Sciweavers

48 search results - page 10 / 10
» Hide and Seek in Time - Robust Covert Timing Channels
Sort
View
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 1 months ago
The Non-Bayesian Restless Multi-Armed Bandit: a Case of Near-Logarithmic Regret
In the classic Bayesian restless multi-armed bandit (RMAB) problem, there are N arms, with rewards on all arms evolving at each time as Markov chains with known parameters. A play...
Wenhan Dai, Yi Gai, Bhaskar Krishnamachari, Qing Z...
JSAC
2011
185views more  JSAC 2011»
12 years 11 months ago
Joint Dynamic Resource Allocation and Waveform Adaptation for Cognitive Networks
This paper investigates the issue of dynamic resource allocation (DRA) in the context of multiuser cognitive radio networks. We present a general framework adopting generalized si...
Zhi Tian, Geert Leus, Vincenzo Lottici
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 3 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...