University of Mary Washington
Displaying 1-40 of 93 results
-
Binary Energy Harvesting Channel With Finite Energy Storage
The authors consider the capacity of an energy harvesting communication channel with a finite-sized battery. As an abstraction of this problem, they consider a system where energy arrives at the encod...
Provided By University of Mary Washington
-
Non-Asymptotic and Second-Order Achievability Bounds for Source Coding with Side-Information
In this paper, the authors proved a new non-asymptotic bound on the error probability for the WAK problem. They present a novel achievability bound for the Wyner-Ahlswede-Korner (WAK) problem of lossl...
Provided By University of Mary Washington
-
An Implementation of Binomial Method of Option Pricing using Parallel Computing
The Binomial method of option pricing is based on iterating over discounted option payoffs in a recursive fashion to calculate the present value of an option. Implementing the Binomial method to explo...
Provided By University of Mary Washington
-
Secure Degrees of Freedom of the Gaussian Wiretap Channel With Helpers and No Eavesdropper CSI: Blind Cooperative Jamming
Wyner introduced the wiretap channel in which a legitimate transmitter wants to have secure communications with a legitimate receiver in the presence of an eavesdropper, and determined its capacity-eq...
Provided By University of Mary Washington
-
Energy Cooperation in Energy Harvesting Two-Way Communications
In this paper, the authors investigate a two-way communication channel where users can harvest energy from nature and energy can be transferred in one-way from one of the users to the other. Energy re...
Provided By University of Mary Washington
-
Optimization Based Rate Control for Multirate Multicast Sessions
Multi-rate multicasting, where the receivers of a multicast group can receive service at different rates, is an efficient mode of data delivery for many real-time applications. In this paper, the auth...
Provided By University of Mary Washington
-
A Simple Rate Control Algorithm for Maximizing Total User Utility
In this paper, the authors consider the rate control problem with the objective of maximizing the total user utility. It takes into account the possible differences in user requirements, and also prov...
Provided By University of Mary Washington
-
An Outer Bound for Multiple Access Channels with Correlated Sources
The capacity region of the multiple access channel with correlated sources remains an open problem. Cover, El Gamal and Salehi gave an achievable region in the form of single-letter entropy and mutual...
Provided By University of Mary Washington
-
The Capacity Region of a Class of Discrete Degraded Interference Channels
The authors provide a single-letter characterization for the capacity region of a class of Discrete Degraded Interference Channels (DDICs). The class of DDICs considered includes the Discrete Additive...
Provided By University of Mary Washington
-
Two-Way and Multiple-Access Energy Harvesting Systems With Energy Cooperation
The authors study the capacity regions of the Gaussian Two-Way Channel (TWC) and the Gaussian two-user Multiple Access Channel (MAC) with one-way energy transfer. In both scenarios, there are two user...
Provided By University of Mary Washington
-
Runtime Optimizations for Prediction with Tree-Based Models
Tree-based models have proven to be an effective solution for web ranking as well as other problems in diverse domains. This paper focuses on optimizing the runtime performance of applying such models...
Provided By University of Mary Washington
-
Anti Error Propagation Methods for Wireless Uplink Using Network Coding
Wireless network coding suffers the error propagation issues that may severely degrade the diversity performance. In this paper, the authors develop two power scaling schemes at the relay side and two...
Provided By University of Mary Washington
-
Multi-View Constrained Clustering with an Incomplete Mapping Between Views
Multi-view learning algorithms typically assume a complete bipartite map-ping between the different views in order to exchange information during the learning process. However, many applications provi...
Provided By University of Mary Washington
-
Secure Degrees of Freedom of the Gaussian Wiretap Channel With Helpers
The secrecy capacity of the canonical Gaussian wiretap channel does not scale with the transmit power, and hence, the secure d.o.f. of the Gaussian wiretap channel with no helpers is zero. It has been...
Provided By University of Mary Washington
-
Secure Degrees of Freedom of One-Hop Wireless Networks
The authors study the secure Degrees of Freedom (DoF) of one-hop wireless networks by considering four fundamental wireless network structures: Gaussian wiretap channel, Gaussian broadcast channel wit...
