Sciweavers

16 search results - page 2 / 4
» Precise Capacity Analysis in Binary Networks with Multiple C...
Sort
View
NDSS
2008
IEEE
13 years 11 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
TWC
2008
158views more  TWC 2008»
13 years 5 months ago
Transmission capacity of ad hoc networks with spatial diversity
This paper derives the outage probability and transmission capacity of ad hoc wireless networks with nodes employing multiple antenna diversity techniques, for a general class of ...
Andrew M. Hunter, Jeffrey G. Andrews, Steven Weber
ICC
2008
IEEE
121views Communications» more  ICC 2008»
13 years 11 months ago
Analysis of a General Mixed Strategy for Gaussian Multiple Relay Channels
— In their landmark paper Cover and El Gamal proposed different coding strategies for the relay channel with a single relay supporting a communication pair. These strategies are ...
Peter Rost, Gerhard Fettweis
CORR
2010
Springer
182views Education» more  CORR 2010»
13 years 5 months ago
Index coding via linear programming
Abstract Anna Blasiak Robert Kleinberg Eyal Lubetzky Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and e...
Anna Blasiak, Robert D. Kleinberg, Eyal Lubetzky
EMSOFT
2006
Springer
13 years 9 months ago
Multi-level software reconfiguration for sensor networks
In-situ reconfiguration of software is indispensable in embedded networked sensing systems. It is required for re-tasking a deployed network, fixing bugs, introducing new features...
Rahul Balani, Chih-Chieh Han, Ram Kumar Rengaswamy...