Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
— We establish the optimal diversity-multiplexing (DM) tradeoff of coherent time, frequency and time-frequency selective-fading MIMO channels and provide a code design criterion ...
: Nowadays, software evolution is a very hot topic. It is particularly complex when it regards critical and nonstopping systems. Usually, these situations are tackled by hard-codin...
—We consider an ad hoc network where frequency hopping (FH), convolutional coding and multiple antennas are employed in order to combat fading and multiple access (MA) interferen...
Kostas Stamatiou, John G. Proakis, James R. Zeidle...
Abstract—Block-spread code-division multiple access (BSCDMA) is a bandwidth efficient method by which multiple users can utilize a transmission medium simultaneously. One specia...