, Vol. 54, No. 7, July, 2011, pp. 88 – 98.
`
`S. B. Wicker and D. E. Schrader, “Privacy-Aware Design Principles for
`Information Networks,” Proceedings of the IEEE, February 2011, pp. 330 -
`350.
`
`Mikhail Lisovich, Deirdre Mulligan, and Stephen B. Wicker, “Inferring
`Personal Information from Demand-Response Systems,” IEEE Security
`and Privacy Magazine; January/February 2010.
`
`9
`
`
`
`•
`
`
`
` •
`
`•
`
`•
`
`
`
` •
`
`•
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
`•
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 9
`
`

`

`
`
`Anna Kacewicz and Stephen B. Wicker, "Redundancy Minimizing Techniques
`for Robust Transmission in Wireless Networks," Journal of Communications
`and Networks, 11:564-573, 2009.
`
`H. Inaltekin, M. Chiang, H. V. Poor and S.B. Wicker, “The behavior of
`unbounded path-loss models and the effect of singularity on computed
`network characteristics,”
`IEEE J. Selected Areas Communications,
`September 2009
`
`H. Inaltekin and S.B. Wicker, "A One-shot Random Access Game for
`Wireless Networks – Behavior of Nodes at Nash Equilibria" IEEE/ACM Trans.
`on Networking, December 2008.


`
`S. Pai, M. Meingast, T. Roosta, S. Bermudez, S. Wicker, D. Mulligan, and S.
`S. Sastry, "Confidentiality in Sensor Networks: Transactional Information,"
`IEEE Security and Privacy Magazine; July/August 2008.
`
`P. Venkitasubramaniam, He Ting, Lang Tong, Stephen B. Wicker, “Toward
`an analytical approach
`to anonymous wireless networking,”
`IEEE
`Communications Magazine, vol.46, no.2, pp.140-146, February 2008
`
`H. Qu and S. B. Wicker, "A Combined Localization and Geographic Routing
`Algorithm for Rapidly-Deployed Wireless Sensor Networks", International
`Journal of Distributed Sensor Networks, Volume 4, Issue 1 January 2008,
`pages 44 - 63.
`
`H. Qu and S. B. Wicker, "Co-Designed Anchor-Free Localization and
`Location-Based Routing Algorithm for Rapidly-Deployed Wireless Sensor
`Networks", Information Fusion, 2008.
`
`M. Meingast, S. Pai, S. Wicker, S. S. Sastry, "Privacy in Camera Networks, A
`Technical Perspective," EECS Department, University of California, Berkeley,
`Technical Report UCB/EECS-2007-94, July 2007.
`
`X. Zhang, J. Chen, S. B. Wicker, and T. Berger, "Successive Coding in
`Multiuser Information Theory", IEEE Transactions on Information Theory,
`Volume 53, No. 6, June 2007, pp. 2246 – 2254.
`
`P. Samar and S. B. Wicker, “Link Dynamics and Protocol Design in a
`Multi-Hop Mobile Environment,” IEEE Transactions on Mobile Computing,
`September 2006.
`
`X. Zhang, S. B. Wicker, "On the Optimal Distribution of Sensors in a
`Random Field", ACM Transactions on Sensor Networks, March 2006.
`
`J. Chen, X. Zhang, T. Berger and S. B. Wicker "The Sum-Rate Distortion
`Function and Optimal Rate Allocation for the Quadratic Gaussian CEO
`
`10
`
`
`
`•
`
` •
`
`
`
`•
`
`•
`
`•
`
`•
`
`•
`
` •
`
`
`
` •
`
`
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 10
`
`

