Search Results - "2016 IEEE 37th Sarnoff Symposium"
-
1
On the continuous coverage problem for a swarm of UAVs
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Unmanned aerial vehicles (UAVs) can be used to provide wireless network and remote surveillance coverage for disaster-affected areas. During such a situation,…”
Get full text
Conference Proceeding -
2
A novel video steganography algorithm in DCT domain based on hamming and BCH codes
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…In the past decade, the science of information hiding has gained tremendous significance due to advances in information and communication technology. The…”
Get full text
Conference Proceeding -
3
DroidDeepLearner: Identifying Android malware using deep learning
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…With the proliferation of Android apps, encounters with malicious apps (malware) by mobile users are on the rise as vulnerabilities in the Android platform…”
Get full text
Conference Proceeding -
4
Sub-channel allocation in green powered heterogeneous cognitive radio networks
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…This paper aims at maximizing the sum rate of secondary users (SUs) in Orthogonal Frequency Division Multiplexing (OFDM)-based Heterogeneous Cognitive Radio…”
Get full text
Conference Proceeding -
5
Transparent virtual network embedding in elastic optical networks
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Network visualization in Elastic Optical Networks (EONs) utilizes the flexible spectral resources to map Virtual Networks (VN) requests onto the physical…”
Get full text
Conference Proceeding -
6
Edge caching and nearest replica routing in information-centric networking
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Information-centric networking (ICN) promises to improve content-oriented services by enabling in-network caching and supporting optimal content request…”
Get full text
Conference Proceeding -
7
Optimal de-anonymization in random graphs with community structure
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Social network connectivity data that is anonymized and publicized for academic or commercial purposes are often vulnerable to de-anonymization attacks from…”
Get full text
Conference Proceeding -
8
Dynamic spectrum leasing methodology (DSLM): A game theoretic approach
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…In recent years, the demand for spectrum has increased exponentially. Cognitive radio (CR) technology provides the capability to dynamically sense the spectrum…”
Get full text
Conference Proceeding -
9
Universal filtered multicarrier systems: Testbed deployment of a 5G waveform candidate
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Orthogonal frequency division multiplexing (OFDM) technique, with a broad usage in recent communication technologies, provides a good performance that is…”
Get full text
Conference Proceeding -
10
Trustworthy and protected data collection for event detection using networked sensing systems
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Data collection in wireless networked sensing systems (WNSS) is usually not reliable due to sensor faults and/or security attacks. This makes detection of an…”
Get full text
Conference Proceeding -
11
Smart wireless sensor networks powered by remaining energy cluster head selection protocol
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…In smart Wireless Sensor Networks (WSNs), clustering is one of the most power efficient techniques which minimize the transmission ranges of sensor nodes…”
Get full text
Conference Proceeding -
12
Data management of sensor signals for high bandwidth data streaming to the cloud
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Internet of Things (IoT) and Cloud computing highlight new requirements for data collection, storage and analysis of user data. In this work we focus on the…”
Get full text
Conference Proceeding -
13
Distributed spectrum monitoring and surveillance using a cognitive radio based testbed
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…This paper described the development and implementation of a distributed spectrum monitoring and surveillance testbed for identifying and locating RF signals…”
Get full text
Conference Proceeding -
14
Using semantic technologies to mine vehicular context for security
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…The number of sensors, actuators and electronic control units present in cars have increased in the last few years. The Internet-of-Things (IoT) model has…”
Get full text
Conference Proceeding -
15
Smart connected canines: IoT design considerations for the lab, home, and mission-critical environments
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…The canine-human relationship continues to grow as dogs become an increasingly critical part of our society. As reliance on dogs has increased from simple…”
Get full text
Conference Proceeding -
16
Dynamic erasure-coded data retrieval in elastic optical data center networks
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…A flexible data retrieval service is needed in data center networks, where erasure coding has been widely adopted. Elastic Optical Networks, based on Nyquist…”
Get full text
Conference Proceeding -
17
Finding partial hash collisions by brute force parallel programming
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…A hash function maps an arbitrary length of (longer) message into a fixed length of shorter string, called message digest. Inevitably there will be a lot of…”
Get full text
Conference Proceeding -
18
Language of choice: On embedding choice-related semantics in a realizable protocol
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Choice-based future Internet architectures, in which choice is offered for fine-grained network services to different traffic flows, have been proposed in the…”
Get full text
Conference Proceeding -
19
Transient analysis of a resource-limited recovery policy for epidemics: A retrial queueing approach
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…Knowledge on the dynamics of standard epidemic models and their variants over complex networks has been well-established primarily in the stationary regime,…”
Get full text
Conference Proceeding -
20
Evaluation and performance modeling of two OXC architectures
Published in 2016 IEEE 37th Sarnoff Symposium (01-09-2016)“…This paper presents an evaluation of two Optical Cross-Connect (OXC) node architectures with multiple fibers per link - one, a conventional architecture, and…”
Get full text
Conference Proceeding