Provided By University of Mary Washington
-
Cluster-Based Instance Consolidation for Subsequent Matching
Instance consolidation is a way to merge instances that are thought to be the same or closely related that can be used to support co-reference resolution and entity linking. For Semantic Web data, con...
Provided By University of Mary Washington
-
Gaussian Wiretap Channel With a Batteryless Energy Harvesting Transmitter
The authors study the Gaussian wiretap channel with an energy harvesting transmitter which does not have a battery to save energy. In the absence of a battery, the necessary transmission energy is mai...
Provided By University of Mary Washington
-
Gaussian Wiretap Channel With an Amplitude Constraint
The authors consider the Gaussian wiretap channel with an amplitude constraint, i.e., a peak power constraint, on the channel input. They show that the entire rate-equivocation region of the Gaussian ...
Provided By University of Mary Washington
-
A Domain Independent Framework for Extracting Linked Semantic Data From Tables
Vast amounts of information is encoded in tables found in documents, on the Web, and in spreadsheets or databases. Integrating or searching over this information benefits from understanding its intend...
Provided By University of Mary Washington
-
A Policy-Based Approach to Smart Cloud Services
Virtualized service models are now emerging and redefining the way information technology is delivered. Managing these services efficiently over the cloud is an open challenge. The authors are develop...
Provided By University of Mary Washington
-
Energy-Efficient Cellular Network Operation Via Base Station Cooperation
The rising cost of energy and increased environmental awareness has sparked a keen interest in the development and deployment of energy-efficient communication technologies. The energy efficiency of c...
Provided By University of Mary Washington
-
Indirect Reciprocity Game Modelling for Secure Wireless Networks
The authors formulate the wireless security problem as an indirect reciprocity game, and propose a security mechanism that applies the indirect reciprocity principle to suppress attacks in wireless ne...
Provided By University of Mary Washington
-
Signal Reflection-Enabled Geographical Routing for Underwater Sensor Networks
The 3-D nature of the underwater environment has made geographical-routing a popular choice in UnderWater Acoustic Sensor Networks (UW-ASNs). A geographical (geo) routing protocol works by using the p...
Provided By University of Mary Washington
-
Network Connectivity With Heterogeneous Mobility
The authors study the issue of Mobile Wireless Network (MWN) connectivity. In particular, they investigate the smallest communication or transmission range of the nodes necessary for connectivity of M...
Provided By University of Mary Washington
-
Error Performances of Multiple Access System Using Analog Network Coding
In this paper, the authors study the error performances of the multiple access system using Analog Network Coding (ANC), where all the users broadcast their data to the relays and destination simultan...
Provided By University of Mary Washington
-
Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game
The viability of cooperative communications largely depends on the willingness of users to help. However, in future wireless networks where users are rational and pursue different objectives, they wil...
Provided By University of Mary Washington
-
Vehicular Networking for Intelligent and Autonomous Traffic Management
Traffic congestion has become a daily problem that most people suffer. This not only impacts the productivity of the population but also poses a safety risk. Most of the technologies for intelligent h...
Provided By University of Mary Washington
-
A Cheat-Proof Game Theoretic Demand Response Scheme for Smart Grids
While demand response has achieved promising results on making the power grid more efficient and reliable, the additional dynamics and flexibility brought by demand response also increase the uncertai...
Provided By University of Mary Washington
-
Providing Location Anonymity in a Multi-Base Station Wireless Sensor Network
Wireless Sensor Networks (WSNs) often operate in inhospitable environments to serve mission-critical and security sensitive applications that involve hostile adversaries. These adversaries are eager t...
Provided By University of Mary Washington
-
Optimized Interconnection of Disjoint Wireless Sensor Network Segments Using K Mobile Data Collectors
Due to harsh environmental conditions a Wireless Sensor Network (WSN) may suffer from large scale damage where many nodes fail simultaneously and thus the network gets partitioned into several disjoin...
Provided By University of Mary Washington
-
Optimal Frequency Selection for Energy Efficient Underwater Acoustic Networks
The underwater acoustic channel is characterized by a path loss that is dependent on both the distance and the frequency of communication. Given this dependence, it has been previously demonstrated th...
Provided By University of Mary Washington
-
A Binary Classification Framework for Two-Stage Multiple Kernel Learning
With the advent of kernel methods, automating the task of specifying a suitable kernel has become increasingly important. In this context, the Multiple Kernel Learning (MKL) problem of finding a combi...
