Now showing items 520-539 of 648

    • SafeExit4All: An inclusive indoor emergency evacuation system for people with disabilities 

      Unknown author (Association for Computing Machinery, Inc., 2019-05-13)
      Indoor wayfinding has remained a challenge for people with disabilities in unfamiliar environments. With some accessible indoor wayfinding systems coming to the fore recently, a major application of interest is that of ...
    • Safety critical networks using commodity SDNs 

      Kashinath, Ashish; Hasan, Monowar; Kumar, Rakesh; Mohan, Sibin; Bobba, Rakesh B.; Padhy, Smruti (IEEE, 2021-05-05)
      Safety-critical networks often have stringent real-time requirements; they must also be resilient to failures. In this paper, we propose the RealFlow framework that uses commodity software-defined networks (SDNs) to realize ...
    • Satellite digital channelizer with predistorted high-power amplifier 

      Goswami, Madhuprana; Rana, Vidhi; Kwon, Hyuck M.; Pham, Khanh D.; Lyke, James (IEEE, 2020-03-05)
      A geostationary earth orbit satellite requires high transmitting power (e.g., 20 dBW=100 watts) because the waveform traveling distance can be more than 36,000 km. Thus, it is necessary to operate close to the saturation ...
    • Satellite jamming: a game theoretic analysis 

      Wang, Qiwei; Nguyen, Thinh; Pham, Khanh D.; Kwon, Hyuck M. (IEEE, 2017)
      In this paper, the problem of minimizing the damaging effect on the frequency hopping (FH) spread-spectrum satellite is formulated using the two-player asymmetric zero-sum game framework. The payoff is modeled as the channel ...
    • Satellite MIMO digital beam-forming under nonlinear high-power amplifier and keyhole 

      Goswami, Madhuprana; Kwon, Hyuck M.; Pham, Khanh D.; Lyke, James (IEEE, 2019-04-11)
      In a satellite communication (Sat-Com) system, channel coefficients from multiple-input, multiple-output (MIMO) antennas are correlated strongly because of a long propagation distance and a narrow angle spread. This is ...
    • Scalable meter data collection in smart grids through message concatenation 

      Karimi, Babak; Namboodiri, Vinod; Jadliwala, Murtuza Shabbir (IEEE, 2015-07)
      Advanced metering infrastructure (AMI) initiatives are a popular tool to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. There is the looming issue of how ...
    • Scalable QoS provisioning for mobile networks using wireless sensors 

      Bahety, V.; Pendse, Ravi (IEEE, 2004-03-21)
      In the past few years support for mobility has increased to a large extent. Mobile IP enables nodes to move from one network to the other while maintaining the same IP address. Minimal packet loss during handoff is a ...
    • Secret sharing from correlated Gaussian random variables and public communication 

      Rana, Vidhi; Chou, Rémi; Kwon, Hyuck M. (IEEE, 2021-04-11)
      We study a secret sharing problem, where a dealer distributes shares of a secret among a set of participants under the constraints that (i) authorized sets of users can recover the secret by pooling their shares, (ii) ...
    • Secret sharing over a public channel from correlated random variables 

      Chou, Remi (IEEE, 2018)
      We consider a model for secret sharing, where a dealer distributes the shares of a secret among a set of participants with the constraint that only predetermined subsets of participants must be able to reconstruct the ...
    • Secret-key generation in many-to-one networks: an integrated game-theoretic and information-theoretic approach 

      Chou, Remi; Yener, Aylin (IEEE, 2019-08)
      This paper considers secret-key generation between several agents and a base station that observe independent and identically distributed realizations of correlated random variables. Each agent wishes to generate the longest ...
    • Secure cloud computing for pairwise sequence alignment 

      Salinas Monroy, Sergio A.; Li, Pan (Association for Computing Machinery, 2017)
      Today's massive amount of biological sequence data has the potential to rapidly advance our understanding of life's processes. However, since analyzing biological sequences is a very expensive computing task, users face a ...
    • Secure distributed storage: rate-privacy trade-off and XOR-based coding scheme 

      Chou, Remi; Kliewer, Jorg (IEEE, 2020-06)
      We consider the problem of storing data in a distributed manner over T servers. We require the data (i) to be recoverable from the T servers, and (ii) to remain private from any T -1 colluding servers, where privacy is ...
    • Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis 

      Joshi, Deepti; Namuduri, Kameswara; Pendse, Ravi (Hindawi Publishing Corporation, 2005-05)
      Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ...
    • Security in multi-tenancy cloud 

      Jasti, Amarnath; Shah, Payal Hemchand; Nagaraj, Rajeev; Pendse, Ravi (IEEE, 2010-10-05)
      Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks like data security within the cloud. Several common security threats like data leakage, insecure ...
    • Security, internet connectivity and aircraft data networks 

      Thanthry, Nagaraja; Ali, Muhammad Sabeeh; Pendse, Ravi (2006-05)
      Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to ...
    • A security-aware Near Field Communication architecture 

      Asaduzzaman, Abu; Mazumder, Shanta; Salinas Monroy, Sergio A.; Mridha, Muhammad F. (IEEE, 2017)
      Due to the popularity of the Near Field Communication (NFC) applications, NFC technology is being adopted by a wide variety of devices suitable for the Internet of things (IoT). However, NFC is vulnerable to numerous ...
    • Seer Grid: privacy and utility implications of two-level load prediction in smart grids 

      Boustani, Arash; Maiti, Anindya; Jazi, Sina Yousefian; Jadliwala, Murtuza Shabbir; Namboodiri, Vinod (IEEE, 2017-02-01)
      We propose "Seer Grid", a novel two-level energy consumption prediction framework for smart grids, aimed to decrease the trade-off between privacy requirements (of the customer) and data utility requirements (of the energy ...
    • Selection of amplify-and-forward mobile relay under cascaded Rayleigh fading 

      Lee, Kanghee; Kwon, Hyuck M.; Sawan, M. Edwin; Shim, Yeonggyu; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
      This paper assumes a practical channel model, called a cascaded Rayleigh fading channel, for a noncooperative distributed mobile relay network, which consists of one mobile source and one mobile destination, and multiple ...
    • Selective prefetching: prefetching when only required 

      Pendse, Ravi; Katta, H. (IEEE, 1999)
      Cache memories are commonly used to reduce the number of slower lower-level memory accesses, thereby improving the memory hierarchy performance. However, high cache miss-ratio can severely degrade system performance. It ...
    • Self-hiding behavior in Android apps: detection and characterization 

      Shan, Zhiyong; Neamtiu, Iulian; Samuel, Raina (Association for Computing Machinery, 2018)
      Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious. However, due to its nature and intent, activity concealing is not disclosed ...