Search
Now showing items 1-7 of 7
Efficient online WiFi delivery of layered-coding media using inter-layer network coding
(
IEEE
, 2011 , Conference Paper)
A primary challenge in multicasting video in a wireless LAN to multiple clients is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
The impact of inter-layer network coding on the relative performance of MRC/MDC WiFi media delivery
(
ACM
, 2011 , Conference Paper)
A primary challenge in multicasting video in a wireless LAN is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions from the AP. A ...
Relay assignment in network-coded cooperative systems with M-PSK modulation over asymmetric channels
(
IEEE
, 2010 , Conference Paper)
We consider in this paper relay assignment for cooperative systems with multiple two-way relay channels. The nodes corresponding to one two-way relay channel (henceforth referred to as pair) communicate with each other ...
A degrees of freedom-optimal scheme for SISO X channel with synergistic alternating CSIT
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, the degrees of freedom (DoF) of the two-user single input single output (SISO) X channel are investigated. Three cases are considered for the availability of channel state information at the transmitters ...
On the degrees of freedom of the cognitive broadcast channel
(2011 , Conference Paper)
Cognitive broadcast channel, where two multiantenna transmitters communicate with their respective receivers, is considered. One of the transmitters is said to be cognitive (secondary) as it is assumed to know the messages ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...