Sciweavers

2237 search results - page 76 / 448
» On the Security of Random Sources
Sort
View
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 5 months ago
Mixing and non-mixing local minima of the entropy contrast for blind source separation
In this paper, both non-mixing and mixing local minima of the entropy are analyzed from the viewpoint of blind source separation (BSS); they correspond respectively to acceptable a...
Frédéric Vrins, Dinh-Tuan Pham, Mich...
127
Voted
ACISICIS
2010
IEEE
14 years 8 months ago
A Study on Defect Density of Open Source Software
— Open source software (OSS) development is considered an effective approach to ensuring acceptable levels of software quality. One facet of quality improvement involves the dete...
Cobra Rahmani, Deepak Khazanchi
INFOCOM
2011
IEEE
14 years 8 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
114
Voted
TIT
2008
87views more  TIT 2008»
15 years 4 months ago
Coding Theorems on the Threshold Scheme for a General Source
In this paper, coding theorems on the (t; m)-threshold scheme for a general source are discussed, where m means the number of the shares and t means a threshold. The (t; m)-thresho...
Hiroki Koga
SJ
2010
158views more  SJ 2010»
14 years 11 months ago
Efficient Utilization of Renewable Energy Sources by Gridable Vehicles in Cyber-Physical Energy Systems
The main sources of emission today are from the electric power and transportation sectors. One of the main goals of a cyber-physical energy system (CPES) is the integration of rene...
A. Y. Saber, Ganesh K. Venayagamoorthy