Information leakage for correlated sources with compromised source symbols over wiretap channel II
contributor author | Balmahoon, R | |
contributor author | Vinck, A.J Han | |
contributor author | Cheng, L | |
date accessioned | 2020-03-12T22:53:53Z | |
date available | 2020-03-12T22:53:53Z | |
date issued | 2014 | |
identifier other | 7028606.pdf | |
identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1098390?show=full | |
format | general | |
language | English | |
publisher | IEEE | |
title | Information leakage for correlated sources with compromised source symbols over wiretap channel II | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8239585 | |
subject keywords | Complexity theory | |
subject keywords | n Conferences | |
subject keywords | n Labeling | |
subject keywords | n Minimization | |
subject keywords | n Polynomials | |
subject keywords | n Programming | |
subject keywords | n Vectors | |
subject keywords | n energy minimization | |
subject keywords | n max-sum | |
subject keywords | n partial optimality | |
subject keywords | n persistency | |
subject keywords | n wcsp | |
identifier doi | 10.1109/CVPR.2014.152 | |
journal title | ommunication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on | |
filesize | 583971 | |
citations | 0 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |