Sciweavers

243 search results - page 38 / 49
» Interference Channels With Source Cooperation
Sort
View
ICC
2008
IEEE
175views Communications» more  ICC 2008»
15 years 6 months ago
Routing in Cooperative Wireless Networks with Mutual-Information Accumulation
Cooperation between the nodes of wireless multihop networks can increase communication reliability, reduce energy consumption, and decrease latency. The possible improvements are ...
Stark C. Draper, Lingjia Liu, Andreas F. Molisch, ...
TIT
2010
146views Education» more  TIT 2010»
14 years 6 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
ADHOCNOW
2004
Springer
15 years 5 months ago
A Rate-Adaptive MAC Protocol for Low-Power Ultra-Wide Band Ad-Hoc Networks
Recent theoretical results show that it is optimal to allow interfering sources to transmit simultaneously as long as they are outside a well-defined exclusion region around a de...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer,...
JSAC
2011
127views more  JSAC 2011»
14 years 6 months ago
Opportunistic Multiple Access for Cognitive Radio Networks
—In this paper, opportunistic multiple access to the under-utilized channel resources is investigated. Exploiting source burstiness, secondary cognitive nodes utilizes primary no...
Amr A. El-Sherif, Ahmed K. Sadek, K. J. Ray Liu
TIT
2010
110views Education» more  TIT 2010»
14 years 6 months ago
Secure communications with insecure feedback: breaking the high-SNR ceiling
A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy...
Tùng T. Kim, H. Vincent Poor