Search
Now showing items 31-40 of 40
Malicious-proof and fair credit-based resource allocation techniques for DSA systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
We propose a credit-based resource allocation technique for dynamic spectrum access that is robust against malicious and selfish behaviors and ensures good overall system fairness performance while also allowing spectrum ...
Enhancing spectral-energy efficiency for LTE-Advanced heterogeneous networks: A users social pattern perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article Review)
The development of LTE-Advanced and beyond cellular networks is expected to offer considerably higher data rates than the existing 3G networks. Among the many potential technologies in LTE-Advanced systems, users' ...
EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks
(2012 , Conference Paper)
We propose an energy-aware MAC protocol, referred to as EM-MAC, for multi-hop wireless networks with multi-channel access capabilities. EM-MAC relies on iMAC's efficient channel selection mechanism to resolve the medium ...
Securing vehicle-to-grid communications in the smart grid
(2013 , Article)
Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe ...
Carrier aggregation for LTE-advanced: Uplink multiple access and transmission enhancement features
(2013 , Article)
Multiple access and transmission enhancement in support of carrier aggregation techniques has been actively studied in the 3GPP LTEAdvanced standardization process of the nextgeneration mobile broadband communication ...
An enhanced public key infrastructure to secure smart grid wireless communication networks
(2014 , Article)
It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ...
Securing cognitive radio networks against primary user emulation attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...
A survey on communication infrastructure for micro-grids
(2013 , Conference Paper)
A micro-grid is a small scale power supply network that is designed to provide electricity to a small community with its own renewable energy sources. Due to distributed generation variability, security and load sharing ...
Taking advantage of multi-user diversity in OFDM systems
(2013 , Conference Paper)
A multi-user diversity approach, called Opportunistic Interference Management (OIM), is considered in connection with Orthogonal Frequency Division Multiplexing (OFDM) systems. The OIM is applied to each consecutive group ...
Sparsifying dictionary analysis for FIR MIMO channel-shortening equalizers
(
IEEE
, 2016 , Conference Paper)
In this paper, we propose a general framework that transforms the problems of designing sparse finite-impulse response channel-shortening equalizers and target impulse response filters for multiple antenna systems into the ...