Opportunistic user access scheduling enhances the capacity of wireless networks by exploiting the multi user diversity. When frame aggregation is used, opportunistic schemes are no...
In this paper we study an assemble-to-order environment involving a short-life-cycle product. The product is sold in two different configurations, each requiring a unique componen...
—We analyze fading interference relay networks where M single-antenna source-destination terminal pairs communicate concurrently and in the same frequency band through a set of K...
In this paper, both the concept and the demonstrator implementation of an advanced airport data link is described which is used for data exchange between pilots and controllers in ...
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...