Sciweavers

435 search results - page 75 / 87
» A Model-based Simulation Approach to Error Analysis of IT Se...
Sort
View
ESORICS
2007
Springer
15 years 7 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright
TSP
2008
149views more  TSP 2008»
15 years 3 months ago
Decentralized Quantized Kalman Filtering With Scalable Communication Cost
Estimation and tracking of generally nonstationary Markov processes is of paramount importance for applications such as localization and navigation. In this context, ad hoc wireles...
Eric J. Msechu, Stergios I. Roumeliotis, Alejandro...
198
Voted
TMC
2012
13 years 5 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
163
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
BMCBI
2005
135views more  BMCBI 2005»
15 years 3 months ago
A robust two-way semi-linear model for normalization of cDNA microarray data
Background: Normalization is a basic step in microarray data analysis. A proper normalization procedure ensures that the intensity ratios provide meaningful measures of relative e...
Deli Wang, Jian Huang, Hehuang Xie, Liliana Manzel...