Provided By University of Mary Washington
-
Heuristics for Speeding Up Betweenness Centrality Computation
The authors propose and evaluate two complementary heuristics to speed up exact computation of the shortest-path betweenness centrality. Both heuristics are relatively simple adaptations of the standa...
Provided By University of Mary Washington
-
Throughput and Stability for Relay-Assisted Wireless Broadcast with Network Coding
The throughput and stability properties of wireless network coding are evaluated for an arbitrary number of terminals exchanging broadcast traffic with the aid of a relay. First, coding and scheduling...
Provided By University of Mary Washington
-
On the Sum Secure Degrees of Freedom of Two-Unicast Layered Wireless Networks
The authors consider a two-unicast layered network where two transmitters wish to have reliable and secure communication with their respective receivers simultaneously, by utilizing a layered network ...
Provided By University of Mary Washington
-
Energy Cooperation in Energy Harvesting Wireless Communications
The authors consider a simple multi-hop communication scenario composed of a source node, a relay node and a destination node where the source and the relay can harvest energy from the nature. Energy ...
Provided By University of Mary Washington
-
Energy State Amplification in an Energy Harvesting Communication System
In energy harvesting communication systems, the energy required for message transmission is maintained by an exogenous energy arrival process independent of the message. This links the problem of comm...
Provided By University of Mary Washington
-
An Outer Bound for the Vector Gaussian CEO Problem
The authors study the vector Gaussian CEO problem, and provide an outer bound for its rate-distortion region. They obtain their outer bound by evaluating an outer bound for the multi-terminal source c...
Provided By University of Mary Washington
-
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling
The authors present their ongoing work on user data and contextual privacy preservation in mobile devices through semantic reasoning. Recent advances in context modeling, tracking and collaborative lo...
Provided By University of Mary Washington
-
A Knowledge-Based Approach to Intrusion Detection Modeling
Current state of the art Intrusion Detection and Prevention Systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatur...
Provided By University of Mary Washington
-
Non-Asymptotic and Second-Order Achievability Bounds for Source Coding with Side-Information
In this paper, the authors proved a new non-asymptotic bound on the error probability for the WAK problem. They present a novel achievability bound for the Wyner-Ahlswede-Korner (WAK) problem of lossl...
Provided By University of Mary Washington
-
Optimization Based Rate Control for Multirate Multicast Sessions
Multi-rate multicasting, where the receivers of a multicast group can receive service at different rates, is an efficient mode of data delivery for many real-time applications. In this paper, the auth...
Provided By University of Mary Washington
-
A Simple Rate Control Algorithm for Maximizing Total User Utility
In this paper, the authors consider the rate control problem with the objective of maximizing the total user utility. It takes into account the possible differences in user requirements, and also prov...
Provided By University of Mary Washington
-
Optimal Scheduling Over Fading Broadcast Channels With an Energy Harvesting Transmitter
The authors consider an energy harvesting transmitter sending messages to two users over a fading AWGN broadcast channel. Energy required for communication arrives (is harvested) at the transmitter an...
Provided By University of Mary Washington
-
Rate-Equivocation Region of Cyclic Shift Symmetric Wiretap Channels
In this paper, the authors study cyclic shift symmetric wiretap channels in which the channels between Alice and Bob and Alice and Eve are both cyclic shift symmetric. They characterize the rate-equiv...
Provided By University of Mary Washington
-
Implementing Information Paths in a Dense Wireless Sensor Network
In a sensor network with information sources and a sink, the authors assume a single path between every location in the network and the destination. These abstract information paths represent the desi...
Provided By University of Mary Washington
-
Tiered Authentication of Multicast Traffic in Wireless Ad-Hoc Networks
Multicast streams are the dominant application traffic pattern in many mission critical ad-hoc networks. The limited computation and communication resources, the large scale deployment and the unguara...
Provided By University of Mary Washington
-
Two-Way and Multiple-Access Energy Harvesting Systems With Energy Cooperation
The authors study the capacity regions of the Gaussian Two-Way Channel (TWC) and the Gaussian two-user Multiple Access Channel (MAC) with one-way energy transfer. In both scenarios, there are two user...
