Sciweavers

15379 search results - page 206 / 3076
» Protecting users from
Sort
View
JSAC
2011
191views more  JSAC 2011»
13 years 3 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
JCST
2010
147views more  JCST 2010»
13 years 2 months ago
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protect...
Yongdong Wu, Robert H. Deng
ICASSP
2011
IEEE
12 years 11 months ago
Resource allocation for OFDMA cognitive radios under channel uncertainty
A weighted sum-rate maximization problem is considered for an access point (AP) allocating resources to wireless cognitive radios (CRs) communicating using orthogonal frequency-di...
Seung-Jun Kim, Nasim Yahya Soltani, Georgios B. Gi...
SAINT
2007
IEEE
14 years 2 months ago
Privacy Management for Context Transponders
While by now feasible solutions to protect privacy for complex ubiquitous applications are available, very small devices, called context transponders (CTP) still lack resources to...
Michael Fahrmair, Wassiou Sitou, Bernd Spanfelner
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
14 years 2 months ago
Adaptive Perceptual Degradation Based on Video Usage
The emergence of online digital media sales services has given rise to the issue of online digital rights management (DRM). This paper presents a novel approach to online digital ...
Alexander Wong, William Bishop