Sciweavers

18 search results - page 3 / 4
» Searching for the Optimum Correlation Attack
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
ICIP
2000
IEEE
14 years 9 months ago
Image Watermarking with Better Resilience
We present schemes for hardeningimage watermarks against adversarial jamming. Our techniques improve upon standard correlation- and spread spectrum-based methods, and withstand va...
Ramarathnam Venkatesan, Mariusz H. Jakubowski
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
WIMOB
2008
IEEE
14 years 2 months ago
On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty
—In this paper, link level adaptation algorithms in a system applying spatial multiplexing in the presence of channel uncertainty are considered. The first part of this paper de...
Jelena Mirkovic, Bernhard Walke
SIGIR
2002
ACM
13 years 7 months ago
Predicting query performance
We develop a method for predicting query performance by computing the relative entropy between a query language model and the corresponding collection language model. The resultin...
Stephen Cronen-Townsend, Yun Zhou, W. Bruce Croft