Sciweavers

JSAC
2016
150views more  JSAC 2016»
9 years 11 months ago
Interleaved Concatenations of Polar Codes With BCH and Convolutional Codes
Abstract—We analyze interleaved concatenation schemes of polar codes with outer binary BCH codes and convolutional codes. We show that both BCH-polar and Conv-polar codes can hav...
Ying Wang, Krishna R. Narayanan, Yu-Chih Huang
JSAC
2016
69views more  JSAC 2016»
9 years 11 months ago
Robust Workload and Energy Management for Sustainable Data Centers
—A large number of geo-distributed data centers begin to surge in the era of data deluge and information explosion. To meet the growing demand in massive data processing, the inf...
Tianyi Chen, Yu Zhang 0005, Xin Wang, Georgios B. ...
JSAC
2016
82views more  JSAC 2016»
9 years 11 months ago
Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Network
—By enabling two adjacent mobile devices to establish a direct link, device-to-device (D2D) communication can increase the system throughput over underlaying wireless networks, w...
Wenchi Cheng, Xi Zhang, Hailin Zhang
JSAC
2016
89views more  JSAC 2016»
9 years 11 months ago
Alignment of Polarized Sets
—Arıkan’s polar coding technique is based on the idea of synthesizing n channels from the n instances of the physical channel by a simple linear encoding transformation. Each ...
Joseph M. Renes, David Sutter, Seyed Hamed Hassani
JSAC
2016
76views more  JSAC 2016»
9 years 11 months ago
Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid
While LTE is becoming widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a...
Germán Corrales Madueño, Jimmy Jesse...
JSAC
2016
53views more  JSAC 2016»
9 years 11 months ago
Polar Coding for the General Wiretap Channel With Extensions to Multiuser Scenarios
—Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to achieve information-theoretic secrecy is an impor...
Yi-Peng Wei, Sennur Ulukus
JSAC
2016
56views more  JSAC 2016»
9 years 11 months ago
Polar Subcodes
—An extension of polar codes is proposed, which allows some of the frozen symbols, called dynamic frozen symbols, to be data-dependent. A construction of polar codes with dynamic...
Peter Trifonov, Vera Miloslavskaya
JSAC
2016
96views more  JSAC 2016»
9 years 11 months ago
Internet of Things in the 5G Era: Enablers, Architecture, and Business Models
—The IoT paradigm holds the promise to revolutionize the way we live and work by means of a wealth of new services, based on seamless interactions between a large amount of heter...
Maria Rita Palattella, Mischa Dohler, Luigi Alfred...
JSAC
2016
61views more  JSAC 2016»
9 years 11 months ago
A Truthful Double Auction for Device-to-Device Communications in Cellular Networks
—As the emergence of new wireless applications, data traffic in cellular networks has dramatically increased in recent years, which imposes an immediate requirement for large ne...
Peng Li, Song Guo, Ivan Stojmenovic
JSAC
2016
57views more  JSAC 2016»
9 years 11 months ago
Joint Optimal Design and Operation of Hybrid Energy Storage Systems
—The wide range of performance characteristics of storage technologies motivates the use of a hybrid energy storage systems (HESS) that combines the best features of multiple tec...
Yashar Ghiassi-Farrokhfal, Catherine Rosenberg, Sr...