Sciweavers

495 search results - page 83 / 99
» Information theory of wideband communications
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
14 years 2 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
IPCCC
2006
IEEE
14 years 1 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
ECIS
2004
13 years 9 months ago
Organizational Performance of a Firm in a Modular Business Network
The organizational capabilities to interact with others have been greatly improved as a result of modern information and communications technologies: Nowadays a company can mainta...
Diederik W. van Liere, Lorike Hagdorn van der Meij...
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 7 months ago
Polyominoes Simulating Arbitrary-Neighborhood Zippers and Tilings
This paper provides a bridge between the classical tiling theory and cellular automata on one side, and the complex neighborhood self-assembling situations that exist in practice,...
Lila Kari, Benoît Masson