— We propose a secure data transmission scheme that takes advantage of node mobility. The scheme is based on the observation that due to mobility, messages sent at different time...
—One of the main requirements of cognitive radio systems is the ability to reliably detect the presence of licensed primary transmissions. Previous works on the problem of detect...
Jayakrishnan Unnikrishnan, Venugopal V. Veeravalli
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
— While the frequency-dependence of the wireless channel may be negligible for narrow to wideband signals, it has been shown that modeling this dependence for bandwidths in exces...
— We consider about a multiple relay system operating under amplify-and-forward (AF) protocol and non-coherent modulation and demodulation. When the relays are under long-term po...
—This paper presents an opportunistic feedback (OF) protocol that reduces the amount of channel-state-information (CSI) feedback for the OFDMA downlink system. The OF protocol as...
Abstract— Duality between the multi-antenna multi-user uplink and the downlink has been discovered in terms of sum rate, capacity region, signal-to-interference-plus-noise-ratio ...
—this paper addresses the design challenge of interference mitigation in the emerging high density (HD) wireless LAN. It is proposed to differentiate interference according to th...
— In wireless communications, shadow fading can cause at least 6 dB power loss for 10% of the time [1]. Early detection of shadow fading plays an important part in facilitating t...