In this paper, energy detectors are developed for wideband and ultra-wideband (UWB) pulse position modulation (PPM). Exact bit error probability (BEP) formulas are derived under di...
There are many key problems of decision making related to spectrum occupancies in cognitive radio networks. It is known that there exist correlations of spectrum occupancies in tim...
Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with th...
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Users using the same video streaming service within a wireless network share the same limited backbone bandwidth to the Internet. These users are motivated to collaborate with eac...
Abstract--A novel cluster-head selection and update algorithm "Typebased Cluster-forming Algorithm (TCA)" is proposed, which outperforms both the lowest node ID (LID) and...
Abstract--Multi-user buffer control is a closed-loop transmission strategy to ensure users buffers do not underflow or overflow. The dynamic scheme requires buffer state informatio...
Vinay R. Majjigi, Daniel O'Neill, Carolin Huppert,...
-- Simulations show that the Doppler component of the IEEE 802.11n channel model results in a dramatic decrease in transmit beamforming gain within only 20 ms delay, even though th...
Eldad Perahia, Anmol Sheth, Thomas Kenney, Robert ...
In this paper we look at the diversity of equal gain transmission (EGT) for single user (SU) MIMO and multiuser (MU) MIMO in the context of third generation partnership project lon...
We consider a wireless multi-hop network with sources that are Poisson distributed and relays which are placed on the source-destination line. Given a combined TDMA/ALOHA MAC proto...