Sciweavers

374 search results - page 53 / 75
» sum 2010
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 10 months ago
Network Codes Resilient to Jamming and Eavesdropping
Abstract--We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious err...
Hongyi Yao, Danilo Silva, Sidharth Jaggi, Michael ...
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 10 months ago
An LSB Data Hiding Technique Using Natural Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of ...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 10 months ago
A New Framework for Join Product Skew
Different types of data skewness can result in load imbalance in the context of parallel joins under the shared nothing architecture. We study one important type of skewness, join ...
Foto N. Afrati, Victor Kyritsis, Paraskevas V. Lek...
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 10 months ago
Joint Bandwidth and Power Allocation with Admission Control in Wireless Multi-User Networks With and Without Relaying
Equal allocation of bandwidth and/or power may not be efficient for wireless multi-user networks with limited bandwidth and power resources. Joint bandwidth and power allocation s...
Xiaowen Gong, Sergiy A. Vorobyov, Chintha Tellambu...
CORR
2010
Springer
49views Education» more  CORR 2010»
13 years 10 months ago
Distributed Algorithms for Learning and Cognitive Medium Access with Logarithmic Regret
The problem of distributed learning and channel access is considered in a cognitive network with multiple secondary users. The availability statistics of the channels are initially...
Animashree Anandkumar, Nithin Michael, Ao Kevin Ta...