Sciweavers

244 search results - page 24 / 49
» Analyzing the performance of randomized information sharing
Sort
View
87
Voted
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
15 years 3 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
89
Voted
ICASSP
2008
IEEE
15 years 4 months ago
Subspace compressive detection for sparse signals
The emerging theory of compressed sensing (CS) provides a universal signal detection approach for sparse signals at sub-Nyquist sampling rates. A small number of random projection...
Zhongmin Wang, Gonzalo R. Arce, Brian M. Sadler
ACSAC
2006
IEEE
15 years 3 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee
82
Voted
TCOM
2010
83views more  TCOM 2010»
14 years 4 months ago
Early-Elimination Modification for Priority-First Search Decoding
Abstract--In order to release the growing demand for computational complexity with respect to increasing information sequence length in the priority-first search decoding algorithm...
Shin-Lin Shieh, Po-Ning Chen, Yunghsiang S. Han, T...
ICCS
2005
Springer
15 years 3 months ago
Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments
Abstract. Publish/subscribe model is appropriate in many push based data dissemination applications such as data dissemination services, information sharing, service discovery, etc...
Sangyoon Oh, Sangmi Lee Pallickara, Sung Hoon Ko, ...