Sciweavers

55 search results - page 7 / 11
» New Constructive Approach to Covert Channel Modeling and Cha...
Sort
View
ICCCN
2007
IEEE
14 years 1 months ago
An FEC-based Reliable Data Transport Protocol for Underwater Sensor Networks
—In this paper, we investigate the reliable data transport problem in underwater sensor networks. Underwater sensor networks are significantly different from terrestrial sensor ...
Peng Xie, Jun-Hong Cui
ACSAC
2003
IEEE
14 years 27 days ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution
In many wireless systems, interference is the main performance-limiting factor, and is primarily dictated by the locations of concurrent transmitters. In many earlier works, the l...
Radha Krishna Ganti, Jeffrey G. Andrews, Martin Ha...
INTERSPEECH
2010
13 years 2 months ago
Unscented transform with online distortion estimation for HMM adaptation
In this paper, we propose to improve our previously developed method for joint compensation of additive and convolutive distortions (JAC) applied to model adaptation. The improvem...
Jinyu Li, Dong Yu, Yifan Gong, L. Deng
INFOCOM
2003
IEEE
14 years 27 days ago
Exploiting Multiuser Diversity for Medium Access Control in Wireless Networks
— Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that us...
Xiangping Qin, Randall A. Berry