Many real world applications such as sensor networks and other monitoring applications naturally generate probabilistic streams that are highly correlated in both time and space. ...
— In this paper, we look at multiple antenna systems and code information on the communication medium itself to improve the link security. In the case of single data stream trans...
Xin Zhou, Persefoni Kyritsi, Patrick C. F. Eggers,...
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
Database performance can be greatly affected by environmental and internal dynamics such as workloads and system configurations. Existing strategies to maintain performance under ...
Yi-Cheng Tu, Song Liu, Sunil Prabhakar, Bin Yao, W...
Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...