Distributed compression involves compressing multiple data sources by exploiting the underlying correlation structure of the sources at separate non-cooperating encoders, while decoding is done jointly at a single decoder. Recent years have witnessed an increasing amount of research on the theoretical and practical aspects of distributed source codes, which find applications in distributed video compression, peer-to-peer data distribution systems, and sensor networks [1-3]. In many practical scenarios, limited network resources such as power and bandwidth, or physical limitations of the devices as in the case of sensor networks, pose challenges in terms of network performance and security. Oftentimes, the data aggregated in distributed comp...
Abstract—Wireless sensor networks are often deployed in open and uncontrolled environments that make...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
91 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.Then, motivated by application...
Distributed compression involves compressing multiple data sources by exploiting the underlying corr...
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated s...
The distributed source coding problem is extended by positing that noisy measurements of a remote so...
Abstract—Results in distributed compressed sensing show that this technique can be applied to wirele...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
The problems studied in this thesis fall within two different topics in network information theory. ...
This dissertation presents a novel problem inspired by the characteristics of sensor networks. The b...
With the rapid deployment of new wireless devices and pervasive use of wireless data and voice servi...
Here we discuss two security problems, video data encryption and multicast security, in wireless net...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
Abstract—Wireless sensor networks are often deployed in open and uncontrolled environments that make...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
91 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.Then, motivated by application...
Distributed compression involves compressing multiple data sources by exploiting the underlying corr...
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated s...
The distributed source coding problem is extended by positing that noisy measurements of a remote so...
Abstract—Results in distributed compressed sensing show that this technique can be applied to wirele...
Comprised of a large number of low-cost, low-power, mobile and miniature sensors, wireless sensor ne...
The problems studied in this thesis fall within two different topics in network information theory. ...
This dissertation presents a novel problem inspired by the characteristics of sensor networks. The b...
With the rapid deployment of new wireless devices and pervasive use of wireless data and voice servi...
Here we discuss two security problems, video data encryption and multicast security, in wireless net...
Abstract—We study the wireless secrecy capacity scaling prob-lem where the question of interest is h...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
The broadcast nature of wireless communications makes it more vulnerable to eavesdropping. As the ap...
Abstract—Wireless sensor networks are often deployed in open and uncontrolled environments that make...
Abstract—Since wireless channel is vulnerable to eavesdrop-pers, the secrecy during message delivery...
91 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2006.Then, motivated by application...