Search
Now showing items 61-70 of 267
Energy-cost-distortion optimization for delay-sensitive M-health applications
(
IEEE Computer Society
, 2015 , Conference Paper)
Mobile-health (m-health) systems leverage wireless and mobile communication technologies to promote new ways to acquire, process, transport, and secure the raw and processed medical data to provide the scalability needed ...
Low complexity target coverage heuristics using mobile cameras
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Wireless sensor and actuator networks have been extensively deployed for enhancing industrial control processes and supply-chains, and many forms of surveillance and environmental monitoring. The availability of low-cost ...
The inapproximability of illuminating polygons by α-floodlights
(
Queen's University, Ontario, Canada
, 2015 , Conference Paper)
We consider variants of the art gallery problem where guard visibility is limited to a certain angular aperture-. We show that the problem is NP-hard even when guards can be located in the interior of the polygon. We then ...
Ambient Intelligence - Software and Applications: 6th International Symposium on Ambient Intelligence (ISAmI 2015)
(
Springer Verlag
, 2015 , Conference Paper)
[No abstract available]
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
On spectrum sharing between energy harvesting cognitive radio users and primary users
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Optimum power and rate allocation in cluster based video sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In a wireless video sensor network (WVSN), each video sensor node consumes a significant amount of power on video compression in addition to the required power for communication. Therefore, the power optimization is a more ...