Results 61 to 70 of about 342,890 (187)
Interference Networks with Point-to-Point Codes [PDF]
The paper establishes the capacity region of the Gaussian interference channel with many transmitter-receiver pairs constrained to use point-to-point codes.
Baccelli, Francois +2 more
core +5 more sources
Service-Oriented Power Allocation for High-Speed Railway Wireless Communications
The rapid development of high-speed railways (HSRs) all over the world is drawing much more attention on high-mobility wireless communication. For the wireless links that connect the passengers on the train to the cellular network, it is very essential ...
Tao Li +3 more
doaj +1 more source
Interference Channels With Arbitrarily Correlated Sources
Communicating arbitrarily correlated sources over interference channels is considered in this paper. A sufficient condition is found for the lossless transmission of a pair of correlated sources over a discrete memoryless interference channel.
Chen, Biao, Liu, Wei
core +1 more source
Achievable Outage Rate Regions for the MISO Interference Channel
Accepted for publication in IEEE Wireless Communications ...
Lindblom, Johannes +2 more
openaire +4 more sources
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to ...
Bagus Santoso, Yasutada Oohama
doaj +1 more source
Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong +4 more
doaj +1 more source
An Achievable Rate Region for the Gaussian Interference Channel
15 pages, 6 figures, submitted to IEEE Trans. Inform. Theory; This paper has been withdrawn by the authors because the content will be completely covered by another paper that the authors will submit ...
Shang, Xiaohu, Chen, Biao
openaire +2 more sources
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the ...
Tekin, Ender, Yener, Aylin
core +3 more sources
The increasing proliferation of Internet-of-things (IoT) networks in a given space requires exploring various communication solutions (e.g., cooperative relaying, non-orthogonal multiple access, spectrum sharing) jointly to increase the performance of ...
Farnaz Khodakhah +3 more
doaj +1 more source
A New Achievable Scheme for Interference Relay Channels
We establish an achievable rate region for discrete memoryless interference relay channels that consist of two source-destination pairs and one or more relays. We develop an achievable scheme combining Han-Kobayashi and noisy network coding schemes.
Chung, Sae-Young +3 more
core +1 more source

