Search
Now showing items 11-20 of 27
Energy-cost-distortion optimization for delay-sensitive M-health applications
(
IEEE Computer Society
, 2015 , Conference Paper)
Mobile-health (m-health) systems leverage wireless and mobile communication technologies to promote new ways to acquire, process, transport, and secure the raw and processed medical data to provide the scalability needed ...
Low complexity target coverage heuristics using mobile cameras
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Wireless sensor and actuator networks have been extensively deployed for enhancing industrial control processes and supply-chains, and many forms of surveillance and environmental monitoring. The availability of low-cost ...
Survey on energy harvesting wireless communications: Challenges and opportunities for radio resource allocation
(
Elsevier B.V.
, 2015 , Article)
Abstract Green radio communications has received a lot of attention in recent years due to its impact on telecom business, technology and environment. On the other hand, energy harvesting communication has emerged as a ...
Power control and group proportional fairness for frequency domain resource allocation in L-SC-FDMA based LTE uplink
(
Kluwer Academic Publishers
, 2015 , Article)
Resource allocation in Long Term Evaluation (LTE) uplink is challenging because of two reasons: (1) it requires contiguous resource block allocation and (2) high complexity due to per user based power allocation among ...
The inapproximability of illuminating polygons by α-floodlights
(
Queen's University, Ontario, Canada
, 2015 , Conference Paper)
We consider variants of the art gallery problem where guard visibility is limited to a certain angular aperture-. We show that the problem is NP-hard even when guards can be located in the interior of the polygon. We then ...
Ambient Intelligence - Software and Applications: 6th International Symposium on Ambient Intelligence (ISAmI 2015)
(
Springer Verlag
, 2015 , Conference Paper)
[No abstract available]
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...