Learn More
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et al. challenged the randomization schemes, and they pointed out that randomization might not be able to preserve privacy. However, it is still unclear what factors cause such a(More)
Information fusion by utilizing multiple distributed sensors is studied in this work. Extending the classical parallel fusion structure by incorporating the fading channel layer that is omnipresent in wireless sensor networks, we derive the likelihood ratio based fusion rule given fixed local decision devices. This optimum fusion rule, however, requires(More)
A new outer bound on the capacity region of Gaussian interference channels is developed. The bound combines and improves existing genie-aided methods and is shown to give the sum-rate capacity for noisy interference as defined in this paper. Specifically, it is shown that if the channel coefficients and power constraints satisfy a simple condition then(More)
In this paper, we revisit the problem of fusing decisions transmitted over fading channels in a wireless sensor network. Previous development relies on instantaneous channel state information (CSI). However, acquiring channel information may be too costly for resource constrained sensor networks. In this paper, we propose a new likelihood ratio (LR)-based(More)
A number of schemes have been proposed for providing quality-of-service (QoS) differentiation in optical burst-switched (OBS) networks. Most existing schemes are based on a relative QoS model in which the service requirements for a given class of traffic are defined relative to the service requirements of another class of traffic. In this paper, we propose(More)
We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous bandwidth, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message(More)
This paper studies the problem of interference channels with one cognitive transmitter (ICOCT) where “cognitive” is defined from both the noncausal and causal perspectives. For the noncausal ICOCT, referred to as interference channels with degraded message sets (IC-DMS), we propose a new achievable rate region that generalizes existing achievable rate(More)
We study in this paper the network spectral efficiency of a multiple-input multiple-output (MIMO) ad hoc network with K simultaneous communicating transmitter-receiver pairs. Assuming that each transmitter is equipped with t antennas and each receiver with r antennas and each receiver implements single-user detection, we show that in the absence of channel(More)
We study the problem of guaranteeing synchronous message deadlines in communication networks where the timed token medium access control protocol is employed. Synchronous capacity, deened as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message(More)