Sciweavers

18 search results - page 3 / 4
» Searching for the Optimum Correlation Attack
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
ICIP
2000
IEEE
15 years 11 months ago
Image Watermarking with Better Resilience
We present schemes for hardeningimage watermarks against adversarial jamming. Our techniques improve upon standard correlation- and spread spectrum-based methods, and withstand va...
Ramarathnam Venkatesan, Mariusz H. Jakubowski
ASPLOS
2006
ACM
15 years 3 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
WIMOB
2008
IEEE
15 years 4 months ago
On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty
—In this paper, link level adaptation algorithms in a system applying spatial multiplexing in the presence of channel uncertainty are considered. The first part of this paper de...
Jelena Mirkovic, Bernhard Walke
SIGIR
2002
ACM
14 years 9 months ago
Predicting query performance
We develop a method for predicting query performance by computing the relative entropy between a query language model and the corresponding collection language model. The resultin...
Stephen Cronen-Townsend, Yun Zhou, W. Bruce Croft