This paper proposes non-iterative coordinated beamforming algorithms for a multiuser MIMO (multiple input multiple output) system with multiple antennas at the transmitter and mul...
Chan-Byoung Chae, Takao Inoue, Robert W. Heath Jr....
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Abstract--Although the capacity of multiple-input/multipleoutput (MIMO) broadcast channels (BCs) can be achieved by dirty paper coding (DPC), it is difficult to implement in practi...
In this paper we analyze the performance of random beamforming schemes in a multi-user Gaussian broadcast channel. Each user will have N > 1 receive antennas allowing optimal c...
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of...