• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 177
Next 10 →

Secure Crowdsourcing-based Cooperative Spectrum Sensing

by unknown authors
"... Abstract—Cooperative (spectrum) sensing is a key function for dynamic spectrum access and is essential for avoiding interference with licensed primary users and identifying spectrum holes. A promising approach for effective cooperative sensing over a large geographic region is to rely on special spe ..."
Abstract - Add to MetaCart
spectrum-sensing providers (SSPs), which outsource spectrum-sensing tasks to distributed mobile users. Its feasibility is deeply rooted in the ubiquitous penetration of mobile devices into everyday life. Crowdsourcing-based cooperative spectrum sensing is, however, vulnerable to malicious sensing data

Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks

by Omid Fatemieh, Ranveer Chandra
"... Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We propo ..."
Abstract - Cited by 12 (2 self) - Add to MetaCart
Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We

Crowdsourcing Access Network Spectrum Allocation Using Smartphones

by Dimitrios Koutsonikolas, Geoffrey Challen
"... The hundreds of millions of deployed smartphones provide an unprecedented opportunity to collect data to monitor, de-bug, and continuously adapt wireless networks to improve performance. In contrast with previous mobile devices, such as laptops, smartphones are always on but mostly idle, making them ..."
Abstract - Add to MetaCart
The hundreds of millions of deployed smartphones provide an unprecedented opportunity to collect data to monitor, de-bug, and continuously adapt wireless networks to improve performance. In contrast with previous mobile devices, such as laptops, smartphones are always on but mostly idle, making

Generalized Self Spread-Spectrum Communications with Turbo Soft Despreading and Decoding

by Stefano Tomasin, Daniele Veronesi
"... Abstract: Self-spreading (SSP) is a spread spectrum technique where the spreading sequence is generated from data bits. Al-though SSP allows communications with low probability of inter-ception by unintended receivers, despreading by the intended re-ceiver is prone to error propagation. In this pape ..."
Abstract - Add to MetaCart
to fully exploit the information provided by the decoder. Lastly, we propose a chip decoder that extracts the information on data bits contained in the spreading sequence from the received signal. The performance of the proposed scheme is evaluated and compared with existing spread-spectrum systems. Index

ORIGINAL PAPER A Comprehensive Profile of Decoding and Comprehension in Autism Spectrum Disorders

by S. V. Huemer, V. Mann, S. V. Huemer, Norbury Children Asd , 2009
"... Ó The Author(s) 2009. This article is published with open access at Springerlink.com Abstract The present study examined intake data from 384 participants with autism spectrum disorders (ASD) and a comparison group of 100 participants with dyslexia on nine standardized measures of decoding and compr ..."
Abstract - Add to MetaCart
Ó The Author(s) 2009. This article is published with open access at Springerlink.com Abstract The present study examined intake data from 384 participants with autism spectrum disorders (ASD) and a comparison group of 100 participants with dyslexia on nine standardized measures of decoding

Crowdsourcing Annotation for Machine Learning in Natural Language Processing Tasks

by Omar F. Zaidan, Omar F. Zaidan
"... Human annotators are critical for creating the necessary datasets to train statis-tical learners, but annotation cost and limited access to qualified annotators forms a data bottleneck. In recent years, researchers have investigated overcoming this obsta-cle using crowdsourcing, which is the delegat ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Human annotators are critical for creating the necessary datasets to train statis-tical learners, but annotation cost and limited access to qualified annotators forms a data bottleneck. In recent years, researchers have investigated overcoming this obsta-cle using crowdsourcing, which

A framework of multiplicative spread spectrum embedding for data hiding: performance, decoder and signature design

by Amir Valizadeh, Z. Jane Wang - in Proc Global Communications (GLOBECOM , 2009
"... Abstract—In this paper, we have investigated several aspects of multiplicative spread spectrum (MSS) embedding for Data Hiding. First, we analyze the probability of error of the maximum likelihood (ML) decoder of MSS and show that MSS yields a better decoding performance than that of the additive SS ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—In this paper, we have investigated several aspects of multiplicative spread spectrum (MSS) embedding for Data Hiding. First, we analyze the probability of error of the maximum likelihood (ML) decoder of MSS and show that MSS yields a better decoding performance than that of the additive

1Reliable Crowdsourcing for Multi-Class Labeling using Coding Theory

by Aditya Vempaty, Lav R. Varshney, Pramod K. Varshney
"... Crowdsourcing systems often have crowd workers that perform unreliable work on the task they are assigned. In this paper, we propose the use of error-control codes and decoding algorithms to design crowdsourcing systems for reliable classification despite unreliable crowd workers. Coding-theory base ..."
Abstract - Add to MetaCart
Crowdsourcing systems often have crowd workers that perform unreliable work on the task they are assigned. In this paper, we propose the use of error-control codes and decoding algorithms to design crowdsourcing systems for reliable classification despite unreliable crowd workers. Coding

Iterative Equalization and Decoding for High-Data-Rate Frequency-Hop Spread-Spectrum Communications

by Harish Ramchandran, Daniel L. Noneaker
"... In this paper, a packet-level iterative equalization-anddecoding technique is evaluated for slow-frequency-hop spread-spectrum communications with Reed-Solomon coding. The receiver employs MAP equalization with priors during each iteration, and the soft equalizer outputs are used for bounded-distanc ..."
Abstract - Add to MetaCart
In this paper, a packet-level iterative equalization-anddecoding technique is evaluated for slow-frequency-hop spread-spectrum communications with Reed-Solomon coding. The receiver employs MAP equalization with priors during each iteration, and the soft equalizer outputs are used for bounded

Iterative Estimation And Decoding For Channels With Memory

by Joseph Hyukjoon Kang, Joseph Hyukjoon Kang, Chair Professor, Wayne E. Stark , 1999
"... ITERATIVE ESTIMATION AND DECODING FOR CHANNELS WITH MEMORY by Joseph Hyukjoon Kang Chair: Professor Wayne E. Stark In this thesis, iterative estimation and decoding techniques are considered for channels with memory. Much of the work is focused on the design and performance of turbo codes, a code wi ..."
Abstract - Add to MetaCart
with an iterative decoding algorithm, in frequency-hopped spread spectrum (FH-SS) systems where the data rate is slower than the hop rate. In such a system, multiple bits are transmitted over each hop. If the channel conditions can be assumed to be static over the duration of a hop, then estimation techniques can
Next 10 →
Results 1 - 10 of 177
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University