Sciweavers

731 search results - page 115 / 147
» Special Section on Information and Communication System Secu...
Sort
View
ICC
2009
IEEE
14 years 3 months ago
Robust Cyclic Space-Frequency Filtering for BICM-OFDM with Outdated CSIT
— In this paper, we introduce robust cyclic space– frequency (CSF) filtering for systems combining bit–interleaved coded modulation (BICM) and orthogonal frequency division ...
Harry Z. B. Chen, Robert Schober, Wolfgang H. Gers...
IAT
2006
IEEE
14 years 2 months ago
Realising Common Knowledge Assumptions in Agent Auctions
Game theory is popular in agent systems for designing auctions with desirable properties. However, many of these properties will only hold if the game and its properties are commo...
Frank Guerin, Emmanuel M. Tadjouddine
ICDCSW
2002
IEEE
14 years 1 months ago
The Impact of Data Aggregation in Wireless Sensor Networks
Sensor networks are distributed event-based systems that differ from traditional communication networks in several ways: sensor networks have severe energy constraints, redundant ...
Bhaskar Krishnamachari, Deborah Estrin, Stephen B....
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 3 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
ICCV
2009
IEEE
15 years 1 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...