Sciweavers

1031 search results - page 104 / 207
» The single-serving channel capacity
Sort
View
ICICS
2004
Springer
15 years 4 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
90
Voted
TWC
2008
136views more  TWC 2008»
14 years 11 months ago
On Antijamming in General CDMA Systems-Part II: Antijamming Performance of Coded Multicarrier Frequency-Hopping Spread Spectrum
In the first part of the paper, the capacity of a general multiuser code division multiple access (CDMA) jamming channel was analyzed for noncooperative and cooperative users in up...
Reza Nikjah, Norman C. Beaulieu
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 8 months ago
Optimal Power Allocation for Cognitive Radio Under Primary User's Outage Loss Constraint
In this paper, we consider a secondary link sharing the spectrum with a primary link in a fading cognitive radio (CR) network. Instead of applying the conventional interference pow...
Xin Kang, Rui Zhang, Ying-Chang Liang, Hari Krishn...
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 11 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
CORR
2008
Springer
109views Education» more  CORR 2008»
14 years 11 months ago
Dependence Balance Based Outer Bounds for Gaussian Networks with Cooperation and Feedback
We obtain new outer bounds on the capacity regions of the two-user multiple access channel with generalized feedback (MAC-GF) and the two-user interference channel with generalize...
Ravi Tandon, Sennur Ulukus