Sciweavers

244 search results - page 24 / 49
» Analyzing the performance of randomized information sharing
Sort
View
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
ICASSP
2008
IEEE
14 years 3 months ago
Subspace compressive detection for sparse signals
The emerging theory of compressed sensing (CS) provides a universal signal detection approach for sparse signals at sub-Nyquist sampling rates. A small number of random projection...
Zhongmin Wang, Gonzalo R. Arce, Brian M. Sadler
ACSAC
2006
IEEE
14 years 3 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee
TCOM
2010
83views more  TCOM 2010»
13 years 3 months ago
Early-Elimination Modification for Priority-First Search Decoding
Abstract--In order to release the growing demand for computational complexity with respect to increasing information sequence length in the priority-first search decoding algorithm...
Shin-Lin Shieh, Po-Ning Chen, Yunghsiang S. Han, T...
ICCS
2005
Springer
14 years 2 months ago
Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications such as data dissemination services, information sharing, service discovery, etc...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...