`Professor Emeritus of Electrical and Computer Engineering,
`Cornell University
`
`EDUCATION
`
`Ph.D.
`
`M.S.E.E.
`
`B.S.E.E.
`
`Electrical Engineering
`University of Southern California
`Electrical Engineering
`Purdue University
`Electrical Engineering
`University of Virginia
`
`EMPLOYMENT HISTORY
`
`1987
`
`1983
`
`1982
`
`Cornell University, Ithaca New York
`School of Electrical Engineering
`
`Professor Emeritus
`Associate Director for Research
`Professor
`Associate Professor
`
`Georgia Institute of Technology, Atlanta, Georgia
`School of Electrical and Computer Engineering
`
`Associate Professor
`
`Assistant Professor
`Hughes Aircraft, El Segundo, California, Information Sciences
`Department, System Laboratories, Space and Communications
`
`Staff Engineer
`Bell Laboratories, Network Architecture Research Group
`Columbus, Ohio
`
`2024 - present
`2000 - 2003
`1999 - 2024
`1996-1999
`
`1992-1996
`1987-1992
`
`1983-1987
`
`1982
`
`EXPERIENCE SUMMARY
`
`Professor Wicker teaches and conducts research in wireless information networks,
`security and privacy. His research has focused on the development and application
`of advanced technologies to adaptive networks. Current interests include privacy-
`aware design practices for wireless networks, infrastructure monitoring, and national
`security. Other interests include the downstream impact of design decisions, and
`the evolution of the nation’s telecommunications networks.
`
`From 2005 – 2018, Professor Wicker was the Cornell Principal Investigator for the
`TRUST Science and Technology Center – a National Science Foundation center
`dedicated to the development of technologies for securing the nation’s critical
`infrastructure. In 2010 Professor Wicker briefed the staff of the Congressional
`Committee on Science and Technology and was appointed to the Air Force
`Scientific Advisory Board. In 2011 he was made a Fellow of the IEEE for
`“contributions to wireless information systems.” In 2014 he briefed the staff of the
`National Economic Council at the White House on the subject of privacy-aware
`designs for cellular and the smart grid.
`
`Genius Sports Ex. 1002
`p. 1
`
`
`
`
`
`
`
`1.
`
`2.
`
`3.
`
`
`4.
`
`5.
`
`6.
`
`
`Principal System Engineer for advanced military satellite
`communications, new business.
`Team leader and principal author of study examining the use of
`60 and 94 GHz monolithic arrays in satellite cross-links.
`Team leader and principal author of study examining the use of
`High Electron Mobility Transistor (HEMT) devices in frequency
`synthesizers for frequency hopped communication systems.
`Responsible for analysis, design, and production of 800 Mbps
`demod-remod SQPSK receiver.
`Responsible for analysis and design of several receivers and
`digital signal processors for various military satellite programs.
`Conducted analysis and simulation of MILSTAR direct digital
`frequency synthesizers.
`
`Technical Duties at Hughes Aircraft included the following:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Technical Duties at Bell Laboratories included the development of synchronous
`protocols for a packet switch (no. 2 STP).
`
`CONSULTING
`Expert Witness (testifying, past five years):
`
`
`• SEVEN Networks v. Motorola Mobility (for the defendant)
`• Ax Wireless v Lenovo and Dell (for the defendants)
`•
`Identity Security v. Apple (for the defendant)
`• Netgear v. TP-Link (for the claimant, ITC)
`• Acceleration Bay v Activision (for the defendant)
`• State Farm v. Amazon (for the plaintiff)
`• GComm v. Samsung (for the defendant)
`• Unisys v. Atos et al. (for the plaintiff)
`• Alacritech v. Intel et al. (for the defendants)
`• University of Minnesota v. Ericsson and Nokia (for the defendants)
`• Viasat v. Adobe (for the defendant)
`• KPN v Ericsson (for the defendant)
`• TQ Delta v DISH (for the defendant)
`• AMO Development v. Alcon Vision, LLC (for the defendant)
`• Sonrai v. Samsung et al (for the defendants)
`•
`IPCom v AT&T et al (for the defendants)
`• Teradyne v. Astronics (for the defendant)
`• Huawei v. Verizon (for the defendant)
`• Google v. Sonos (for the defendant)
`• Barkan v. Sprint et al. (for the defendants)
`• Gigamon v. Apcon (for the defendant)
`•
`Impact Engine v. Google (for the plaintiff)
`• Sprint v. Altice et al. (for the plaintiff)
`• KAIFI v. AT&T (for the defendant)
`
`
`
`2
`
`Genius Sports Ex. 1002
`p. 2
`
`
`
`
`
`
`
`
`
`
`
`
`
`1999 – 2000
`
`1997 - 2005
`
`1997 – 1998
`
`• Sprint v. Charter et al. (for the plaintiff)
`• Live Person v. 24/7 (for the plaintiff)
`• Motorola v. Hytera (for the plaintiff)
`
`Technical:
`• Mesh Networks, Maitland FL
`
`
`
`o Wireless Networking, Medium Access Control
`• Mitre Corporation., Eatontown, NJ.
