The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, coordinated beamforming and power allocation schemes are proposed for multicell downlink non-orthogonal multiple access (NOMA) systems. Beamforming is adopted at the base-station to mitigate both intercell and intracell interference whereas power-domain multiplexing between a pair of users is considered in each spatial dimension. Given the beamforming vectors, intra-pair power allocation...
Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy...
In this paper, we discuss Redundancy Allocation Problem (RAP) in network environments. By efficiently combining redundancy with extra defense mechanisms, we attempt to ensure the continuity of a network service, and enhance its survivability against malicious attackers that utilize accumulated experience. We construct an attack/defense scenario, in which an attacker and a defender compete against...
In this paper, we consider the problem of minimizing attackers' success probability in a protected network subject to attacker profile/behavior constraints and defender resource/strategy constraints. Compared with previous research, the following two enhancements are made. First, we no longer assume that perfect knowledge regarding the network topology and defense resource allocation is fully available...
We examine a cooperative uplink CDMA network where multiple sources simultaneously access the cooperative channel using different spreading codes and compete for the resources at the relays. To efficiently utilize the limited energy and bandwidth resources at the relays, we propose in this work a decentralized reduced-rank multiuser relaying (RR-MUR) where the data received at each relay is compressed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.