Sciweavers

182 search results - page 13 / 37
» Theoretical analysis of bus-invert coding
Sort
View
IH
2007
Springer
14 years 2 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
ICIP
2006
IEEE
14 years 10 months ago
CLIX: Network Coding and Cross Layer Information Exchange of Wireless Video
Network Coding (NC) can be efficiently combined with the "physical layer broadcast" property of wireless mediums to facilitate mutual exchange of independent information...
Shirish S. Karande, Kiran Misra, Hayder Radha
GLOBECOM
2008
IEEE
14 years 2 months ago
A Novel Topology Control Scheme for Future Wireless Mesh Networks
—In this paper, we address the topology control issue for future wireless mesh networks (WMNs). In particular, we propose a novel topology control scheme that attempts to maximiz...
Kejie Lu, Tao Zhang, Yi Qian, Shengli Fu
ACMSE
2006
ACM
14 years 2 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
VTC
2007
IEEE
14 years 2 months ago
Packet Centric vs. Radio Centric Link Layer Approaches: A Quantitative Analysis
Abstract— A well-known concept to adapt the transmitted payload to the current channel capacity is to perform segmentation of the uncoded user payload. In [1], a new cross layera...
Francesco Rossetto, Michael Meyer, Michele Zorzi