`
`
`o Turbo Error Control for Wireless Applications.
`• Motorola Inc. Advanced Mobile Messaging Division
`o Wireless Networking
`• Digital Technics Inc., Baltimore, MD.
`1995 - 1997
`
`
`
`o Design of SS7/SONET/ATM interface for telephone switch.
`Integrated Device Technology, Santa Clara, CA.
`
`1995 - 1996
`o Development of Reed-Solomon error control chip for high-speed mass
`memory applications.
`• Lockheed Sanders, Avionics Division, Nashua, N.H.
`1994 - 1995
`
`o Development of error control chips for magnetic recording in space
`applications.
`• Mobile Telecommunication Technologies, Jackson, MS.
`1993 - 1998
`o Design and analysis of mobile networks for paging and data transfer,
`bulk data transfer using frame relay.
`• Al-Elm Research and Development Corp., Raleigh, N.C.
`1992 - 1994
`o Design and development of advanced digital voice and FAX
`encryption techniques.
`1992 - 1993
`
`
`
`
`Intellivision, Atlanta, GA.
`
`o Design and development of automated telephone switching equipment.
`• Unisys Corporation, San Jose, CA.
`
`
`
`1991 - 1992
`o Design and development of error control algorithms for internodal
`communication in multiprocessing computer systems.
`1990 - 1992
`II Morrow Inc., UPS Technical Systems, Salem, OR.
`
`o Analysis, design, and development of error control systems for mobile
`radio networks.
`• Charter Leasing Corporation, Richmond, VA.
`1990 - 1993
`
`
`o Analysis and design of digital switching systems for commercial
`telephony.
`
`•
`
`•
`
`•
`
`
`CURRICULUM DEVELOPMENT
`
`
`• Developed and implemented a course for Graduate Students entitled
`“Modern Cellular Communications: LTE to 5G” for the College of
`Engineering, Cornell University, Ithaca, New York (Fall 2019).
`
`• Developed and implemented a course for Freshmen entitled “Wiretaps to
`Facebook: Security and Privacy in Information Networks” for the College
`of Engineering, Cornell University, Ithaca, New York (Fall 2010).
`
`
`
`3
`
`Genius Sports Ex. 1002
`p. 3
`
`
`
`• Academic Coordinator, Georgia Tech - Lorraine, Metz, France, September
`1990 - March 1992.
`
`• Developed and implemented two graduate courses in Error Control Coding
`and one graduate course in Cryptography and Data Security for the School of
`Electrical Engineering, Georgia Institute of Technology, Atlanta, Georgia.
`
`• Developed and taught numerous short courses on digital communication
`systems, wireless information networks, error control, and cryptology.
`
`Stephanie Santoso (“Navigating the IP Issues of 3D Printing,” graduated Fall
`2019)
`Kolbeinn Karlsson (“Design And Analysis Of Privacy Mechanisms For The
`Internet Of Things,” graduated Summer 2018)
`Shion Goha (“Aspects of Privacy in Social Networks,” graduated Summer
`2016)
`Dipayan Ghosh (“Privacy-Aware Demand Response Systems,” graduated
`Summer 2014)
`Daniel Lee (“Reliable and Energy-Efficient Wireless Sensor Networks for
`Mobile Healthcare Systems,” graduated Summer 2011)
`Nathan Karst (“Combinatorial Designs For Key Distribution And Secure
`Re-Keying In Group Communication Systems,” graduated Summer 2011)
`Sergio Bermudez (“Analysis of Topological Properties of Random Wireless
`Sensor Networks,” graduated Summer 2010)
`Mikhail Lisovich (“Mobility And Privacy: Exploring Technical And Social
`
`4
`
`
`
`
`
`
`
`
`
`
`
` •
`
`
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`
`
`
`
`• Developed and implemented a course for Juniors entitled “Networks and
`Systems” for the School of Electrical Engineering, Cornell University,
`Ithaca, New York (Spring 2005).
`
` •
`
`for Seniors entitled “Artificial
`implemented a course
` Developed and
`Intelligence and Expert Systems for Telecommunications Networks” for the
`School of Electrical Engineering, Cornell University, Ithaca, New York (Spring
`1998).
`
` Developed and implemented a course for Freshmen entitled “Introduction to
`Telecommunications” for the College of Engineering, Cornell University,
`Ithaca, New York (Spring 1997).
`
` Developed and implemented a graduate course in Cryptography and Data
`Security for the School of Electrical Engineering, Cornell University, Ithaca,
`New York (Fall 1996).
