Change search
Refine search result
1 - 8 of 8
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Barros da Silva Jr., José Mairton
    et al.
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Fodor, Gábor
    KTH, School of Electrical Engineering (EES), Automatic Control. Ericsson Research.
    A Binary Power Control Scheme for D2D Communications2015In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 4, no 6, 669-672 p.Article in journal (Refereed)
    Abstract [en]

    Binary power control (BPC) is known to maximize the capacity of a two-cell interference limited system and performs near optimally for larger systems. However, when device-to-device (D2D) communication underlaying the cellular layer is supported, an objective function that considers the power consumption is more suitable. We find that BPC remains optimal for D2D communications when the weight of the overall power consumption in the utility function is bounded. Building on this insight, we propose a simple near-optimal extended BPC scheme and compare its performance with a recently proposed utility optimal iterative scheme using a realistic multicell simulator. Our results indicate that a near optimal D2D performance can be achieved without lengthy iterations or complex signaling mechanisms.

  • 2. Do, Tan Tai
    et al.
    Ngo, Hien Quoc
    Duong, Trung Q.
    Oechtering, Tobias
    KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Skoglund, Mikael
    KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Massive MIMO Pilot Retransmission Strategies for Robustification Against Jamming2017In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 6, no 1, 58-61 p.Article in journal (Refereed)
    Abstract [en]

    This letter proposes anti-jamming strategies based on pilot retransmission for a single user uplink massive MIMO under jamming attack. A jammer is assumed to attack the system both in the training and data transmission phases. We first derive an achievable rate which enables us to analyze the effect of jamming attacks on the system performance. Counter-attack strategies are then proposed to mitigate this effect under two different scenarios: random and deterministic jamming attacks. Numerical results illustrate our analysis and benefit of the proposed schemes.

  • 3.
    Gabry, Frédéric
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre. Huawei France Research Center, France.
    Zappone, A.
    Thobaben, Ragnar
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Jorswieck, E. A.
    Skoglund, Mikael
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks with Secrecy Constraints2015In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 4, no 4, 437-440 p., 7106492Article in journal (Refereed)
    Abstract [en]

    We investigate energy-efficient cooperation for secrecy in cognitive radio networks. In particular, we consider a four-node cognitive scenario where the secondary receiver is treated as a potential eavesdropper with respect to the primary transmission. The cognitive transmitter should ensure that the primary message is not leaked to the secondary user by using cooperative jamming. We investigate the optimal power allocation and power splitting at the secondary transmitter for our cognitive model to maximize the secondary energy efficiency (EE) under secrecy constraints. We formulate and analyze an important EE Stackelberg game between the two transmitters aiming at maximizing their utilities. We illustrate the analytical results through our geometrical model, highlighting the EE performance of the system and the impact of the Stackelberg game.

  • 4.
    Gerami, Majid
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Xiao, Ming
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Skoglund, Mikael
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Partial Repair for Wireless Caching Networks With Broadcast Channels2015In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 4, no 2, 145-148 p., 6987261Article in journal (Refereed)
    Abstract [en]

    We investigate the repair problem for wireless caching networks when parts of stored packets in cashing nodes are lost. We first develop theoretical lower bounds on the number of necessary transmission packets over error-free broadcast channels for repair. Then we discuss the impact of the distribution of the lost packets among caching nodes. Finally, we study the construction of repair codes and propose the optimal exact repair for some special scenarios.

  • 5.
    Girnyk, Maksym A.
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Muller, A.
    Vehkapera, M.
    Kildehøj Rasmussen, Lars
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Debbah, M.
    On the asymptotic sum rate of downlink cellular systems with random user locations2015In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 4, no 3, 333-336 p., 7065231Article in journal (Refereed)
    Abstract [en]

    We consider a downlink cellular communication system with a multi-antenna base station (BS). A regularized zero forcing precoder is employed at the BS to manage the inter-user interference within the cell. Using methods from random matrix theory, we derive a deterministic approximation for the achievable ergodic sum rate, taking into account the randomness from both fading and random user locations. The obtained approximation describes well the behavior of finite-sized systems and enables efficient optimization of the precoder matrix.

  • 6.
    Hussain, Iqbal
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Xiao, Ming
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Rasmussen, Lars K.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Rateless Codes for the Multiway Relay Channel2014In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 3, no 5, 457-460 p.Article in journal (Refereed)
    Abstract [en]

    We consider distributed Luby transform (DLT) codes for efficient packet transmission in a multi-way relay network, where the links are modeled as erasure channels. Density evolution is applied for asymptotic performance analysis, and subsequently used in a linear-programming design framework for optimizing the degree distribution at the relay in terms of overhead. Moreover a buffer is introduced at the relay to enable efficient downlink transmission even if packets are lost during uplink transmission. Performance losses in terms of delay and/or erasure rates caused by link erasures during uplink transmission are thus alleviated. The proposed DLT codes provide significant improvements in overhead and decoded erasure rates. Numerical results for finite-length codes follow closely the asymptotic analysis. Our results demonstrate that the proposed buffer-based DLT codes outperform its counterparts for lossy uplink transmission.

  • 7.
    Tombaz, Sibel
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Sung, Ki Won
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Zander, Jens
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    On metrics and models for energy-efficient design of wireless access networks2014In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 3, no 6, 649-652 p., 6877636Article in journal (Refereed)
    Abstract [en]

    The energy efficiency of wireless access networks has attracted significant interest, due to escalating energy cost and environmental concerns. How energy efficiency should be measured is, however, still disputed in the literature. In this letter, we discuss the impact of performance metrics and energy consumption models in network dimensioning. We argue that, using a popular metric, the number of bits/Joule may give misleading results, unless the capacity and coverage requirements of the system are carefully defined. We also claim that the energy consumption in the backhaul and the idle power of the base stations have to be taken into account. To support our claims, we demonstrate in a simple example how misleading results can be obtained by using flawed performance metrics.

  • 8.
    Wang, Zhao
    et al.
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Xiao, Ming
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Skoglund, Mikael
    KTH, School of Electrical Engineering (EES), Communication Theory.
    Secrecy degrees of freedom of the 2 interference channel with delayed CSIT2014In: IEEE Wireless Communications Letters, ISSN 2162-2337, E-ISSN 2162-2345, Vol. 3, no 4, 341-344 p., 6784143Article in journal (Refereed)
    Abstract [en]

    We consider the two-hop interference channel with confidential messages (ICC), where each transmitter sends one confidential message to its intended destination through two trusted relays. We study the secrecy degrees of freedom (SDoF) of the considered 2 ?2 ?2 ICC with delayed channel state information at transmitters (CSIT). We settle the optimal SDoF of the considered network to be (1/2, 1/2). Thus, the considered network has a strictly larger sum SDoF than a two-user one-hop ICC with even full CSIT. Moreover, we study the SDoF of the network with limited Shannon feedback, that only one relay can obtain the delayed CSIT and output feedback from the destinations. The optimal SDoF is also shown to be (1/2, 1/2), revealing that only limited feedback can also bring SDoF gain. Our proposed achievable schemes in both cases are integrated forms of the retrospective interference alignment and artificial noise transmission.

1 - 8 of 8
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf