Sciweavers

104 search results - page 15 / 21
» Capacity of the Trapdoor Channel with Feedback
Sort
View
DAM
2006
113views more  DAM 2006»
13 years 7 months ago
On the complexity of suboptimal decoding for list and decision feedback schemes
We consider bounded distance list decoding, such that the decoder calculates the list of all codewords within a sphere around the received vector. We analyze the performance and t...
Jürgen Freudenberger, Victor V. Zyablov
TIT
2010
110views Education» more  TIT 2010»
13 years 2 months ago
Secure communications with insecure feedback: breaking the high-SNR ceiling
A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy...
Tùng T. Kim, H. Vincent Poor
CORR
2010
Springer
122views Education» more  CORR 2010»
13 years 4 months ago
Two-Way Transmission Capacity of Wireless Ad-hoc Networks
The transmission capacity of an ad-hoc network is the maximum density of active transmitters in an unit area, given an outage constraint at each receiver for a fixed rate of transm...
Rahul Vaze, Kien T. Truong, Steven Weber, Robert W...
JSAC
2008
90views more  JSAC 2008»
13 years 7 months ago
Limited feedback schemes for downlink OFDMA based on sub-channel groups
Abstract--In a downlink Orthogonal Frequency Division Multiple Access (OFDMA) system, optimally allocating sub-channels across mobile users can require excessive feedback of channe...
Jieying Chen, Randall A. Berry, Michael L. Honig
CORR
2006
Springer
118views Education» more  CORR 2006»
13 years 7 months ago
Wireless Information-Theoretic Security - Part I: Theoretical Aspects
In this two-part paper, we consider the transmission of confidential data over wireless wiretap channels. The first part presents an information-theoretic problem formulation in w...
Matthieu Bloch, João Barros, Miguel R. D. R...