Provided By University of Mary Washington
-
Energy Cooperation in Energy Harvesting Two-Way Communications
In this paper, the authors investigate a two-way communication channel where users can harvest energy from nature and energy can be transferred in one-way from one of the users to the other. Energy re...
Provided By University of Mary Washington
-
Energy State Amplification in an Energy Harvesting Communication System
In energy harvesting communication systems, the energy required for message transmission is maintained by an exogenous energy arrival process independent of the message. This links the problem of comm...
Provided By University of Mary Washington
-
Peer-to-Peer File Sharing Game Using Correlated Equilibrium
Peer-To-Peer (P2P) systems have become more and more popular in nowadays by providing decentralized, self-organizing and fault tolerant file sharing services. As the selfish users do not benefit from ...
Provided By University of Mary Washington
-
Anti Error Propagation Methods for Wireless Uplink Using Network Coding
Wireless network coding suffers the error propagation issues that may severely degrade the diversity performance. In this paper, the authors develop two power scaling schemes at the relay side and two...
Provided By University of Mary Washington
-
Heuristics for Speeding Up Betweenness Centrality Computation
The authors propose and evaluate two complementary heuristics to speed up exact computation of the shortest-path betweenness centrality. Both heuristics are relatively simple adaptations of the standa...
Provided By University of Mary Washington
-
A New Achievable Ergodic Secrecy Rate Region for the Fading Multiple Access Wiretap Channel
The authors give a new achievable ergodic secrecy rate region for the two-user fading multiple access wiretap channel. Their scheme creates a vector channel between the two transmitters and the intend...
Provided By University of Mary Washington
-
Secrecy Capacity Region of the Degraded Compound Multi-Receiver Wiretap Channel
The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both...
Provided By University of Mary Washington
-
Optimal Transmission Policies Over Vector Gaussian Broadcast Channels With Energy Harvesting Transmitters
The authors consider an energy harvesting transmitter sending messages to two users over a vector broadcast channel. Energy required for communication arrives (is harvested) at the transmitter and a f...
Provided By University of Mary Washington
-
AWGN Channel Under Time-Varying Amplitude Constraints With Causal Information at the Transmitter
The authors consider the classical AWGN channel where the channel input is constrained to an amplitude constraint that stochastically varies at each channel use, independent of the message. This is an...
Provided By University of Mary Washington
-
Wiretap Channels: Roles of Rate Splitting and Channel Prefixing
Csiszar and Korner's characterization of the rate-equivocation region of a general wiretap channel involves two auxiliary random variables: U, which represents rate splitting and V, which represents c...
Provided By University of Mary Washington
-
Broadcasting With a Battery Limited Energy Harvesting Rechargeable Transmitter
The authors consider the minimization of the transmission completion time with a battery limited energy harvesting transmitter in a two-user AWGN broadcast channel. The transmitter has fixed number of...
Provided By University of Mary Washington
-
Information-Theoretic Analysis of an Energy Harvesting Communication System
In energy harvesting communication systems, exogenous recharge process supplies energy for the data transmission and arriving energy can be buffered in a battery before consumption. Transmission is in...
Provided By University of Mary Washington
-
Gaussian Wiretap Channel With a Batteryless Energy Harvesting Transmitter
The authors study the Gaussian wiretap channel with an energy harvesting transmitter which does not have a battery to save energy. In the absence of a battery, the necessary transmission energy is mai...
Provided By University of Mary Washington
-
Gaussian Wiretap Channel With an Amplitude Constraint
The authors consider the Gaussian wiretap channel with an amplitude constraint, i.e., a peak power constraint, on the channel input. They show that the entire rate-equivocation region of the Gaussian ...
Provided By University of Mary Washington
-
Energy Cooperation in Energy Harvesting Wireless Communications
The authors consider a simple multi-hop communication scenario composed of a source node, a relay node and a destination node where the source and the relay can harvest energy from the nature. Energy ...
Provided By University of Mary Washington
-
Delay-Minimal Transmission for Average Power Constrained Multi-Access Communications
The authors investigate the problem of minimizing the overall transmission delay of packets in a multi-access wireless communication system, where the transmitters have average power constraints. They...
Provided By University of Mary Washington
-
An Outer Bound for Multiple Access Channels with Correlated Sources
The capacity region of the multiple access channel with correlated sources remains an open problem. Cover, El Gamal and Salehi gave an achievable region in the form of single-letter entropy and mutual...
