• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 137,355
Next 10 →

Novel Multiple Relay Selection Schemes in Two-Hop Cognitive Relay Networks

by Jiali Xu, Haixia Zhang, Dongfeng Yuan, Qingqing Jin, Cheng-xiang Wang
"... Abstract—This paper studies multiple relay selection schemes in two-hop cognitive relay networks to maximize the signal-to-noise ratio (SNR) of the secondary receiver. We first formulate the relay selection as a nonlinear integral programming, and then propose two suboptimal methods, greedy scheme a ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract—This paper studies multiple relay selection schemes in two-hop cognitive relay networks to maximize the signal-to-noise ratio (SNR) of the secondary receiver. We first formulate the relay selection as a nonlinear integral programming, and then propose two suboptimal methods, greedy scheme

Zero forcing in general two-hop relay networks

by Raymond H. Y. Louie, Student Member, Yonghui Li, Senior Member, Branka Vucetic - IEEE Transactions on Vehicular Technology , 2010
"... Abstract—In this paper, we investigate four different two-hop amplify and forward relay networks, which differ on the processing capabilities at the source, relay, and destination nodes. We derive new exact outage probability expressions where zero-forcing processing is performed at the following fo ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract—In this paper, we investigate four different two-hop amplify and forward relay networks, which differ on the processing capabilities at the source, relay, and destination nodes. We derive new exact outage probability expressions where zero-forcing processing is performed at the following

Relay

by Fan Sun, Tae Min Kim, Arogyaswami J. Paulraj, Elisabeth De Carvalho, Petar Popovski
"... Abstract—Carefully designed protocols can turn overheard interference into useful side information to allow simultaneous transmission of multiple communication flows and increase the spectral efficiency in interference-limited regime. We propose a novel scheme in a typical cell-edge scenario. By exp ..."
Abstract - Add to MetaCart
Abstract—Carefully designed protocols can turn overheard interference into useful side information to allow simultaneous transmission of multiple communication flows and increase the spectral efficiency in interference-limited regime. We propose a novel scheme in a typical cell-edge scenario

RELAYS

by unknown authors , 1968
"... www.americanradiohistory.com ex stock in 7 das y ..."
Abstract - Add to MetaCart
www.americanradiohistory.com ex stock in 7 das y

Coverage enhancement through two-hop relaying in cellular radio systems

by Van Morning Sreng, B. Eng, Morning Sreng, Prof Rafik, A. Goubran - in Proc. IEEE Wireless Communications, Networking Conf
"... Relaying is found in Packet Radio and Ad-hoc networks whereby communications between mobile terminals are carried out in a distributed manner through intermediate relay nodes. When employed in a cellular network, this technique can be regarded as an Opportunity Driven Multiple Access (ODMA) scheme w ..."
Abstract - Cited by 40 (6 self) - Add to MetaCart
Relaying is found in Packet Radio and Ad-hoc networks whereby communications between mobile terminals are carried out in a distributed manner through intermediate relay nodes. When employed in a cellular network, this technique can be regarded as an Opportunity Driven Multiple Access (ODMA) scheme

Random key predistribution schemes for sensor networks

by Haowen Chan, Adrian Perrig, Dawn Song - IN PROCEEDINGS OF THE 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2003
"... Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the ..."
Abstract - Cited by 813 (14 self) - Add to MetaCart
-reinforcement scheme, we show how to strengthen the security between any two nodes by leveraging the security of other links. Finally, we present the random-pairwise keys scheme, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication

A simple cooperative diversity method based on network path selection

by Aggelos Bletsas, Ashish Khisti, David P. Reed, Andrew Lippman - IEEE J. SELECT. AREAS COMMUN , 2006
"... Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the proposed solutions require distributed space–time coding algorithms, the careful design of which is left for future investi ..."
Abstract - Cited by 433 (14 self) - Add to MetaCart
investigation if there is more than one cooperative relay. We propose a novel scheme that alleviates these problems and provides diversity gains on the order of the number of relays in the network. Our scheme first selects the best relay from a set of available relays and then uses this “best ” relay

Cognitive Radio: Brain-Empowered Wireless Communications

by Simon Haykin , 2005
"... Cognitive radio is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. The cognitive radio, built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment and use ..."
Abstract - Cited by 1479 (4 self) - Add to MetaCart
Cognitive radio is viewed as a novel approach for improving the utilization of a precious natural resource: the radio electromagnetic spectrum. The cognitive radio, built on a software-defined radio, is defined as an intelligent wireless communication system that is aware of its environment

Buffer-Aided Relaying for Two-Hop Secure Communication

by Jing Huang, A. Lee Swindlehurst
"... Abstract—We consider using a buffer-aided relay to enhance security for two-hop half-duplex relay networks with an external eavesdropper. We propose a link selection scheme that adapts reception and transmission time slots based on channel quality, while considering both the two-hop transmission eff ..."
Abstract - Add to MetaCart
Abstract—We consider using a buffer-aided relay to enhance security for two-hop half-duplex relay networks with an external eavesdropper. We propose a link selection scheme that adapts reception and transmission time slots based on channel quality, while considering both the two-hop transmission

Two-hop relaying in CDMA networks using unlicensened bands

by Donald Dave Walsh, Donald Dave Walsh, B. Eng, Dave Walsh , 2004
"... Recently there has been significant interest in augmenting the conventional cellular networks with the multihop capability to obtain better high data rate performance in the context of enhanced-3G and beyond-3G networks. This thesis deals with the power allocation strategies in the reverse-link of t ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
-link of two-hop multimedia CDMA networks. In this envisioned network, the WTs (Wireless Terminals – portable devices used to transmit and/or receive electronic information via an air interface(s)) which cannot establish a direct link with the BS (at the required rates) seek the assistance of those WTs which
Next 10 →
Results 1 - 10 of 137,355
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University