MZ Win, PC Pinto, LA Shepp - Proceedings of the IEEE, 2009 - ieeexplore.ieee.org
In this paper, we introduce a mathematical framework for the characterization of network interference in wireless systems. We consider a network in which the interferers are …
When choosing the technology options to develop a wireless sensor network (WSN), it is vital that their performance levels can be assessed for the type of application intended. This …
Opportunistic spectrum access creates the opening of under-utilized portions of the licensed spectrum for reuse, provided that the transmissions of secondary radios do not cause …
B He, S Yan, X Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we study covert communication in wireless networks consisting of a transmitter, Alice, an intended receiver, Bob, a warden, Willie, and a Poisson field of interferers. Bob and …
PC Pinto, MZ Win - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
We present a mathematical model for communication subject to both network interference and noise. We introduce a framework where the interferers are scattered according to a …
We apply the tensor train (TT) decomposition to construct the tensor product polynomial chaos expansion (PCE) of a random field, to solve the stochastic elliptic diffusion PDE with …
PC Pinto, MZ Win - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
In Part I of this paper, we presented a mathematical model for communication subject to both network interference and noise, where the interferers are scattered according to a spatial …
AF Molisch - URSI Radio Science Bulletin, 2009 - ieeexplore.ieee.org
This paper presents an overview of ultra-wideband (UWB) communications systems, ie, systems with very large relative and/or absolute bandwidth. The large bandwidth and low …
Motivated by recent developments in physical-layer security and stochastic geometry, we aim to characterize the fundamental limits of secure communication in wireless networks …