Provided By University of Mary Washington
-
The Capacity Region of a Class of Discrete Degraded Interference Channels
The authors provide a single-letter characterization for the capacity region of a class of Discrete Degraded Interference Channels (DDICs). The class of DDICs considered includes the Discrete Additive...
Provided By University of Mary Washington
-
A New Upper Bound on the Capacity of a Class of Primitive Relay Channels
The authors obtained a new upper bound for a class of primitive relay channels. The primitive relay channel studied in this paper can also be considered as a state-dependent discrete memoryless channe...
Provided By University of Mary Washington
-
On the Secrecy of Multiple Access Wiretap Channel
The authors develop an outer bound for the secrecy capacity region of a class of Multiple ACcess WireTap channels (MAC-WT). In this class, which they call the weak eavesdropper class, each user's link...
Provided By University of Mary Washington
-
Degraded Gaussian MIMO Multi-Receiver Wiretap Channel With Public and Confidential Messages
The authors study the degraded multi-receiver wiretap channel with public and confidential messages. In this channel, there is a transmitter that wishes to communicate with two legitimate users in the...
Provided By University of Mary Washington
-
Capacity of a Class of Semi-Deterministic Primitive Relay Channels
The authors characterize the capacity of a class of primitive relay channels. The primitive relay channel considered in this paper consists of a semi-deterministic broadcast channel to the relay and t...
Provided By University of Mary Washington
-
Binary Energy Harvesting Channel With Finite Energy Storage
The authors consider the capacity of an energy harvesting communication channel with a finite-sized battery. As an abstraction of this problem, they consider a system where energy arrives at the encod...
Provided By University of Mary Washington
-
Secure Degrees of Freedom of the Gaussian Wiretap Channel With Helpers
The secrecy capacity of the canonical Gaussian wiretap channel does not scale with the transmit power, and hence, the secure d.o.f. of the Gaussian wiretap channel with no helpers is zero. It has been...
Provided By University of Mary Washington
-
Secure Lossy Source Coding With Side Information
The authors study the problem of secure lossy source coding with side information. In all works on this problem, either the equivocation of the source at the eavesdropper or the equivocation of the le...
Provided By University of Mary Washington
-
Ergodic Secrecy Capacity Region of the Fading Broadcast Channel
The authors consider the fading broadcast channel from a secrecy point of view. In this channel, each user views the other user as an eavesdropper, and wants to keep its information as secret from the...
Provided By University of Mary Washington
-
Ergodic Secret Alignment for the Fading Multiple Access Wiretap Channel
In this paper, the authors provide a new achievable ergodic secrecy rate region for the multiple access wiretap channel in fading. Their achievable scheme is based on repeating each symbol at two fadi...
Provided By University of Mary Washington
-
Optimizing the Rate of a Correlated MIMO Link Jointly Over Channel Estimation and Data Transmission Parameters
The authors consider a single-user correlated MIMO channel with block fading, where each block is divided into training and data transmission phases. The receiver has a noisy CSI that it obtains throu...
Provided By University of Mary Washington
-
Effects of Cooperation on the Secrecy of Multiple Access Channels With Generalized Feedback
The authors investigate the effects of user cooperation on the secrecy of Multiple Access Channels with Generalized Feedback (MAC-GF). They show that cooperation can increase the achievable secrecy re...
Provided By University of Mary Washington
-
Transmission Completion Time Minimization in an Energy Harvesting System
The authors consider the transmission completion time minimization problem in a single-user energy harvesting wireless communication system. In this system, both the data packets and the harvested ene...
Provided By University of Mary Washington
-
On Gaussian MIMO Compound Wiretap Channels
The authors study the two-user one-eavesdropper discrete memoryless compound wiretap channel, where the transmitter sends a common confidential message to both users, which needs to be kept perfectly ...
Provided By University of Mary Washington
-
Deaf Cooperation for Secrecy with a Multi-Antenna Helper
In this paper, the authors investigate the roles of Cooperative Jamming (CJ) and Noise Forwarding (NF) in improving the achievable secrecy rates of a Gaussian WireTap channel (GWT) when the helper nod...
Provided By University of Mary Washington