`

`
`
`Problem" IEEE Journal on Selected Areas in Communications: Special Issue
`on Sensor Networks, Volume 22, No. 6, August 2004.
`
`Bhaskar Krishnamachari, Rung-Hung Gau, Stephen B. Wicker, and Zygmunt
`J. Haas, "Optimal Sequential Paging in Cellular Networks," ACM/Baltzer
`Wireless Networks, Vol 10, No. 2, March 2004.
`
`Bhaskar Krishnamachari, Stephen Wicker, Ramon Bejar and Cesar
`Fernandez, "On the Complexity of Distributed Self-Configuration in Wireless
`Networks," in Kluwer Journal on Telecommunication Systems, Special Issue
`on Wireless Networks and Mobile Computing, Eds. I. Stojmenovic and S.
`Olariu, Vol. 22, No. 1, January/April 2003.
`
`B. Krishnamachari, Y. Mourtada, and S. Wicker, "The Energy-Robustness
`Tradeoff for Real-Time Information Routing in Wireless Sensor Networks,"
`submitted to the Special Issue of Elsevier Computer Networks on Wireless
`Sensor Networks, October 2002.
`
`Andrea Goldsmith And Stephen B. Wicker, "Design Challenges For Energy-
`Constrained Ad Hoc Wireless Networks," IEEE Wireless Communications
`Magazine, August, 2002.
`
`Allen B. MacKenzie and Stephen B. Wicker, "Game Theory and the Design of
`Self-Configuring, Adaptive Wireless Networks,"
`IEEE Communications
`Magazine, November 2001.
`
`Buckley, M. E. and Wicker, S. B., “The Design and Performance of a Neural
`Network for Predicting Decoder Error in Turbo-Coded ARQ Protocols,” IEEE
`Transactions on Communications, Volume 48, Number 4, pp. 566 - 576, April
`2000.
`
`Park, J. I., Wicker, S. B., and Owen, H. L., “Trellis-Based Soft Output
`Adaptive Equalization Techniques
`for TDMA Cellular Systems,” IEEE
`Transactions on Vehicular Technology, pp. 83 – 94, January 2000.
`
`Wang, X.A., and Wicker, S. B., "The BCJR Trellis and the Design and
`Implementation of Trellis Decoders for Some BCH Codes," Applicable
`Algebra in Engineering, Communication, and Computing, Volume 9, Number
`6, 1999, pp. 521 - 546.
`
`Buckley, M. E. and Wicker, S. B., “A Neural Network for Predicting Decoder
`Error in Turbo Decoders,” IEEE Communications Letters, Volume 3, Number
`5, May 1999, pp. 145 - 147.
`
`Tapp, T., Luna, A., Wang, X.A., and Wicker, S. B., “BCH Soft Decision
`Decoders
`for Mobile Data Applications,”
`IEEE Transactions on
`Communications, Volume 47, Number 3, pp. 333 – 337, March 1999.
`
`11
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
` •
`
` •
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`Genius Sports Ex. 1002
`p. 11
`
`

