—We present a novel approach for Medium Access Control (MAC) protocol design based on protocol engine. Current way of designing MAC protocols for a specific application is based...
Sinem Coleri Ergen, Piergiuseppe Di Marco, Carlo F...
—One of the most common and important applications of wireless sensor networks is target tracking. We study it in its most basic form, assuming the binary sensing model in which ...
Abstract—We propose a model-based channel access mechanism for cognitive radio-enabled secondary network, which opportunistically uses the channel of an unslotted primary network...
—This paper studies the tradeoff between channel coding and ARQ (automatic repeat request) in Rayleigh blockfading channels. A heavily coded system corresponds to a low transmiss...
—Significant research has been done on recognizing the daily activities using acceleration data but few works have focused on classifying the movements comprising an activity du...
— It was shown by Cadambe and Jafar that the interference alignment (IA) algorithm achieves the theoretical bound on degrees of freedom (DOF) for interference channel systems. Ho...
Hakjea Sung, Seokhwan Park, Kyoung-Jae Lee, Inkyu ...
— The problem of resource allocation (RA) in a downlink OFDMA system with minimum user rate requests is examined under the realistic scenario of partial (imperfect) channel state...
—A multiple antenna multihop relay network consisting of a source, a relay, and a destination node, is considered. The diversity-multiplexing-delay tradeoffs (DMDT) for various m...
— Peer-to-peer (P2P) technology for TV broadcasting over the Internet is becoming more and more popular in the very last years. This paper introduces a network-wide efficiency m...
Abstract— We consider the Gaussian multiple-input multipleoutput (MIMO) multi-receiver wiretap channel, and derive the secrecy capacity region of this channel for the most genera...