Sciweavers

435 search results - page 75 / 87
» A Model-based Simulation Approach to Error Analysis of IT Se...
Sort
View
ESORICS
2007
Springer
14 years 17 days ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright
TSP
2008
149views more  TSP 2008»
13 years 8 months ago
Decentralized Quantized Kalman Filtering With Scalable Communication Cost
Estimation and tracking of generally nonstationary Markov processes is of paramount importance for applications such as localization and navigation. In this context, ad hoc wireles...
Eric J. Msechu, Stergios I. Roumeliotis, Alejandro...
TMC
2012
11 years 11 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
MOBICOM
2010
ACM
13 years 8 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
BMCBI
2005
135views more  BMCBI 2005»
13 years 8 months ago
A robust two-way semi-linear model for normalization of cDNA microarray data
Background: Normalization is a basic step in microarray data analysis. A proper normalization procedure ensures that the intensity ratios provide meaningful measures of relative e...
Deli Wang, Jian Huang, Hehuang Xie, Liliana Manzel...