One of the simplest sensor network models has one single underlying Gaussian source of interest, observed by many sensors, subject to independent Gaussian observation noise. The se...
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy
conditions and communication costs. This is motivated by a
numbe...
In this paper, we consider transmission in relatively wide-stretched power line communication (PLC) networks, where repeaters are required to bridge the source-to-destination dista...
If we treated image watermarking as a communication problem using the image as the communication channel, applying error-correcting codes (ECC) to the watermarking system should i...
Abstract— We consider communication over the Gaussian multiple access channel (MAC) with unknown set of active users. The proposed multiple access strategy is distributed and ach...
Urs Niesen, Uri Erez, Devavrat Shah, Gregory W. Wo...