`
` •
`
` •
`
`
`PH. D. STUDENTS (GRADUATED)
`
`Cornell University
`
`Genius Sports Ex. 1002
`p. 4
`
`
`
`
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
`•
`
` •
`
`
`
`•
`
`
`
`
`
`Issues In Emerging Pervasive Sensor Networks,” graduated Spring 2010)
`Michael Eoin Buckley (“Side Information Inference For Turbo Code Based
`Systems,” graduated Fall 2009)
`Coalton Bennett (“Secure Data Reporting for Demand Response
`Systems,” graduated Fall 2009)
`Ania Kacewicz (“Coding Theory for Security and Reliability in Wireless
`Networks,” graduated Fall 2009)
`Phillip Kuryloski (“Design Strategies For Human Centered Sensor
`Networks,” graduated Spring 2009)
`Sameer Pai, (“Co-Design Of Sensor Networking Technology And Privacy
`Policy,” graduated Spring 2008)
`Hui Qu, (“Co-Designed Localization And Geographic Routing Algorithm For
`Sensor Networks,” graduated Spring 2008)
`Christina Tavoularis, (“Event Detection and Queueing in Wireless Sensor
`Networks,” Graduated Fall 2006)
`Hazer Inaltekin, (“Game Theoretic Mac Protocol Design And Interference
`Analysis For Wireless Networks,” Graduated Spring 2006)
`Xin Zhang, (“Distributed Source Coding in Sensor Networks,” graduated
`Spring 2006)
`Martin Roth, (“TERMITE: A Swarm Intelligent Routing Algorithm for Mobile
`Wireless Ad Hoc Networks,” graduated Winter 2005)
`Prince Samar. (“Optimizing Protocols for Mobility in Ad Hoc Networks,”
`graduated Summer, 2004)
`Yasser Mourtada. (“Content-Aware Routing Schemes,” graduated Summer,
`2004)
`Allen MacKenzie. (“Game Theoretic Analysis of Medium Access Control
`Protocols,” graduated Spring, 2003)
`Ewald Hueffmeier, Jr. (Applied Mathematics - Turbo Decoding Architectures
`and Algorithms for Wireless Data Systems, graduated Summer, 2002)
`Xie Xi (AI and Expert Systems for Random Access Protocols, graduated
`Summer, 2002)
`Bhaskar Krishnamarchari ("Complexity and Phase Transitions in Wireless
`Networks," graduated Spring, 2002)
`Sarah Spence ("Subfield Subcodes of Reed-Solomon Codes," graduated
`Spring, 2002)
`Eric Sakk ("Wavelets Based on Reed-Muller Coding," graduated Spring,
`2002)
`Frederic Fontaine ("Iterative Trellis Decoding for Block Codes," graduated
`Summer, 1999)
`Saejoon Kim (“Belief Propagation, Parameter Estimation, and Issues in
`Turbo Decoding,” graduated Summer 1998)
`
`Andreas Yankopolus. (“Adaptive Error Control for Wireless Multimedia"),
`graduated Winter, 2004)
`James Kosmach (“Soft Decision Decoding for Wireless Mobile Systems,”
`graduated Fall. 1998)
`
`5
`
`
`Georgia Tech
`
`Genius Sports Ex. 1002
`p. 5
`
`
`
`
`
`
`
`Amjad Luna (“DSP Implementation of Advanced Decoder Architectures,”
`graduated Winter, 1998
`Jong-Il Park (“Turbo Equalization Algorithms,” graduated Winter, 1998)
`Thomas Tapp (“Advanced Error Control Systems for Mobile Messaging
`Systems,” graduated Summer, 1996)
`Mahdi Zaidan (“Tree Structure Trellis Codes,” graduated Spring, 1996)
`Xiao-An Wang
`(“Trellis-Based Decoders
`and Neural Network
`Implementations,” graduated Winter, 1996)
`Ahmed El-Rifai (“Application of Linear Block Codes to the McEliece
`Cryptosystem,” graduated Fall, 1995)
`Miin-Jong Hao (“Performance Evaluation of Practical FSK, CPFSK, and
`ASK Detection Schemes
`for Coherent Optical Fiber Communication
`Systems,” graduated Summer, 1995)
`Slim Souissi
`(“Adaptive Packet Combining
`graduated Summer, 1994)
`Deidre Williams (“Key Management
`graduated Summer, 1994)
`Lars Rasmussen (“Trellis Coded Adaptive Rate Hybrid-ARQ Protocols
`over AWGN and Slowly Fading Rician Channels,” graduated Summer
`1993)
`Mohssen Alabbadi (“Integration of Error Correction, Encryption, and
`Signature Using Linear Error-Correcting Block Codes,” graduated Summer
`1993)
`Michael Bartz (“Soft Decision Decoders Based on Artificial Neural
`Networks,” graduated Summer 1992)
`Michael Rice (“Adaptive Error Control Over Slowly Varying Channels,”
`graduated Spring 1991)
`Bruce Harvey (“Adaptive Rate Convolutional Coding Using the Viterbi
`Decoder,” graduated Spring 1991)
`
`in CDMA Systems,”
`
`in
`
`the McEliece Cryptosystem,”
`
`•
`
`•
`•
`
`•
`•
`
`•
`
`•
`
`
`•
`
`•
`
`•
`
`
`•
`
`
`•
`
`•
`
`•
`
`
`PUBLICATIONS
`
`Theses
`
` •
`
`
`
`
`
`Wicker, S. B., “The Geometry of Error Correcting Codes,” Ph.D. Thesis,
`University of Southern California, Los Angeles, California, May 1987.
