Sciweavers

950 search results - page 42 / 190
» presence 2008
Sort
View
CORR
2008
Springer
139views Education» more  CORR 2008»
14 years 9 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi
CORR
2008
Springer
72views Education» more  CORR 2008»
14 years 9 months ago
Lossless Compression with Security Constraints
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are availab...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
MTA
2008
87views more  MTA 2008»
14 years 9 months ago
Regia: a metadata editor for audiovisual documents
Although the Metadata Editor is an important part of any digital library, it becomes fundamental in the presence of audiovisual content. This is because the metadata produced by au...
Claudio Gennaro
JNW
2008
75views more  JNW 2008»
14 years 9 months ago
Time Efficient Radio Broadcasting in Planar Graphs
Abstract-- We study the communication primitive of broadcasting (one-to-all communication) in known topology radio networks, i.e., where for each primitive the schedule of transmis...
Fredrik Manne, Qin Xin
ICASSP
2008
IEEE
15 years 4 months ago
Anti-jam distributed MIMO decoding using wireless sensor networks
Consider a set of sensors that wish to consent on the message broadcasted by a multi-antenna transmitter in the presence of white-noise jamming. The jammer’s interference introd...
Shahrokh Farahmand, Alfonso Cano, Georgios B. Gian...