Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
channel capacity
biblio
Performance Analysis of FSO Systems over Imperfect Málaga Atmospheric Turbulence Channels with Pointing Errors
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
Probability density function
realistic channel model
pointing errors
Monte-Carlo simulations
Málaga turbulence channel
imperfect Málaga atmospheric turbulence channels
imperfect Gamma-Gamma channels
FSO communication systems
ergodic channel capacity expressions
ergodic channel capacity
ECC metrics
composite probability density function
channel estimation errors
average bit error rate
atmospheric turbulence
BER
Resiliency
bit-error-rate
Performance analysis
Channel models
optical links
Channel estimation
Communication Systems
Atmospheric modeling
error correction codes
Monte Carlo methods
error statistics
channel coding
channel capacity
Metrics
composability
pubcrawl
biblio
Simplified Calculation of Bhattacharyya Parameters in Polar Codes
Submitted by aekwall on Mon, 03/15/2021 - 11:55am
error probability
Reliable channel
nonsystematic polar code
N polarizing channels
memoryless systems
K most reliable polarizing channels
complementary channel condition
code construction
channel reliability
calculated complexity
binary erasure channel
Bhattacharyya parameters
Bhattacharyya Parameter method
Bhattacharyya parameter
BEC channel
Maximum likelihood decoding
Resiliency
block codes
telecommunication network reliability
polar codes
error correction codes
encoding
Complexity theory
computational complexity
error statistics
channel coding
channel capacity
Reliability
Metrics
composability
pubcrawl
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
biblio
Keyless Covert Communication in the Presence of Channel State Information
Submitted by grigby1 on Wed, 02/10/2021 - 12:52pm
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Compositionality
wireless channels
transmitter
channel capacity
channel coding
covert channels
covert capacity
channel output
channel state information
innocent channel-input symbol
keyless covert communication
biblio
Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
discrete memoryless channels
Zinc
unit-rank MIMO
stealth communication
square root law
order-optimal scaling law
multiple-input multiple-output AWGN channels
MIMO AWGN channels
maximal covert coding rate
LPD communication
energy undetectability constraints
effective secrecy
covert nats
blocklength
secrecy capacity
MIMO communication
pubcrawl
AWGN channels
additive white Gaussian noise channels
covert channels
covert communication
physical layer security
channel coding
channel capacity
probability
Compositionality
Receivers
Reliability
Scalability
telecommunication security
Resiliency
resilience
biblio
Authentication with Mildly Myopic Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
no-adversary capacity
zero authentication capacity
unsecured communications settings
underlying channel
transmitted sequences
telecommunication security
telecommunication channels
sufficient condition
stochastic encoder
Scalability
Resiliency
resilience
received information
pubcrawl
positive authentication capacity
noisy versions
Adversary Models
mildly myopic adversaries
Metrics
message authentication
malicious adversary
keyless authentication
Human behavior
essentially omniscient adversary
deterministic encoder
Cryptographic Protocols
channel states
channel condition
channel coding
channel capacity
binary channel model
biblio
Performance of Spatially Coupled LDPC Codes over Underwater Acoustic Communication Channel
Submitted by aekwall on Mon, 12/21/2020 - 1:31pm
reliable communication
UWA communication
UWA channels
underwater acoustic communication channel
underwater acoustic channel
terrestrial communication
shallow water acoustic environment
protograph based SC-LDPC codes
low-density parity-check codes
low equalization complexity
Belief Propagation (BP)
bandwidth 10.0 kHz
OFDM modulation
equalisers
OFDM
Scalability
underwater acoustic communication
Doppler shift
acoustic coupling
telecommunication network reliability
turbo codes
LDPC
wireless channels
parity check codes
error statistics
channel coding
channel capacity
pubcrawl
Human behavior
Resiliency
biblio
Crypto Polar Codes based on Pseudorandom Frozen Bits Values and Indices
Submitted by aekwall on Tue, 09/08/2020 - 10:06am
original encoding cipher key
decoding obscurity
discrete memoryless channel
discrete memoryless channel capacity
encoder security
generated sequences
grouping polar codes
modern communication systems
MT PRNG
one-bit change
decoding cipher key
originally sent information data bits
polarized bit channels
pseudorandom frozen bits values
secret Mersenne- Twister pseudo
secret pre-shared initial state
secured system
system secrecy
talented coding technique
error statistics
telecommunication security
Resiliency
pubcrawl
composability
Metrics
probability
channel capacity
channel coding
Decoding
Cryptography
random number generation
pseudorandom number generator
polar codes
High reliability
232-bit ciphering key
BER probability
crypto polar codes
crypto-system ciphering key
biblio
Extrinsic Information Transfer (EXIT) Analysis for Short Polar Codes
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
iterative decoding
wireless channels
short polar codes
Resiliency
Receivers
pubcrawl
polarized channels
polar codes
parity check codes
Noise measurement
noieseless channels
Mutual information
Metrics
low density parity check codes
coding theory
information theory
information bit
frozen bit
extrinsic information transfer analysis
EXIT chart
error correction codes
Decoding
composability
completely noisy channels
channel coding
channel capacity
5G mobile communication
security
biblio
Codes for Covert Communication over Additive White Gaussian Noise Channels
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
encoding
Xenon
Throughput
Scalability
Resiliency
resilience
pulse position modulation
pubcrawl
Phase shift keying
multilevel coding
Monte Carlo methods
modified pulse-position modulation scheme
low-complexity error-control codes
error correction codes
additive white Gaussian noise channels
discrete memoryless channels
covert communication
covert channels
covert capacity
Compositionality
composability
coding scheme
channel coding
channel capacity
binary phase-shift keying
Binary phase shift keying
AWGN channels
Amplitude shift keying
« first
‹ previous
1
2
3
4
next ›
last »