`
`
`
`Wicker, S. B., “A Microprocessor Based Diagnostic System,” BS Thesis,
`University of Virginia, Charlottesville, Virginia, May 1982.
`
` •
`
`
`
`Books
`
`Wicker, S. B., Cellular Convergence and the Death of Privacy, Oxford
`University Press, 2013.
`
`Wicker, S. B. and Kim, S., Fundamentals of Codes, Graphs, and Iterative
`Decoding, Boston: Kluwer Academic Press, 2002.
`
`6
`
`
`
` •
`
` •
`
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 6
`
`
`
`
`
`Heegard, C. and Wicker, S. B., Turbo Coding, Boston: Kluwer Academic
`Press, 1999.
`
`Wicker, S. B., Error Control Systems for Digital Communication and
`Storage, Englewood Cliffs: Prentice Hall, 1995.
`
`Wicker, S. B. and Bhargava, V. K. (editors), Reed-Solomon Codes and
`Their Applications, Piscataway: IEEE Press, 1994.
`
`Chmora, A., and Wicker, S. B. (editors), Error Control, Cryptology, and
`Speech Compression: Workshop on
`Information Protection, Moscow,
`Russia, Lecture Notes in Computer Science, Volume 829, Heidelberg:
`Springer Verlag, 1994.
`
`
`
`•
`
` •
`
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
`
`Parts of Books
`
`S. B. Wicker, “Privacy-Aware Design for the Monitoring, Control, and
`Protection of Critical
`Infrastructure,”
`in Homeland Security Threats,
`Countermeasures, and Privacy Issues (ed. Giorgio Franceschetti), Artech
`House, 2010
`
`Z. Haas, J. Y. Halpern, L. Li, and S. B. Wicker, “A decision-theoretic approach
`to resource allocation in wireless multimedia networks,” Resource Allocation
`in Next Generation Wireless Networks (W. Li and Y. Pan, eds.), Nova
`Science Publishers, 2005.
`
`P. Samar and S.B. Wicker, "On the Behavior of Communication Links in a
`Multi-Hop Mobile Environment," Frontiers in Distributed Sensor Networks,
`S.S. Iyengar and R.R. Brooks (eds.), CRC Press, 2005.
`
`B. Krishnamachari and S. B. Wicker, "Base Station Location Optimization in
`Cellular Wireless Networks using Heuristic Search Algorithms," book chapter
`in Soft Computing in Communications, Ed. L. Wang, Springer-Verlag, 2004.
`
`Wicker, S. B., "Cyclic Codes" in Wiley Encyclopedia of Telecommunications,
`(ed: J. Proakis), 2002.
`
`Bhaskar Krishnamachari, Stephen B. Wicker, Ramon Bejar, and Marc
`Pearlman, "Critical Density Thresholds in Distributed Wireless Networks,"
`Advances in Coding and Information Theory, eds. H. Bhargava, H.V. Poor
`and V. Tarokh, Kluwer Publishers, 2002.
`
`Carla Games, Xi Xie, Stephen B. Wicker, and Bart Selman, “Heavy Tails,
`Phae Transitions, and the Nature of Cutoff,” in Codes, Graphs, and Systems,
`Boston: Kluwer, 2002.
`
`Bhaskar Krishnamachari, Xi Xie, Bart Selman, and Stephen B. Wicker,
`"Analysis of Random Walk and Random Noise Algorithms for Satisfiability
`
`7
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 7
`
`
`
`
`
`Testing," Principles and Practice of Constraint Programming - CP 2000,
`Lecture Notes in Computer Science, vol. 1894, Springer, September 2000.
`
`Bhaskar Krishnamachari and Stephen B. Wicker, "Global Search Techniques
`for Problems
`in Mobile Communications,"
`in Telecommunications
`Optimization: Adaptive and Heuristic Approaches, Eds. David Corne et al.,
`John Wiley & Sons Publishers, October 2000.
`
`Costello, D., Hagenauer, J., Imai, H., and Wicker, S. B., “Applications of Error
`Control Coding,” Information Theory: 50 Years of Discovery (S. Verdú and S.
`McLaughlin, ed), IEEE Press, 1999.
`
`Wicker, S. B., “Deep Space Applications,” Handbook of Coding Theory, (Vera
`Pless and William Cary Huffman, ed.), Amsterdam: Elsevier, 1998.
`
`Wicker, S. B. and Bhargava, V. K., “Introduction,” in Reed-Solomon Codes
`and Their Applications, (S. B. Wicker and V. K. Bhargava, ed.), IEEE Press,
`1994.
`
`Wicker, S. B. and Bartz, M., “Reed-Solomon Codes in Hybrid Automatic-
`Repeat-Request Protocols,”
`in Reed-Solomon Codes and Their
`Applications, (S. B. Wicker and V. K. Bhargava, ed.), IEEE Press, 1994.