`

`Luna, A., Fontaine, F. and Wicker, S. B., “Iterative Maximum Likelihood Trellis
`Decoding for Block Codes,” IEEE Transactions on Communications, Volume
`47, Number 3, pp. 338 – 342, March 1999.
`
`
`
`
`
` •
`
`
`
`
`
`Costello, D., Hagenauer, J., Imai, H., and Wicker, S. B., “Applications of Error
`Control Coding,” IEEE Transactions on Information Theory, 50th Anniversary
`Issue, Volume 44, Number 6, pp. 2531 - 2560, October 1998.
`
` •
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`Zaidan, M. Y. and Wicker, S. B., “Trellis Coded Modulation with σ-Tree
`Codes,” IEEE Transactions on Information Theory, Volume 43, Number 6, pp.
`2005 - 2012, November, 1997.
`
`Hao, M.-J. and Wicker, S. B., “The Effect of Error Control Coding in
`Multichannel FSK Coherent Lightwave Communication Systems,” IEEE
`Journal of Lightwave Technology, Volume 14, Number 12, pp. 2648 - 2656,
`December, 1996.
`
`Rasmussen, L. K., Bartz, M. J., and Wicker, S. B., “A Comparison of Trellis
`Coded and Reed-Solomon Coded Hybrid-ARQ Protocols over Slowly
`Fading Rayleigh Channels,” Wireless Personal Communications, Volume 2,
`Number 4, pp. 393-413, 1996.
`
`Wang, X-A, and Wicker, S. B., “Generalized Soft Decision Decoding for
`Concatenated Systems,” IEEE Transactions on Information Theory, Volume
`42, Number 2, pp. 543-553, March, 1996.
`
`Wang, X-A, and Wicker, S. B., “The Analog Neural Net Viterbi Decoder,”
`IEEE Transactions on Communications, Volume 44, Number 2, February,
`1996, pp. 165 - 171.
`
`Rasmussen, L. and Wicker, S. B., “Trellis Coded, Type-I Hybrid-ARQ
`Protocols Based on CRC Error-Detecting Codes,” IEEE Transactions on
`Communications, Volume 43, Number 10, October, 1995, pp. 2569 - 2575.
`
`Hao, M.-J. and Wicker, S. B., “Performance Evaluation of FSK and CPFSK
`Optical Communication Systems: A Stable and Accurate Method,” IEEE
`Journal of Lightwave Technology, Volume 13, Number 8, August 1995, pp
`1613 - 1623.
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`Rasmussen, L. and Wicker, S. B., “A Comparison of Two Code Combining
`Techniques for Equal Gain, Trellis Coded Diversity Receivers,” IEEE
`Transactions on Vehicular Technology, Volume 44, Number 2, May, 1995,
`pp. 291 - 295.
`
`
`
`
`
`
`Souissi, S. and Wicker, S. B., “A Diversity Combining DS/CDMA System with
`Convolutional Encoding and Viterbi Decoding,”
`IEEE Transactions on
`Vehicular Technology, Volume 44, Number 2, May, 1995, pp. 304 - 312.
`
`
`
`12
`
`Genius Sports Ex. 1002
`p. 12
`
`

`

`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`•
`
`
`
` •
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`Rasmussen, L. and Wicker, S. B., “A Comparison of Two Retransmission
`Request Mechanisms for Trellis Coded Modulation,” Electronics Letters,
`Volume 29, Number 25, pp. 2162 - 2163, December 9, 1993.
`
`Wicker, S. B. and Bartz, M., “Type-II Hybrid-ARQ Protocols Using Punctured
`MDS Codes,” IEEE Transactions on Communications, Vol. 42, No. 4, pp.
`1431-1440, April 1994.
`
`Rice, M. D. and Wicker S. B., “A Sequential Testing Scheme for Adaptive
`Error Control on Slowly Varying Channels”
`IEEE Transactions on
`Communications, Vol. 42, No. 4, pp. 1533-1543, April 1994.
`
`Harvey, B. A. and Wicker, S. B., “Packet Combining Systems Based on the
`Viterbi Decoder” IEEE Transactions on Communications, Vol. 42, No. 4, pp.
`1544-1557, April 1994.
`
`Rice, M. D. and Wicker, S. B., “Adaptive Error Control for Slowly Varying
`Channels,” IEEE Transactions on Communications, Vol. 42, No. 3, pp. 917-
`926, March 1994.
`
`Wicker, S. B. and Bartz, M., “The Design and Implementation of Type-I and
`Type-II Hybrid-ARQ Protocols Based on First-Order Reed-Muller Codes,”
`IEEE Transactions on Communications, Vol. 42, No. 3, pp. 979-987, March
`1994.
`
`Rasmussen, L. and Wicker, S. B., “Trellis Coded Hybrid-ARQ Protocols over
`AWGN and Slowly Fading Rician Channels,”
`IEEE Transactions on
`Information Theory, Volume 40, Number 2, March 1994, pp. 418-428.
`
`Rice, M. D. and Wicker, S. B., "Modified Majority-Logic Decoding of Cyclic
`Codes in Hybrid-ARQ Systems, IEEE Transactions on Communications,
`Volume 40, Number 9, pp. 1413 - 1417, September, 1992.
`
`Alabbadi, M. and Wicker, S. B., “Cryptanalysis of the Harn-Wang modification
`of the Xinmei signature scheme,” Electronics Letters, Volume 28, Number 18,
`pp. 1756 - 1757, August 27, 1992.
`
`Wicker, S. B., “Reed-Solomon Error Control Coding for Data Transmission
`over Rayleigh Fading Channels with Feedback,” IEEE Transactions on
`Vehicular Technology, Volume 41, Number 2, pp. 124 - 133, May 1992.
`
`Alabbadi, M. and Wicker, S. B., “The Security of Xinmei’s Digital Signature
`Scheme” Electronics Letters, Volume 28, Number 9, pp. 890 - 891, April
`1992.
`
`Wicker, S. B., “Adaptive Rate Error Control Through the Use of Diversity
`Combining and Majority-Logic Decoding in a Hybrid-ARQ Protocol,” IEEE
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`13
`
`Genius Sports Ex. 1002
`p. 13
`
`

