Sciweavers

162 search results - page 23 / 33
» Deconvolving Protected Signals
Sort
View
IPSN
2010
Springer
14 years 2 months ago
Robust uncorrelated bit extraction methodologies for wireless sensors
This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
Jessica Croft, Neal Patwari, Sneha Kumar Kasera
AIRWEB
2009
Springer
14 years 2 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
IPPS
2007
IEEE
14 years 1 months ago
Packet Loss Burstiness: Measurements and Implications for Distributed Applications
Many modern massively distributed systems deploy thousands of nodes to cooperate on a computation task. Network congestions occur in these systems. Most applications rely on conge...
David X. Wei, Pei Cao, Steven H. Low
VTC
2007
IEEE
104views Communications» more  VTC 2007»
14 years 1 months ago
Soft-Bit Assisted Iterative AMR-WB Source-Decoding and Turbo-Detection of Channel-Coded Differential Space-Time Spreading Using
Abstract – Jointly optimised iterative source- and channel-decoding is used for enhancing the error resilience of the Adaptive Multi Rate WideBand (AMR-WB) speech codec. The resu...
Noor S. Othman, Mohammed El-Hajjar, Osamah Alamri,...
CCS
2007
ACM
14 years 1 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks