Search Results - "Sankarasubramaniam, Y."
-
1
Wireless sensor networks: a survey
Published in Computer networks (Amsterdam, Netherlands : 1999) (15-03-2002)“…This paper describes the concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless…”
Get full text
Journal Article -
2
Fixed-Rate Maximum-Runlength-Limited Codes From Variable-Rate Bit Stuffing
Published in IEEE transactions on information theory (01-08-2007)“…We introduce the fixed-rate bit stuff (FRB) algorithm for efficiently encoding and decoding maximum-runlength-limited (MRL) sequences. Our approach is based on…”
Get full text
Journal Article -
3
Capacity achieving code constructions for two classes of (d,k) constraints
Published in IEEE transactions on information theory (01-07-2006)“…This correspondence presents two variable-rate encoding algorithms that achieve capacity for the (d,k) constraint when k=2d+1, or when k-d+1 is not prime. The…”
Get full text
Journal Article -
4
Energy efficiency based packet size optimization in wireless sensor networks
Published in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003 (2003)“…This paper addresses the question of optimal packet size for data communication in energy constrained wireless sensor networks. Unlike previous work on packet…”
Get full text
Conference Proceeding -
5
Random-access scheduling with service differentiation in wireless networks
Published in Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (2005)“…Recent years have seen tremendous growth in the deployment of wireless local area networks (WLANs). An important design issue in such networks is that of…”
Get full text
Conference Proceeding -
6
Distributed scheduling in wireless data networks with service differentiation
Published in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings (2004)“…A class of distributed scheduling algorithms, Regulated Contention Medium Access Control (RCMAC), which provides dynamic prioritized access to users for…”
Get full text
Conference Proceeding -
7
A survey on sensor networks
Published in IEEE communications magazine (01-08-2002)“…The advancement in wireless communications and electronics has enabled the development of low-cost sensor networks. The sensor networks can be used for various…”
Get full text
Magazine Article -
8
A fixed-rate bit stuffing approach for high efficiency k-constrained codes
Published in Proceedings. International Symposium on Information Theory, 2005. ISIT 2005 (2005)“…Binary sequences where successive ones are separated by at most k consecutive zeros, are said to be k-constrained. We introduce a new fixed-rate algorithm for…”
Get full text
Conference Proceeding -
9
Fault-tolerant secret key generation
Published in 2012 IEEE International Symposium on Information Theory Proceedings (01-07-2012)“…Mobile nodes observing correlated data communicate using an insecure bidirectional switch to generate a secret key, which must remain concealed from the…”
Get full text
Conference Proceeding -
10
Jamming to foil an eavesdropper
Published in 2012 National Conference on Communications (NCC) (01-02-2012)“…We consider key-less secure communication against a passive adversary, by allowing the legitimate receiver to selectively jam transmitted bits. The channel…”
Get full text
Conference Proceeding -
11
Finite-state wiretap channels: Secrecy under memory constraints
Published in 2009 IEEE Information Theory Workshop (01-10-2009)“…Information-theoretic security offered by the wiretap channel model has been extensively studied for various scenarios recently. One scenario that has not…”
Get full text
Conference Proceeding -
12
NLHB : A light-weight, provably-secure variant of the HB protocol using simple non-linear functions
Published in 2010 National Conference On Communications (NCC) (01-01-2010)“…In this paper, we propose a light-weight provably-secure authentication protocol called the NLHB protocol, which is a variant of the HB protocol. The HB…”
Get full text
Conference Proceeding -
13
Bit Stuff Encoding for (0, G/I) Constraints
Published in 2006 IEEE International Symposium on Information Theory (01-07-2006)“…(0,G/I) constraints arise in magnetic recording systems that use partial-response equalization with maximum-likelihood sequence detection (PRML). In this…”
Get full text
Conference Proceeding -
14
A convolution interpretation of (M,d,k) run-length-limited capacity
Published in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings (2004)“…This paper considers the problem of capacity equivalence for a general class of (M,d,k) run-length-limited constraints, namely we look for pairs (M,d,k) and…”
Get full text
Conference Proceeding