Learn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …
Z Xiong, AD Liveris, S Cheng - IEEE signal processing …, 2004 - ieeexplore.ieee.org
In recent years, sensor research has been undergoing a quiet revolution, promising to have a significant impact throughout society that could quite possibly dwarf previous milestones in …
AD Liveris, Z Xiong… - IEEE communications …, 2002 - ieeexplore.ieee.org
We show how low-density parity-check (LDPC) codes can be used to compress close to the Slepian-Wolf limit for correlated binary sources. Focusing on the asymmetric case of …
A Aaron, R Zhang, B Girod - … Record of the Thirty-Sixth Asilomar …, 2002 - ieeexplore.ieee.org
In current interframe video compression systems, the encoder performs predictive coding to exploit the similarities of successive frames. The Wyner-Ziv theorem on source coding with …
W Liu, W Zeng, L Dong, Q Yao - IEEE Transactions on Image …, 2009 - ieeexplore.ieee.org
Lossless compression of encrypted sources can be achieved through Slepian-Wolf coding. For encrypted real-world sources, such as images, the key to improve the compression …
A Aaron, SD Rane, E Setton… - … and Image Processing …, 2004 - spiedigitallibrary.org
In current interframe video compression systems, the encoder performs predictive coding to exploit the similarities of successive frames. The Wyner-Ziv Theorem on source coding with …
Source coding with correlated decoder side information is considered. We impose the practical constraint that the encoder be unaware of even the statistical dependencies …
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys …
The Karhunen-Loeve transform (KLT) is a key element of many signal processing and communication tasks. Many recent applications involve distributed signal processing, where …