Biblio

Found 4176 results

Filters: First Letter Of Last Name is M  [Clear All Filters]
2018-05-27
Manqi Zhao, Venkatesh Saligrama.  2009.  Anomaly Detection with Score functions based on Nearest Neighbor Graphs. Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, Vancouver, British Columbia, Canada.. :2250–2258.
Pierre{-}Marc Jodoin, Venkatesh Saligrama, Janusz Konrad.  2009.  Implicit Active-Contouring with MRF. Image Analysis and Recognition, 6th International Conference, {ICIAR} 2009, Halifax, Canada, July 6-8, 2009. Proceedings. 5627:178–190.
2018-05-14
2018-05-27
2018-05-14
Xin, Wuping, Hourdos, John, Michalopoulos, Panos, Davis, Gary.  2008.  The less-than-perfect driver: a model of collision-inclusive car-following behavior. Transportation Research Record: Journal of the Transportation Research Board. :126–137.
2018-05-27
2018-06-04
2018-05-14
2021-04-08
Bloch, M., Barros, J., Rodrigues, M. R. D., McLaughlin, S. W..  2008.  Wireless Information-Theoretic Security. IEEE Transactions on Information Theory. 54:2515–2534.
This paper considers the transmission of confidential data over wireless channels. Based on an information-theoretic formulation of the problem, in which two legitimates partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through a second independent quasi-static fading channel, the important role of fading is characterized in terms of average secure communication rates and outage probability. Based on the insights from this analysis, a practical secure communication protocol is developed, which uses a four-step procedure to ensure wireless information-theoretic security: (i) common randomness via opportunistic transmission, (ii) message reconciliation, (iii) common key generation via privacy amplification, and (iv) message protection with a secret key. A reconciliation procedure based on multilevel coding and optimized low-density parity-check (LDPC) codes is introduced, which allows to achieve communication rates close to the fundamental security limits in several relevant instances. Finally, a set of metrics for assessing average secure key generation rates is established, and it is shown that the protocol is effective in secure key renewal-even in the presence of imperfect channel state information.
2018-05-27
2018-05-14
2018-05-27
2018-05-14
Xin, Wuping, Hourdos, John, Michalopoulos, Panos.  2006.  Comprehensive evaluation of new integrated freeway ramp control strategy. Transportation Research Record: Journal of the Transportation Research Board. :46–54.
2018-05-27
George K. Atia, Masoud Sharif, Venkatesh Saligrama.  2006.  Effect of Geometry on the Diversity-Multiplexing Tradeoff in Relay Channels. Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006.
Onur Savas, Murat Alanyali, Venkatesh Saligrama.  2006.  Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence. Distributed Computing in Sensor Systems, Second {IEEE} International Conference, {DCOSS} 2006, San Francisco, CA, USA, June 18-20, 2006, Proceedings. 4026:252–265.
2018-06-17
Marwedel, Peter.  2006.  Embedded system design. 1

A unique feature of this textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This third edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems and the Internet of things, the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.

2018-05-14
Feng, Baichun, Hourdos, John, Michalopoulos, Panos.  2006.  Improving Minnesota's stratified ramp control strategy. Transportation Research Record: Journal of the Transportation Research Board. :77–83.
Xin, Wuping, Hourdos, John, Michalopoulos, Panos.  2006.  Preprocessing volume input data for improved traffic simulation. Transportation Research Record: Journal of the Transportation Research Board. :192–200.
Hourdos, John, Garg, Vishnu, Michalopoulos, Panos, Davis, Gary.  2006.  Real-time detection of crash-prone conditions at freeway high-crash locations. Transportation research record: journal of the transportation research board. :83–91.