Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Aida Vosoughi"'
Publikováno v:
IPDPS
Storing data structures in high-capacity byte-addressable persistent memory instead of DRAM or a storage device offers the opportunity to (1) reduce cost and power consumption compared with DRAM, (2) decrease the latency and CPU resources needed for
Publikováno v:
IEEE Transactions on Vehicular Technology
Cognitive radios enable dynamic spectrum access where secondary users (SUs) are allowed to operate on the licensed spectrum bands on an opportunistic noninterference basis. Cooperation among the SUs for spectrum sensing is essential for environments
Publikováno v:
IEEE Transactions on Cognitive Communications and Networking
Cooperation among cognitive radios for spectrum sensing is deemed essential for environments with deep shadows. In this paper, we study cooperative spectrum sensing for cognitive radio ad hoc networks where there is no fusion center to aggregate the
Autor:
Shuoxin Lin, Aida Vosoughi, Joseph R. Cavallaro, Markku Juntti, Olli Silven, Shuvra S. Bhattacharyya, Jani Boutellier, Lai-Huei Wang, Mikko Valkama
Publikováno v:
Journal of Signal Processing Systems. 80:3-18
Cognitive radio networks present challenges at many levels of design, including configuration, control, and cross-layer optimization. To meet requirements of bandwidth, flexibility and reconfigurability, systematic methods to model and analyze cognit
Publikováno v:
IEEE Transactions on Circuits and Systems I: Regular Papers. 61:1376-1389
To meet the evolving data rate requirements of emerging wireless communication technologies, many parallel architectures have been proposed to implement high throughput turbo decoders. However, concurrent memory reading/writing in parallel turbo deco
Autor:
R.S. Katti, Aida Vosoughi
Publikováno v:
IEEE Transactions on Information Forensics and Security. 7:895-903
Key-based interval splitting arithmetic coding (KSAC) has been proposed to improve the security of traditional arithmetic coding (AC). Chosen-plaintext attacks have been proposed for KSAC when the same key is used to encrypt different messages. In th
Publikováno v:
IEEE Transactions on Information Forensics and Security. 6:19-27
Modifications of arithmetic coding (AC) have been proposed to improve the security of traditional AC. Two main modifications to AC are randomized AC (RAC) and AC with key-based interval splitting (KSAC). Chosen-plaintext attacks have been proposed fo
Autor:
Vitor Silva, Jiandong Mu, João Sousa Andrade, Aida Vosoughi, Alexios Balatsoukas-Stimming, Joseph R. Cavallaro, Georgios Karakonstantis, Gabriel Falcao, Andreas Burg
Publikováno v:
ACSSC
Mu, J, Vosoughi, A, Andrade, J, Balatsoukas-Stimming, A, Karakonstantis, G, Burg, A, Falcao, G, Silva, V & Cavallaro, J R 2015, ' The Impact of Faulty Memory Bit Cells on the Decoding of Spatially-Coupled LDPC Codes ' . in 2015 49th Asilomar Conference on Signals, Systems and Computers . Institute of Electrical and Electronics Engineers (IEEE), pp. 1627-1631, 2015 49th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, United States, 8-11 November ., 10.1109/ACSSC.2015.7421423
Mu, J, Vosoughi, A, Andrade, J, Balatsoukas-Stimming, A, Karakonstantis, G, Burg, A, Falcao, G, Silva, V & Cavallaro, J R 2015, ' The Impact of Faulty Memory Bit Cells on the Decoding of Spatially-Coupled LDPC Codes ' . in 2015 49th Asilomar Conference on Signals, Systems and Computers . Institute of Electrical and Electronics Engineers (IEEE), pp. 1627-1631, 2015 49th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, United States, 8-11 November ., 10.1109/ACSSC.2015.7421423
In this paper, we investigate the decoding performance of spatially-coupled LDPC codes in the case of faulty-memory bit-cells within the storage modules of the decoder.Our study characterizes error resilience, by measuring the BER degradation from su
Publikováno v:
GLOBECOM
In this paper, we introduce Insistent Spectrum Sensing Data Falsification (ISSDF) as a new practical and destructive attack model aimed at distributed cooperative spectrum sensing schemes that are based on iterative average consensus. We compare vari
Publikováno v:
GlobalSIP
In a cognitive radio ad hoc network, secondary users must cooperate in a decentralized way in order to determine the presence or absence of the primary user. In such a setting, malicious nodes deteriorate the cooperative spectrum sensing performance