`
`Alabbadi, M. and Wicker, S. B., “Susceptibility of Digital Signature Schemes
`Based on Error-Correcting Codes to Universal Forgery,” in Error Control,
`Cryptology, and Speech Compression: Workshop on Information Protection,
`Moscow, Russia (A. Chmora and S. B. Wicker, ed.), Lecture Notes on
`Computer Science, Volume 829, Heidelberg: Springer Verlag, 1994.
`
`Souissi, Slim and Wicker, S. B., "Application of Packet Combining
`Techniques to a DS/CDMA System Using Convolutional Encoding and
`Sequential Decoding", in Communication Theory and Applications II (B.
`Honary, M. Darnell, and P. Farrell, ed.) London: HW Communications
`Publishing Ltd, 1993.
`
`Wicker, S. B., “Trellis Coded Hybrid-ARQ Protocols,” in Communication,
`Control, and Signal Processing, pp. 339 - 346, (Erdal Erikan, ed.),
`Amsterdam: Elsevier Publishing (1990).
`
`
`
` •
`
`
`
`
`
` •
`
`
`
` •
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
`
`Refereed Journal Articles
`
`
`
`S. B. Wicker, "The Ethics of Zero-Day Exploits – The NSA Meets the Trolley
`Car,” Communications of the ACM, January 2021.
`
`
` •
`
`
`
`8
`
`Genius Sports Ex. 1002
`p. 8
`
`
`
`
`
`S. B. Wicker, "eBook Surveillance and the Threat to Freedom of Association,”
`Journal of Information Security and Applications, Volume 55, December 2020.
`
`S. B. Wicker and D. Ghosh, "Reading in the Panopticon – Your Kindle May
`Be Spying on You, But You Can’t Be Sure,” Communications of the ACM,
`Volume 63, No. 5, May 2020.
`
`S. B. Wicker, "Smartphones, Contents of the Mind, and the 5th Amendment,”
`Communications of the ACM, April 2018.
`
`S. B. Wicker, “Forced Decryption and the Fifth Amendment: A Technical
`Perspective,” The Proceedings of the IEEE, January 2018.
`
`S. B. Wicker and K. Karlsson, “Ad Blockers: Technology, Ethics, and a
`Serious Difference of Opinion,” Communications of the ACM, October, 2017.
`
`A. S. Kubesch and S. B. Wicker, “Digital rights management: The cost to
`consumers,” in Proceedings of the IEEE, vol.103, no.5, pp.726-733, May
`2015
`
`S. M. Santoso and S. B. Wicker, “The future of three-dimensional printing:
`Intellectual property or intellectual confinement?” New Media & Society, June
`12, 2014
`
`Wicker, S. B. and Santoso, S., “Access to the Internet is a Human Right,”
`Communications of the ACM, June 2013.
`
`N. Karst, S. B. Wicker. “On the rekeying load in group key distributions using
`cover-free families,” IEEE Transactions on Information Theory, Vol. 58, No.
`10, October 2012, pp. 6667 – 6671.
`
`S. B. Wicker, “The Loss of Location Privacy in the Cellular Age,”
`Communications of the ACM, Vol. 55, No. 8, August 2012, pp. 60 - 68.
`
`S. B. Wicker, “Digital Telephony and the Question of Privacy,”
`Communications of the ACM, Vol. 54, No. 7, July, 2011, pp. 88 – 98.
`
`S. B. Wicker and D. E. Schrader, “Privacy-Aware Design Principles for
`Information Networks,” Proceedings of the IEEE, February 2011, pp. 330 -
`350.
`
`Mikhail Lisovich, Deirdre Mulligan, and Stephen B. Wicker, “Inferring
`Personal Information from Demand-Response Systems,” IEEE Security
`and Privacy Magazine; January/February 2010.
`
`9
`
`
`
`•
`
`
`
` •
`
`•
`
`•
`
`
`
` •
`
`•
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
`•
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 9
`
`
`
`
`
`Anna Kacewicz and Stephen B. Wicker, "Redundancy Minimizing Techniques
`for Robust Transmission in Wireless Networks," Journal of Communications
`and Networks, 11:564-573, 2009.
`
`H. Inaltekin, M. Chiang, H. V. Poor and S.B. Wicker, “The behavior of
`unbounded path-loss models and the effect of singularity on computed
`network characteristics,”
`IEEE J. Selected Areas Communications,
`September 2009
`
`H. Inaltekin and S.B. Wicker, "A One-shot Random Access Game for
`Wireless Networks – Behavior of Nodes at Nash Equilibria" IEEE/ACM Trans.
`on Networking, December 2008.
`
`S. Pai, M. Meingast, T. Roosta, S. Bermudez, S. Wicker, D. Mulligan, and S.
`S. Sastry, "Confidentiality in Sensor Networks: Transactional Information,"
`IEEE Security and Privacy Magazine; July/August 2008.
