Results 61 to 70 of about 342,890 (187)

Interference Networks with Point-to-Point Codes [PDF]

open access: yes, 2011
The paper establishes the capacity region of the Gaussian interference channel with many transmitter-receiver pairs constrained to use point-to-point codes.
Baccelli, Francois   +2 more
core   +5 more sources

Service-Oriented Power Allocation for High-Speed Railway Wireless Communications

open access: yesIEEE Access, 2017
The rapid development of high-speed railways (HSRs) all over the world is drawing much more attention on high-mobility wireless communication. For the wireless links that connect the passengers on the train to the cellular network, it is very essential ...
Tao Li   +3 more
doaj   +1 more source

Interference Channels With Arbitrarily Correlated Sources

open access: yes, 2009
Communicating arbitrarily correlated sources over interference channels is considered in this paper. A sufficient condition is found for the lossless transmission of a pair of correlated sources over a discrete memoryless interference channel.
Chen, Biao, Liu, Wei
core   +1 more source

Achievable Outage Rate Regions for the MISO Interference Channel

open access: yesIEEE Wireless Communications Letters, 2013
Accepted for publication in IEEE Wireless Communications ...
Lindblom, Johannes   +2 more
openaire   +4 more sources

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks

open access: yesEntropy, 2019
In this paper, we propose a new theoretical security model for Shannon cipher systems under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel but is also allowed to ...
Bagus Santoso, Yasutada Oohama
doaj   +1 more source

Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper

open access: yesIEEE Access, 2020
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong   +4 more
doaj   +1 more source

An Achievable Rate Region for the Gaussian Interference Channel

open access: yes, 2006
15 pages, 6 figures, submitted to IEEE Trans. Inform. Theory; This paper has been withdrawn by the authors because the content will be completely covered by another paper that the authors will submit ...
Shang, Xiaohu, Chen, Biao
openaire   +2 more sources

The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints

open access: yes, 2006
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the ...
Tekin, Ender, Yener, Aylin
core   +3 more sources

Multiple Access-Enabled Relaying with Piece-Wise and Forward NOMA: Rate Optimization under Reliability Constraints

open access: yesSensors, 2021
The increasing proliferation of Internet-of-things (IoT) networks in a given space requires exploring various communication solutions (e.g., cooperative relaying, non-orthogonal multiple access, spectrum sharing) jointly to increase the performance of ...
Farnaz Khodakhah   +3 more
doaj   +1 more source

A New Achievable Scheme for Interference Relay Channels

open access: yes, 2013
We establish an achievable rate region for discrete memoryless interference relay channels that consist of two source-destination pairs and one or more relays. We develop an achievable scheme combining Han-Kobayashi and noisy network coding schemes.
Chung, Sae-Young   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy