Sciweavers

433 search results - page 4 / 87
» Information and Inventory in Distribution Channels
Sort
View
IEEEIA
2009
13 years 5 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Generalized Secure Distributed Source Coding with Side Information
In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...
TSP
2010
13 years 2 months ago
Distributed estimation of channel gains in wireless sensor networks
We consider the problem of distributed channel estimation in a sensor network which employs a random sleep strategy to conserve energy. If the N network nodes are randomly placed a...
Sivagnanasundaram Ramanan, John MacLaren Walsh
JTAER
2008
116views more  JTAER 2008»
13 years 7 months ago
Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma
The integration of supply chains as a mechanism for value creation is largely dependent on continuous flow of real time accurate information from the customer back upstream to the...
Albert Munoz, Michael D. Clements
EJWCN
2010
131views more  EJWCN 2010»
13 years 2 months ago
The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow
We present a general game-theoretical framework for the resource allocation problem in the downlink scenario of distributed wireless small-cell networks, where multiple access poi...
Gaoning He, Laura Cottatellucci, Mérouane D...