Sciweavers

CISS
2008
IEEE
14 years 6 months ago
Memory-constrained ML-optimal tree search detection
— In this paper, we propose a memory-constrained tree search (MCTS) algorithm for the detection in multiple-input multiple-output (MIMO) systems. The MCTS algorithm offers a wide...
Yongmei Dai, Zhiyuan Yan
CISS
2008
IEEE
14 years 6 months ago
Effects of cooperation on the secrecy of multiple access channels with generalized feedback
—We investigate the effects of user cooperation on the secrecy of multiple access channels with generalized feedback (MAC-GF). We show that cooperation can increase the achievabl...
Ersen Ekrem, Sennur Ulukus
CISS
2008
IEEE
14 years 6 months ago
Higher dimensional generalizations of the Costas property
—We investigate the generalization of the Costas property in 3 or more dimensions, and we seek an appropriate definition. We offer a construction method based on the idea of res...
Konstantinos Drakakis
CISS
2008
IEEE
14 years 6 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
CISS
2008
IEEE
14 years 6 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng
CISS
2008
IEEE
14 years 6 months ago
Resource allocation for cooperative relaying
—The delay-limited capacity of the half-duplex relay channel is analyzed for several cooperative protocols under a long-term average total transmit power constraint. It is assume...
Jie Yang, Deniz Gündüz, D. Richard Brown...
CISS
2008
IEEE
14 years 6 months ago
On the energy-delay trade-off of a two-way relay network
—We consider a three node network in which a pair of nodes with stochastic arrivals communicate with each other with the help of an intermediate relay. The bi-directional nature ...
Xiang He, Aylin Yener
CISS
2008
IEEE
14 years 6 months ago
Achieving network stability and user fairness through admission control of TCP connections
—This paper studies a network under TCP congestion control, in which the number of flows per user is explicitly taken into account. We present a control law for this variable th...
Andrés Ferragut, Fernando Paganini
CISS
2008
IEEE
14 years 6 months ago
Distributed algorithm and reversible network
Motivated to design a feasible optical network architecture for the future Internet, we address the question of scheduling (wavelength assignment) in an optical network. The key ch...
Shreevatsa Rajagopalan, Devavrat Shah
CISS
2008
IEEE
14 years 6 months ago
Distance vectors in Costas arrays
—We investigate the distance vectors contained in individual and in pairs of Costas arrays, and prove some rigorous results in the case of the algebraically constructed ones. Ove...
Konstantinos Drakakis, Rod Gow, Scott Rickard