`
`P. Venkitasubramaniam, He Ting, Lang Tong, Stephen B. Wicker, “Toward
`an analytical approach
`to anonymous wireless networking,”
`IEEE
`Communications Magazine, vol.46, no.2, pp.140-146, February 2008
`
`H. Qu and S. B. Wicker, "A Combined Localization and Geographic Routing
`Algorithm for Rapidly-Deployed Wireless Sensor Networks", International
`Journal of Distributed Sensor Networks, Volume 4, Issue 1 January 2008,
`pages 44 - 63.
`
`H. Qu and S. B. Wicker, "Co-Designed Anchor-Free Localization and
`Location-Based Routing Algorithm for Rapidly-Deployed Wireless Sensor
`Networks", Information Fusion, 2008.
`
`M. Meingast, S. Pai, S. Wicker, S. S. Sastry, "Privacy in Camera Networks, A
`Technical Perspective," EECS Department, University of California, Berkeley,
`Technical Report UCB/EECS-2007-94, July 2007.
`
`X. Zhang, J. Chen, S. B. Wicker, and T. Berger, "Successive Coding in
`Multiuser Information Theory", IEEE Transactions on Information Theory,
`Volume 53, No. 6, June 2007, pp. 2246 – 2254.
`
`P. Samar and S. B. Wicker, “Link Dynamics and Protocol Design in a
`Multi-Hop Mobile Environment,” IEEE Transactions on Mobile Computing,
`September 2006.
`
`X. Zhang, S. B. Wicker, "On the Optimal Distribution of Sensors in a
`Random Field", ACM Transactions on Sensor Networks, March 2006.
`
`J. Chen, X. Zhang, T. Berger and S. B. Wicker "The Sum-Rate Distortion
`Function and Optimal Rate Allocation for the Quadratic Gaussian CEO
`
`10
`
`
`
`•
`
` •
`
`
`
`•
`
`•
`
`•
`
`•
`
`•
`
` •
`
`
`
` •
`
`
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 10
`
`
`
`
`
`Problem" IEEE Journal on Selected Areas in Communications: Special Issue
`on Sensor Networks, Volume 22, No. 6, August 2004.
`
`Bhaskar Krishnamachari, Rung-Hung Gau, Stephen B. Wicker, and Zygmunt
`J. Haas, "Optimal Sequential Paging in Cellular Networks," ACM/Baltzer
`Wireless Networks, Vol 10, No. 2, March 2004.
`
`Bhaskar Krishnamachari, Stephen Wicker, Ramon Bejar and Cesar
`Fernandez, "On the Complexity of Distributed Self-Configuration in Wireless
`Networks," in Kluwer Journal on Telecommunication Systems, Special Issue
`on Wireless Networks and Mobile Computing, Eds. I. Stojmenovic and S.
`Olariu, Vol. 22, No. 1, January/April 2003.
`
`B. Krishnamachari, Y. Mourtada, and S. Wicker, "The Energy-Robustness
`Tradeoff for Real-Time Information Routing in Wireless Sensor Networks,"
`submitted to the Special Issue of Elsevier Computer Networks on Wireless
`Sensor Networks, October 2002.
`
`Andrea Goldsmith And Stephen B. Wicker, "Design Challenges For Energy-
`Constrained Ad Hoc Wireless Networks," IEEE Wireless Communications
`Magazine, August, 2002.
`
`Allen B. MacKenzie and Stephen B. Wicker, "Game Theory and the Design of
`Self-Configuring, Adaptive Wireless Networks,"
`IEEE Communications
`Magazine, November 2001.
`
`Buckley, M. E. and Wicker, S. B., “The Design and Performance of a Neural
`Network for Predicting Decoder Error in Turbo-Coded ARQ Protocols,” IEEE
`Transactions on Communications, Volume 48, Number 4, pp. 566 - 576, April
`2000.
`
`Park, J. I., Wicker, S. B., and Owen, H. L., “Trellis-Based Soft Output
`Adaptive Equalization Techniques
`for TDMA Cellular Systems,” IEEE
`Transactions on Vehicular Technology, pp. 83 – 94, January 2000.
`
`Wang, X.A., and Wicker, S. B., "The BCJR Trellis and the Design and
`Implementation of Trellis Decoders for Some BCH Codes," Applicable
`Algebra in Engineering, Communication, and Computing, Volume 9, Number
`6, 1999, pp. 521 - 546.
`
`Buckley, M. E. and Wicker, S. B., “A Neural Network for Predicting Decoder
`Error in Turbo Decoders,” IEEE Communications Letters, Volume 3, Number
`5, May 1999, pp. 145 - 147.
`
`Tapp, T., Luna, A., Wang, X.A., and Wicker, S. B., “BCH Soft Decision
`Decoders
`for Mobile Data Applications,”
`IEEE Transactions on
`Communications, Volume 47, Number 3, pp. 333 – 337, March 1999.
