You are currently viewing a new version of our website. To view the old version click .

Information, Volume 7, Issue 2

June 2016 - 17 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
7 Citations
4,751 Views
21 Pages

The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legit...

  • Article
  • Open Access
186 Citations
13,124 Views
19 Pages

A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology

  • Anhtuan Le,
  • Jonathan Loo,
  • Kok Keong Chai and
  • Mahdi Aiash

Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto...

  • Article
  • Open Access
7 Citations
13,038 Views
24 Pages

26 April 2016

The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created deca...

  • Article
  • Open Access
5 Citations
4,852 Views
17 Pages

14 April 2016

Knowledge management systems are widely used to manage the knowledge in organizations. Consulting experts is an effective way to utilize tacit knowledge. The paper aims to optimize the match between users and experts to improve the efficiency of taci...

  • Article
  • Open Access
31 Citations
7,073 Views
10 Pages

23 March 2016

Data fusion is usually performed prior to classification in order to reduce the input space. These dimensionality reduction techniques help to decline the complexity of the classification model and thus improve the classification performance. The tra...

  • Article
  • Open Access
5 Citations
5,736 Views
42 Pages

Minimax Duality for MIMO Interference Networks

  • Andreas Dotzler,
  • Maximilian Riemensberger and
  • Wolfgang Utschick

23 March 2016

A minimax duality for a Gaussian mutual information expression was introduced by Yu. An interesting observation is the relationship between cost constraints on the transmit covariances and noise covariances in the dual problem via Lagrangian multipli...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489