Interference alignment and its applications: A survey, research issues, and challenges

N Zhao, FR Yu, M Jin, Q Yan… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
The capacity of interference network is a fundamental issue that eludes the researchers for
decades. Interference alignment (IA) is an emerging interference management technique …

Machine-to-machine communications: Technologies and challenges

KC Chen, SY Lien - Ad Hoc Networks, 2014 - Elsevier
Abstract Machine-to-machine (M2M) communications emerge to autonomously operate to
link interactions between Internet cyber world and physical systems. We present the …

Analyzing throughput of MANET with reduced packet loss

N Muthukumaran - Wireless Personal Communications, 2017 - Springer
This research paper analyses the throughput capacity of Mobile Ad hoc Network (MANET)
with reduced packet loss. The nodes are then discovered using Medium Access Control …

Scaling laws for throughput capacity and delay in wireless networks—A survey

N Lu, XS Shen - IEEE Communications Surveys & Tutorials, 2013 - ieeexplore.ieee.org
The capacity scaling law of wireless networks has been considered as one of the most
fundamental issues. In this survey, we aim at providing a comprehensive overview of the …

Interference-aware energy-efficient resource allocation for OFDMA-based heterogeneous networks with incomplete channel state information

S Bu, FR Yu, H Yanikomeroglu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Heterogeneous wireless networks are considered as promising technologies to improve
energy efficiency. In heterogeneous networks, interference management is very important …

Software-defined device-to-device (D2D) communications in virtual wireless networks with imperfect network state information (NSI)

MYK Chua, FR Yu, C Liang, B Sun… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Software-defined networking (SDN) and network function virtualization (NFV) are a
promising system architecture and control mechanism for future networks. Although some …

[图书][B] Distributed denial of service attack and defense

S Yu - 2014 - Springer
Since human beings stepped into the Internet era, our lives are deeply involved with the
Internet. Many killer applications are carried out through Internet-based applications. At the …

Cloud computing meets mobile wireless communications in next generation cellular networks

MYK Chua, FR Yu, S Bu - IEEE Network, 2014 - ieeexplore.ieee.org
In next generation cellular networks, cloud computing will have profound impacts on mobile
wireless communications. On the one hand, the integration of cloud computing into the …

SAM: A semantic-aware multi-tiered source de-duplication framework for cloud backup

Y Tan, H Jiang, D Feng, L Tian, Z Yan… - … on Parallel Processing, 2010 - ieeexplore.ieee.org
Existing de-duplication solutions in cloud backup environment either obtain high
compression ratios at the cost of heavy de-duplication overheads in terms of increased …

Dynamic operations of cloud radio access networks (C-RAN) for mobile cloud computing systems

MYK Chua, FR Yu, S Bu - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
In this paper, we jointly consider cloud radio access networks (C-RAN) and mobile cloud
computing (MCC) in a holistic framework. In particular, we study how to dynamically operate …