`

`
`
`
`
`Transactions on Communications, Volume 39, Number 3, pp. 380 - 386,
`March 1991.
`
`Harvey, B and Wicker, S. B., “Error-Trapping Viterbi Decoding for Type-I
`Hybrid-ARQ Protocols,” Canadian Journal of Electrical and Computer
`Engineering, Volume 16, Number 1, pp. 5 - 12, January 1991.
`
`Wicker, S. B., “Muting Algorithms Based on the Use of Side Information
`Generated by Error Control Systems,” IEEE Transactions on Vehicular
`Technology, Volume 39, No 2, pp. 171 - 176, May 1990.
`
`Wicker, S. B., “Modified Majority-Logic Decoders for Use in Convolutionally
`Encoded Hybrid-ARQ Systems,” IEEE Transactions on Communications,
`Volume 38, No. 3, pp. 263 - 266, March 1990.
`
` •
`
` Wicker, S. B., “High Reliability Data Transfer over the Land Mobile Radio
`Channel,” IEEE Transactions on Vehicular Technology, Volume 39, No 1, pp.
`48 - 55, February 1990.
`
`
`Refereed Conference Papers
`
`S. B. Wicker, “eBook Readers, Location Surveillance, and the Threat to
`Freedom of Association,” International Conference on Availability, Reliability,
`and Security, August 26 – 29, 2019, Canterbury, UK.
`
`K. Karlsson, K., Adams, D., Rubambiza, G., Xian, Z., van Renesse, R.,
`Weatherspoon, H., Wicker, S., “Untethered: Deployable Blockchains for IoT
`Environments,” ACM Symposium on Cloud Computing 2018 (SoCC '18),
`October 2018.
`
`Karlsson, K., Wicker, S., Weatherspoon, H., van Renesse, R., ”Vegvisir: An
`energy-efficient,
`partition-tolerant
`blockchain.” Proceedings
`of
`the
`International Conference on Distributed Computing Systems (ICDCS), 2018
`
`Kolbeinn Karlsson; Zhiming Shen; Weijia Song; Hakim Weatherspoon;
`Robbert van Renesse; Stephen Wicker, “Toward an Emergency Edge
`Supercloud,” ACM Symposium on Cloud Computing 2017 (SoCC '17), Santa
`Clara, California, September 25-27, 2017
`
`Shion Guha and Stephen B Wicker. “Connecting Grounded Theory and
`Machine Learning: Setting a Research Agenda for Human Centered Data
`Science,” Human Centered Data Science Workshop, ACM Conference on
`Computer Supported Cooperative Work and Social Computing, San
`Francisco, CA, February 27 – March 2, 2016.
`
`14
`
` •
`
`
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 14
`
`

`

`
`
`Kolbeinn Karlsson and Stephen B. Wicker, “The Effect of Location Granularity
`on Semantic Location Inferences,” in Proc. of the 49th Hawaiian Conference
`on System Science (HICSS-46), Kauai, Hawaii, Jan. 2016.
`
`Shion Guha and Stephen B. Wicker. 2015. Spatial subterfuge: an experience
`sampling study to predict deceptive location disclosures. In Proceedings of
`the 2015 ACM International Joint Conference on Pervasive and Ubiquitous
`Computing (UbiComp '15). ACM, New York, NY, USA, 1131-1135.
`
`Shion Guha and Stephen B. Wicker, “Do Birds of a Feather Watch Each
`Other? Homophily and Social Surveillance
`in Location Based Social
`Networks,” Proc

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket