Sciweavers

COMSWARE
2007
IEEE
13 years 11 months ago
Sequence Design for Symbol-Asynchronous CDMA with Power or Rate Constraints
— Sequence design and resource allocation for a symbol-asynchronous chip-synchronous code division multiple access (CDMA) system is considered in this paper. A simple lower bound...
Jyothiram Kasturi, Rajesh Sundaresan
VTC
2008
IEEE
218views Communications» more  VTC 2008»
13 years 11 months ago
Performance Analysis of a System using Coordinate Interleaving and Constellation Rotation in Rayleigh Fading Channels
Abstract— Diversity can play an important role in the performance improvement of a communication system in fading channels. The achievable performance with signal space diversity...
Nauman F. Kiyani, Jos H. Weber, Alenka G. Zajic, G...
PIMRC
2008
IEEE
13 years 11 months ago
Constrained opportunistic power control in wireless networks
— In the opportunistic power control algorithm (OPC), designed in [1], [2], each user tries to keep the product of its transmit power and its experienced effective interference t...
Mehdi Rasti, Ahmad R. Sharafat
INFOCOM
2008
IEEE
13 years 11 months ago
Embracing Interference in Ad Hoc Networks Using Joint Routing and Scheduling with Multiple Packet Reception
— We present an approach that takes advantage of multi-packet reception (MPR) to reduce the negative effects of multiple access interference and therefore increase the capacity o...
Xin Wang, J. J. Garcia-Luna-Aceves
ICC
2008
IEEE
160views Communications» more  ICC 2008»
13 years 11 months ago
Performance Analysis of Adaptive M-QAM for Rayleigh Fading Cooperative Systems
— The use of constant-power, rate-adaptive M-QAM transmission with an amplify-and-forward cooperative system is proposed. The upper bound expressions are derived for the outage p...
Tyler Nechiporenko, Khoa T. Phan, Chintha Tellambu...
GLOBECOM
2008
IEEE
13 years 11 months ago
Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming
—We consider a source-destination pair that can communicate only through an unauthenticated intermediate relay node. In this two-hop communication scenario, where the cooperation...
Xiang He, Aylin Yener
GLOBECOM
2008
IEEE
13 years 11 months ago
Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver
—We propose a non-coherent receiver for the fixed detect-and-forward relay channel and derive a closed-form tight upper bound on its bit error probability in Rayleigh fading cha...
Michael R. Souryal, Huiqing You
FOCS
2008
IEEE
13 years 11 months ago
Embeddings of Topological Graphs: Lossy Invariants, Linearization, and 2-Sums
We study the properties of embeddings, multicommodity flows, and sparse cuts in minor-closed families of graphs which are also closed under 2-sums; this includes planar graphs, g...
Amit Chakrabarti, Alexander Jaffe, James R. Lee, J...
DCC
2008
IEEE
13 years 11 months ago
On the Symmetric Gaussian Multiple Description Rate-Distortion Function
We consider symmetric multiple description coding for the Gaussian source, and provide upper and lower bounds for the individual description rate-distortion function. One of the m...
Chao Tian, Soheil Mohajer, Suhas N. Diggavi
CDC
2008
IEEE
13 years 11 months ago
Robust semiglobal stabilization of the second order system by relay feedback with an uncertain variable time delay
We present sufficient conditions for robust relay-delayed semiglobal stabilization of second order systems, which relate the upper bound to an uncertain time delay and the paramete...
Eugenii Shustin, Leonid M. Fridman, Emilia Fridman...