Dr. Helen Y. Tang
Research Assistant
SPIE Involvement:
Author
Publications (6)

Proceedings Article | 28 May 2013 Paper
Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang
Proceedings Volume 8755, 87550C (2013) https://doi.org/10.1117/12.2015438
KEYWORDS: Network security, Information security, Computer simulations, Computer security, Data modeling, Defense and security, Computing systems, Reliability, Bayesian inference, Tumor growth modeling

Proceedings Article | 28 May 2013 Paper
Yanwei Wang, Helen Tang, F. Richard Yu, Minyi Huang
Proceedings Volume 8755, 875509 (2013) https://doi.org/10.1117/12.2015281
KEYWORDS: Information security, Network security, Defense and security, Mathematical modeling, Computer security, Systems modeling, Matrices, Computing systems, Computer programming, Sensors

Proceedings Article | 22 May 2013 Paper
Maoyu Wang, Helen Tang, F. Yu
Proceedings Volume 8742, 87420Q (2013) https://doi.org/10.1117/12.2014616
KEYWORDS: Tin, Sensor networks, Network security, Sensors, Computer security, Receivers, Telecommunications, Network architectures, Cryptography, Symmetric-key encryption

Proceedings Article | 4 May 2012 Paper
Shanzeng Guo, Helen Tang
Proceedings Volume 8404, 840406 (2012) https://doi.org/10.1117/12.918035
KEYWORDS: Received signal strength, Sensors, Signal detection, Computer simulations, Monte Carlo methods, RF communications, Warfare, Detection and tracking algorithms, Antennas, Mobile communications

Proceedings Article | 8 August 2003 Paper
Helen Tang, Ioannis Lambadaris
Proceedings Volume 5244, (2003) https://doi.org/10.1117/12.509441
KEYWORDS: Computer simulations, Analytical research, Control systems, Computing systems, Computer engineering, Mathematics, Information technology, Complex systems, Linear filtering, Signal attenuation

Showing 5 of 6 publications
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Advertisement
Advertisement
Back to Top