In this work, we look at single user and multiuser Multiple-Input Multiple-Output (MIMO) beamforming networks with Channel Distribution Information (CDI). CDI does not need to be ...
Bloom filters make use of a "probabilistic" hash-coding method to reduce the amount of space required to store a hash set. A Bloom filter offers a trade-off between its ...
Mark C. Little, Santosh K. Shrivastava, Neil A. Sp...
We extend our previous work on Multilinear Independent Component Analysis (MICA) by introducing a Fast-MICA algorithm that demonstrates the same improvement over classical ICA as ...
Malicious data attacks to the real-time electricity market are studied. In particular, an adversary launches an attack by manipulating data from a set of meters with the goal of i...
Abstract—Temporal Dynamic Spectrum Access (DSA) in Cognitive Radio Networks exploits time gaps between the primary users transmissions. In this work, the fundamental performance ...