Filters








3,696 Hits in 10.6 sec

Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper) [chapter]

Huafei Zhu, Jianying Zhou
2006 Lecture Notes in Computer Science  
In this paper, we provide a novel implementation of reliable broadcast problems in unknown fixed-identity networks with lower communication complexity.  ...  At PODC'05, Subramanian, Katz, Roth, Shenker and Stoica (SKRSS) introduced and formulated a new theoretical problem called reliable broadcast problems in unknown fixed-identity networks [3] and further  ...  Introduction At PODC'05, Subramanian, Katz, Roth, Shenker and Stoica (SKRSS) introduced and formulated a new theoretical problem called reliable broadcast problems in unknown fixed-identity networks [  ... 
doi:10.1007/11935308_6 fatcat:elhebonmu5afhacujqlzju4uqa

Design of a low-cost, underwater acoustic modem for short-range sensor networks

B. Benson, Y. Li, R. Kastner, B. Faunce, K. Domond, D. Kimball, C. Schurgers
2010 OCEANS'10 IEEE SYDNEY  
These radio platforms cost a xvii few hundred U.S. dollars enabling researchers to purchase many nodes with a fixed budget allowing for dense, short-range deployment.  ...  These radio platforms cost a few hundred U.S. dollars enabling researchers to purchase many nodes with a fixed budget allowing for dense, short-range deployment.  ... 
doi:10.1109/oceanssyd.2010.5603816 fatcat:33m4lmciqjacfg4qfgtsa7lofy

Secure Online Data Sharing in Cloud by Private Transmit Cryptosystem Using Aggregate Keys

E Amarnath Reddy, M Srinuvasa Reddy, Kompally Manisha, B Mamatha
2018 International Journal of Engineering & Technology  
It's one among many ways of quick and effective data retrieval in case of data loss or data alteration on the cloud.  ...  It also uses the broadcast algorithm to distribute data for a specific set of users. This scheme uses basic HMAC, one of the secure hash functions for the stability of data integrity.  ...  Identity-Based Encryption with Compact Key Identity-based encryption (IBE) [11] as the name of the scheme suggests, an identity string set based on the user.  ... 
doi:10.14419/ijet.v7i3.27.17650 fatcat:edbjmlepkjgrlkhzjyjt6b4co4

Sensor Networks for High-Confidence Cyber-Physical Systems

Feng Xia, Tridib Mukherjee, Yan Zhang, Ye-Qiong Song
2011 International Journal of Distributed Sensor Networks  
Underwater acoustic sensor networks (UASNs) are playing a key role in ocean applications. The paper "A reliable and efficient MAC protocol for underwater acoustic sensor networks" by J.  ...  The paper "Quadratic programming for TDMA scheduling in wireless sensor networks" is concerned with developing a novel protocol to achieve energy-efficient and reliable multihop data transfer in WSNs satisfying  ...  of the paper.  ... 
doi:10.1155/2011/245734 fatcat:lswungc2orda5pcqvpyqu7vrna

An Optimization Scheme for M2M-Based Patient Monitoring in Ubiquitous Healthcare Domain

Sungmo Jung, Jae Young Ahn, Dae-Joon Hwang, Seoksoo Kim
2012 International Journal of Distributed Sensor Networks  
A movement tracking algorithm is proposed for better patient tracking techniques and aids in optimal deployment of wireless sensor networks.  ...  In ubiquitous healthcare systems, machine-to-machine (M2M) communication promises large opportunities as it utilizes rapidly developing technologies of large-scale networking of devices for patient monitoring  ...  Machine-to-machine (M2M) communication is a promising technology in healthcare due to short range wireless networking, wireless mobile networks, and advances in device networking [1] .  ... 
doi:10.1155/2012/708762 fatcat:q535gcgjxbdo3kppjzp3bx7nmm

A Review of Audio Fingerprinting

Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma
2005 Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology  
In this paper, we review different techniques describing its functional blocks as parts of a common, unified framework.  ...  An audio fingerprint is a compact content-based signature that summarizes an audio recording.  ...  An excessively short representation, however, might not be sufficient to discriminate among recordings, affecting thus accuracy, reliability and robustness. • Easily computable.  ... 
doi:10.1007/s11265-005-4151-3 fatcat:vgn7xidedfchnaynlcd4pua3vq

UAS Traffic Management Communications: The Legacy of ADS-B, New Establishment of Remote ID, or Leverage of ADS-B-Like Systems?