`
`11
`
`
`
` •
`
`
`
` •
`
`
`
` •
`
`
`
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
` •
`
` •
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`Genius Sports Ex. 1002
`p. 11
`
`
`
`Luna, A., Fontaine, F. and Wicker, S. B., “Iterative Maximum Likelihood Trellis
`Decoding for Block Codes,” IEEE Transactions on Communications, Volume
`47, Number 3, pp. 338 – 342, March 1999.
`
`
`
`
`
` •
`
`
`
`
`
`Costello, D., Hagenauer, J., Imai, H., and Wicker, S. B., “Applications of Error
`Control Coding,” IEEE Transactions on Information Theory, 50th Anniversary
`Issue, Volume 44, Number 6, pp. 2531 - 2560, October 1998.
`
` •
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`Zaidan, M. Y. and Wicker, S. B., “Trellis Coded Modulation with σ-Tree
`Codes,” IEEE Transactions on Information Theory, Volume 43, Number 6, pp.
`2005 - 2012, November, 1997.
`
`Hao, M.-J. and Wicker, S. B., “The Effect of Error Control Coding in
`Multichannel FSK Coherent Lightwave Communication Systems,” IEEE
`Journal of Lightwave Technology, Volume 14, Number 12, pp. 2648 - 2656,
`December, 1996.
`
`Rasmussen, L. K., Bartz, M. J., and Wicker, S. B., “A Comparison of Trellis
`Coded and Reed-Solomon Coded Hybrid-ARQ Protocols over Slowly
`Fading Rayleigh Channels,” Wireless Personal Communications, Volume 2,
`Number 4, pp. 393-413, 1996.
`
`Wang, X-A, and Wicker, S. B., “Generalized Soft Decision Decoding for
`Concatenated Systems,” IEEE Transactions on Information Theory, Volume
`42, Number 2, pp. 543-553, March, 1996.
`
`Wang, X-A, and Wicker, S. B., “The Analog Neural Net Viterbi Decoder,”
`IEEE Transactions on Communications, Volume 44, Number 2, February,
`1996, pp. 165 - 171.
`
`Rasmussen, L. and Wicker, S. B., “Trellis Coded, Type-I Hybrid-ARQ
`Protocols Based on CRC Error-Detecting Codes,” IEEE Transactions on
`Communications, Volume 43, Number 10, October, 1995, pp. 2569 - 2575.
`
`Hao, M.-J. and Wicker, S. B., “Performance Evaluation of FSK and CPFSK
`Optical Communication Systems: A Stable and Accurate Method,” IEEE
`Journal of Lightwave Technology, Volume 13, Number 8, August 1995, pp
`1613 - 1623.
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`Rasmussen, L. and Wicker, S. B., “A Comparison of Two Code Combining
`Techniques for Equal Gain, Trellis Coded Diversity Receivers,” IEEE
`Transactions on Vehicular Technology, Volume 44, Number 2, May, 1995,
`pp. 291 - 295.
`
`
`
`
`
`
`Souissi, S. and Wicker, S. B., “A Diversity Combining DS/CDMA System with
`Convolutional Encoding and Viterbi Decoding,”
`IEEE Transactions on
`Vehicular Technology, Volume 44, Number 2, May, 1995, pp. 304 - 312.
`
`
`
`12
`
`Genius Sports Ex. 1002
`p. 12
`
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`•
`
`
`
` •
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`Rasmussen, L. and Wicker, S. B., “A Comparison of Two Retransmission
`Request Mechanisms for Trellis Coded Modulation,” Electronics Letters,
`Volume 29, Number 25, pp. 2162 - 2163, December 9, 1993.
`
`Wicker, S. B. and Bartz, M., “Type-II Hybrid-ARQ Protocols Using Punctured
`MDS Codes,” IEEE Transactions on Communications, Vol. 42, No. 4, pp.
`1431-1440, April 1994.
`
`Rice, M. D. and Wicker S. B., “A Sequential Testing Scheme for Adaptive
`Error Control on Slowly Varying Channels”
`IEEE Transactions on
`Communications, Vol. 42, No. 4, pp. 1533-1543, April 1994.
`
`Harvey, B. A. and Wicker, S. B., “Packet Combining Systems Based on the
`Viterbi Decoder” IEEE Transactions on Communications, Vol. 42, No. 4, pp.
`1544-1557, April 1994.
`
`Rice, M. D. and Wicker, S. B., “Adaptive Error Control for Slowly Varying
`Channels,” IEEE Transactions on Communications, Vol. 42, No. 3, pp. 917-
`926, March 1994.
`
`Wicker, S. B. and Bartz, M., “The Design and Implementation of Type-I and
`Type-II Hybrid-ARQ Protocols Based on First-Order Reed-Muller Codes,”
`IEEE Transactions on Communications, Vol. 42, No. 3, pp. 979-987, March
`1994.
`
`Rasmussen, L. and Wicker, S. B., “Trellis Coded Hybrid-ARQ Protocols over
`AWGN and Slowly Fading Rician Channels,”
`IEEE Transactions on
`Information Theory, Volume 40, Number 2, March 1994, pp. 418-428.
