scispace - formally typeset
P

Pin-Han Ho

Researcher at University of Waterloo

Publications -  392
Citations -  10165

Pin-Han Ho is an academic researcher from University of Waterloo. The author has contributed to research in topics: Wireless network & Network topology. The author has an hindex of 43, co-authored 362 publications receiving 9391 citations. Previous affiliations of Pin-Han Ho include Tohoku University & Queen's University.

Papers
More filters
Book ChapterDOI

Routing and Wavelength Assignment with Multi-Granularity OXCs

TL;DR: This chapter provides two dynamic algorithms for solving the problem of routing and wavelength assignment with tunnel allocation, namely Dynamic Tunnel Allocation and Capacity-Balanced Static tunnel Allocation schemes.
Proceedings ArticleDOI

Coded wireless video broadcast/ multicast: a cross-layer framework and end-to-end distortion analysis

TL;DR: The paper provides a comprehensive information theoretical analysis on the end-to-end distortion and mathematical proofs are derived to confirm the advantages and conditions of such cross-layer systems to always give the better distortion performance.
Proceedings ArticleDOI

Joint bit and power loading with user and stream selection in OSDM MU-MIMO broadcast channels

TL;DR: Numerical results show that the proposed joint bit and power loading with OSDM user and stream selection is effective in increasing the total transmission rate without consuming additional resources.
Proceedings ArticleDOI

Preconfigured structures for survivable WDM networks

TL;DR: This paper focuses on link-based failure localization and protection in WDM networks, and shows that simple cycles can be regarded as a special case of non- simple cycles, and both simple and non-simple cycles are special cases of trails.
Journal ArticleDOI

Optimal RIS Allocations for PLS with Uncertain Jammer and Eavesdropper

TL;DR: In this article , a RIS-assisted wireless communication system, where the RIS is deployed to aid pair of the transmitter (Alice) and receiver (Bob) under the active jamming (Jammer) and eavesdropper (Eve) attack, is studied.