Robust analog function computation via wireless multiple-access channels

M Goldenbaum, S Stanczak - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Wireless sensor network applications often involve the computation of pre-defined functions
of the measurements such as for example the arithmetic mean or maximum value. Standard …

A survey on DCSK-based communication systems and their application to UWB scenarios

Y Fang, G Han, P Chen, FCM Lau… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
In the past two decades, chaotic modulations have drawn a great deal of attention in low-
power and low-complexity wireless communication applications due to their excellent anti …

Rethinking the role of interference in wireless networks

G Zheng, I Krikidis, C Masouros… - IEEE …, 2014 - ieeexplore.ieee.org
This article re-examines the fundamental notion of interference in wireless networks by
contrasting traditional approaches to new concepts that handle interference in a creative …

The Approximate Sum Capacity of the Symmetric Gaussian -User Interference Channel

O Ordentlich, U Erez, B Nazer - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Interference alignment has emerged as a powerful tool in the analysis of multiuser networks.
Despite considerable recent progress, the capacity region of the Gaussian K-user …

A survey on network coding: From traditional wireless networks to emerging cognitive radio networks

MZ Farooqi, SM Tabassum, MH Rehmani… - Journal of Network and …, 2014 - Elsevier
Network coding is a technique in which transmitted data is encoded and decoded to
enhance network throughput, reduce delays and construct a more robust network. Network …

Compute-and-forward network coding design over multi-source multi-relay channels

L Wei, W Chen - IEEE Transactions on Wireless …, 2012 - ieeexplore.ieee.org
Network coding is a new and promising paradigm for modern communication networks by
allowing intermediate nodes to mix messages received from multiple sources. Compute-and …

Practical power-balanced non-orthogonal multiple access

H Pan, L Lu, SC Liew - IEEE Journal on Selected Areas in …, 2017 - ieeexplore.ieee.org
This paper is a theoretical-plus-experimental investigation of practical 5G strategies for
power-balanced non-orthogonal multiple access (NOMA). By allowing multiple users to …

On secure CDRT with NOMA and physical-layer network coding

H Lei, X She, KH Park, IS Ansari, Z Shi… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
This paper proposes a new scheme to enhance the secrecy performance of non-orthogonal
multiple access (NOMA)-based coordinated direct relay transmission (CDRT) systems with …

Performance analysis of amplify-and-forward two-way relaying with co-channel interference and channel estimation error

L Yang, K Qaraqe, E Serpedin… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we consider the performance of a two-way amplify-and-forward relaying
network (AF TWRN) in the presence of unequal power co-channel interferers (CCI) …

Lattice network codes based on Eisenstein integers

QT Sun, J Yuan, T Huang… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
In this paper, we investigate lattice network codes (LNCs) constructed from Eisenstein
integer based lattices. Quantization and encoding algorithms over Eisenstein integers are …