ACT We consider a cognitive radio scenario in which two (or more) operators providing services in the same area wish to share the same licensed band of spectrum. This scenario diff...
—Wide spread adoption of mobile Internet services will increase the demand for low cost high capacity wireless networks. Cooperation between different types of operators will ena...
—We consider the Bayesian inference of a random Gaussian vector in a linear model with a random Gaussian matrix. We review two approaches to finding the MAP estimator for this m...
— In this paper, the design of a highly efficient and flexibly deployable wireless backhaul is addressed as a promising alternative to the typical wired solutions. To this end, a...
—Suboptimal detection schemes, such as list MIMO detection, often face the challenge of having to “guess” at the decision reliability for some of the detected bits. A simple ...
David L. Milliner, Ernesto Zimmermann, John R. Bar...
—In wireless sensor networks, in-network aggregation is the process of compressing locally the data gathered by the sensor nodes, so that only the compressed data travel across s...
— We consider the problem of rate allocation in a fading Gaussian multiple-access channel with fixed transmission powers. The goal is to maximize a general concave utility funct...
—A constant envelope Continuous Phase Modulation (CPM) class of Multi-Channel (MC) modulations for multiantenna transmitters is considered. Each receive antenna receives a superp...
—In 802.11-based wireless networks the stations (STAs) are associated with the available access points (APs) and communicate through them. In traditional handoff schemes the STAs...
George Athanasiou, Thanasis Korakis, Leandros Tass...