Neno Ruseno, Chung-Yan Lin, Shih-Cheng Chang
2022 Drones  
The similarities and differences of each system are elaborated, covering practical findings. In addition, the SWOT analysis is conducted based on the findings.  ...  In practice, there are two types of wireless communication systems established in the UAS community: automatic dependent surveillance broadcast (ADS-B) and remote identification (Remote ID).  ...  This multi-channel architecture could improve the UTM communication's security, availability, and reliability.  ... 
doi:10.3390/drones6030057 fatcat:lr34tuqsczaqhns75xhw5nx4x4

IP is dead, long live IP for wireless sensor networks

Jonathan W. Hui, David E. Culler
2008 Proceedings of the 6th ACM conference on Embedded network sensor systems - SenSys '08  
In this paper, we present the design of a complete IPv6-based network architecture for wireless sensor networks.  ...  We then develop an adaptation layer that compacts IPv6 datagrams and fragments them when they do not fit in a single IEEE 802.15.4 frame.  ...  This enabled the definition of an adaptation layer in RFC 4944 (6LoWPAN) that carried the meaning of IPv6 addresses in a compact form using small IEEE 802.15.4 short addresses [34] .  ... 
doi:10.1145/1460412.1460415 dblp:conf/sensys/HuiC08 fatcat:qiy4cwsyffejxnihztpvg76q3m

Robust Silent Localization of Underwater Acoustic Sensor Network Using Mobile Anchor(s)

Rahul Mourya, Mauro Dragone, Yvan Petillot
2021 Sensors  
In this paper, we propose robust, efficient, and practically implementable localization schemes for static UWASNs.  ...  Underwater acoustic sensor networks (UWASNs) can revolutionize the subsea domain by enabling low-cost monitoring of subsea assets and the marine environment.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.  ... 
doi:10.3390/s21030727 pmid:33494511 pmcid:PMC7865514 fatcat:g3p4wlalnvgadbmwoqsegfai5a

A Framework for Robust Audio Fingerprinting

Carlo Bellettini, Gianluca Mazzini
2010 Journal of Communications  
We present a framework for audio fingerprinting, rather general in its essence, but especially tuned for being used in the context of broadcast monitoring.  ...  Ample sections are devoted to strategies for improving both the reliability and the speed of the overall system.  ...  ACKNOWLEDGMENTS We would like to thank the editor and the anonymous reviewers, whose relevant remarks really helped improving the quality and the readability of the paper.  ... 
doi:10.4304/jcm.5.5.409-424 fatcat:fjir22bx4namngw2o6kxbeegku

Intrusion Detection System for Platooning Connected Autonomous Vehicles

Dimitrios Kosmanos, Apostolos Pappas, Francisco J. Aparicio-Navarro, Leandros Maglaras, Helge Janicke, Eerke Boiten, Antonios Argyriou
2019 2019 4th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)  
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety.  ...  In this paper, we describe an Intrusion Detection System (IDS) based on Machine Learning (ML) techniques designed to detect both spoofing and jamming attacks in a CAV environment.  ...  In the PLCP preamble field, the preamble consists of ten identical short training symbols and two identical long training symbols.  ... 
doi:10.1109/seeda-cecnsm.2019.8908528 dblp:conf/seeda/KosmanosPAMJBA19 fatcat:pme3pw2i6jc7fbhsdxjjl7alb4

Deep Learning for Face Anti-Spoofing: A Survey [article]

Zitong Yu, Yunxiao Qin, Xiaobai Li, Chenxu Zhao, Zhen Lei, Guoying Zhao
2022 arXiv   pre-print
In this paper, to stimulate future research, we present the first comprehensive review of recent advances in deep learning based FAS.  ...  Face anti-spoofing (FAS) has lately attracted increasing attention due to its vital role in securing face recognition systems from presentation attacks (PAs).  ...  Fig. 10 : 10 Fig.10: The network structure of FAS-SGTD [96] . The inputs are consecutive frames with a fixed interval.  ... 
arXiv:2106.14948v2 fatcat:wsheo7hbwvewhjoe6ykwjuqfii

The Diversity Multiplexing Tradeoff for Interference Networks [article]

Aydin Sezgin, Syed Ali Jafar, Hamid Jafarkhani
2009 arXiv   pre-print
In particular, we investigate the impact of rate-splitting and channel knowledge at the transmitters.  ...  We also use the DMT of the Z channel and the Z interference channel to distill insights into the "loud neighbor" problem for femto-cell networks.  ...  thus a short discussion might be in order.  ... 
arXiv:0905.2447v1 fatcat:rlv26zsarvcrffrwtl7yhjlbnq

A Highly Robust Audio Fingerprinting System With an Efficient Search Strategy

Jaap Haitsma, Ton Kalker
2003 Journal of New Music Research  
You're in your car, listening to the radio and suddenly you hear a song that catches your attention.  ...  To identify a fingerprint block originating from an unknown audio clip we have to find the most similar fingerprint block in the database.  ...  find a fingerprint in a fingerprint database?  ... 
doi:10.1076/jnmr.32.2.211.16746 fatcat:a5vmhlmw2bhybi2qoonplcwrbe

Survey on Cryptocurrency Networking: Context, State-of-the-Art, Challenges [article]

Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar
2020 arXiv   pre-print
This paper is motivated by these differences, and in particular by the observation that many fundamental design aspects of these networks are not well-understood today.  ...  In particular, we provide the context, highlighting differences and commonalities with traditional networks, review the state-of-the-art, and identify open research challenges.  ...  In several respects, routing in PCNs is fairly different from routing in traditional communication networks: in traditional communication networks, routing algorithms typically aim to find short and low-load  ... 
arXiv:2008.08412v1 fatcat:ishzj43g2fhibadqj2g3akfxgi
« Previous Showing results 1 — 15 out of 3,696 results