`
`Rice, M. D. and Wicker, S. B., "Modified Majority-Logic Decoding of Cyclic
`Codes in Hybrid-ARQ Systems, IEEE Transactions on Communications,
`Volume 40, Number 9, pp. 1413 - 1417, September, 1992.
`
`Alabbadi, M. and Wicker, S. B., “Cryptanalysis of the Harn-Wang modification
`of the Xinmei signature scheme,” Electronics Letters, Volume 28, Number 18,
`pp. 1756 - 1757, August 27, 1992.
`
`Wicker, S. B., “Reed-Solomon Error Control Coding for Data Transmission
`over Rayleigh Fading Channels with Feedback,” IEEE Transactions on
`Vehicular Technology, Volume 41, Number 2, pp. 124 - 133, May 1992.
`
`Alabbadi, M. and Wicker, S. B., “The Security of Xinmei’s Digital Signature
`Scheme” Electronics Letters, Volume 28, Number 9, pp. 890 - 891, April
`1992.
`
`Wicker, S. B., “Adaptive Rate Error Control Through the Use of Diversity
`Combining and Majority-Logic Decoding in a Hybrid-ARQ Protocol,” IEEE
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`
`13
`
`Genius Sports Ex. 1002
`p. 13
`
`
`
`
`
`
`
`Transactions on Communications, Volume 39, Number 3, pp. 380 - 386,
`March 1991.
`
`Harvey, B and Wicker, S. B., “Error-Trapping Viterbi Decoding for Type-I
`Hybrid-ARQ Protocols,” Canadian Journal of Electrical and Computer
`Engineering, Volume 16, Number 1, pp. 5 - 12, January 1991.
`
`Wicker, S. B., “Muting Algorithms Based on the Use of Side Information
`Generated by Error Control Systems,” IEEE Transactions on Vehicular
`Technology, Volume 39, No 2, pp. 171 - 176, May 1990.
`
`Wicker, S. B., “Modified Majority-Logic Decoders for Use in Convolutionally
`Encoded Hybrid-ARQ Systems,” IEEE Transactions on Communications,
`Volume 38, No. 3, pp. 263 - 266, March 1990.
`
` •
`
` Wicker, S. B., “High Reliability Data Transfer over the Land Mobile Radio
`Channel,” IEEE Transactions on Vehicular Technology, Volume 39, No 1, pp.
`48 - 55, February 1990.
`
`
`Refereed Conference Papers
`
`S. B. Wicker, “eBook Readers, Location Surveillance, and the Threat to
`Freedom of Association,” International Conference on Availability, Reliability,
`and Security, August 26 – 29, 2019, Canterbury, UK.
`
`K. Karlsson, K., Adams, D., Rubambiza, G., Xian, Z., van Renesse, R.,
`Weatherspoon, H., Wicker, S., “Untethered: Deployable Blockchains for IoT
`Environments,” ACM Symposium on Cloud Computing 2018 (SoCC '18),
`October 2018.
`
`Karlsson, K., Wicker, S., Weatherspoon, H., van Renesse, R., ”Vegvisir: An
`energy-efficient,
`partition-tolerant
`blockchain.” Proceedings
`of
`the
`International Conference on Distributed Computing Systems (ICDCS), 2018
`
`Kolbeinn Karlsson; Zhiming Shen; Weijia Song; Hakim Weatherspoon;
`Robbert van Renesse; Stephen Wicker, “Toward an Emergency Edge
`Supercloud,” ACM Symposium on Cloud Computing 2017 (SoCC '17), Santa
`Clara, California, September 25-27, 2017
`
`Shion Guha and Stephen B Wicker. “Connecting Grounded Theory and
`Machine Learning: Setting a Research Agenda for Human Centered Data
`Science,” Human Centered Data Science Workshop, ACM Conference on
`Computer Supported Cooperative Work and Social Computing, San
`Francisco, CA, February 27 – March 2, 2016.
`
`14
`
` •
`
`
`
`•
`
` •
`
`
`
` •
`
`
`
`
`
` •
`
`
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
` •
`
`
`
`
`
`
`Genius Sports Ex. 1002
`p. 14
`
`
`
`
`
`Kolbeinn Karlsson and Stephen B. Wicker, “The Effect of Location Granularity
`on Semantic Location Inferences,” in Proc. of the 49th Hawaiian Conference
`on System Science (HICSS-46), Kauai, Hawaii, Jan. 2016.
`
`Shion Guha and Stephen B. Wicker. 2015. Spatial subterfuge: an experience
`sampling study to predict deceptive location disclosures. In Proceedings of
`the 2015 ACM International Joint Conference on Pervasive and Ubiquitous
`Computing (UbiComp '15). ACM, New York, NY, USA, 1131-1135.
`
`Shion Guha and Stephen B. Wicker, “Do Birds of a Feather Watch Each
`Other? Homophily and Social Surveillance
`in Location Based Social
`Networks,” Proc