Team for Research in
Ubiquitous Secure Technology

Application of Reed-Muller Codes for Localization of Malicious Nodes
Anna Kacewicz, Stephen Wicker

Citation
Anna Kacewicz, Stephen Wicker. "Application of Reed-Muller Codes for Localization of Malicious Nodes". IEEE ICC, 2010.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Anna Kacewicz, Stephen Wicker. <a
    href="http://www.truststc.org/pubs/732.html"
    >Application of Reed-Muller Codes for Localization of
    Malicious Nodes</a>, IEEE ICC, 2010.
  • Plain text
    Anna Kacewicz, Stephen Wicker. "Application of
    Reed-Muller Codes for Localization of Malicious Nodes".
    IEEE ICC, 2010.
  • BibTeX
    @inproceedings{KacewiczWicker10_ApplicationOfReedMullerCodesForLocalizationOfMalicious,
        author = {Anna Kacewicz and Stephen Wicker},
        title = {Application of Reed-Muller Codes for Localization
                  of Malicious Nodes},
        booktitle = {IEEE ICC},
        year = {2010},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/732.html}
    }
    

Posted by Anna Kacewicz on 13 Apr 2010.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.