The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a class of broadcast interference channels (BIC) is investigated, where one of the two broadcast receivers is subject to interference coming from a point-to-point transmission. For a general discrete memoryless broadcast interference channel (DM-BIC), an achievable scheme based on message splitting, superposition, and binning is proposed and a concise representation of the corresponding...
This paper observes different methods for network covert channels constructing and describes the scheme of the packet length covert channel. The countermeasure based on random traffic padding generating is proposed. The capacity of the investigated covert channel is estimated and the relation between parameter of covert channel and counteraction tool is examined. Practical recommendation for using...
In this paper, diffusion-based molecular communication with ligand receptor receivers is studied. Information messages are assumed to be encoded via variations of the concentration of molecules. The randomness in the ligand reception process induces uncertainty in the communication; limiting the rate of information decoding. We model the ligand receptor receiver by a set of finite-state Markov channels...
Nowadays applications for big data are widely spread since IP networks connect milliards of different devices. On the other hand, there are numerous accidents of information leakage using IP covert channels worldwide. Covert channels based on packet size modification are resistant to traffic encryption, but there are some data transfer schemes that are difficult to detect. Investigation of the technique...
In this paper, we derive a single-letter expression for the capacity of the finite-state channel (FSC) with delayed output and state feedback by formulating the problem in a stochastic control framework. The resulting capacity expression can be evaluated using dynamic programming. Although the considered channel is a special case of the one investigated by Tatikonda and Mitter, our approach is somewhat...
In this paper we study transmission of information over a multiple access channel (MAC) with noiseless feedback. We formulate this problem as a decentralized stochastic control problem, the three controllers being the decoder and the two encoders who, in the presence of limited information about each other, decide what to transmit at each time instance, in order to jointly achieve a common goal. Our...
Consider a Gaussian multiple access channel (MAC) with two users, which do not always have a message to transmit. Neither user knows if the other is transmitting or not. Each user has two possible achievable rates depending on whether the other user is transmitting or not. Hence, in general, any coding scheme is characterized by a 4-tuple of rates. For given power constraints, we prove inner and outer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.