total 132took 0.14s

Optimum Bi-level Hierarchical Clustering for Wireless Mobile Tracking SystemsFeb 08 2019A novel technique is proposed to optimize energy efficiency for wireless networks based on hierarchical mobile clustering. The new bi-level clustering technique minimizes mutual interference and energy consumption in large-scale tracking systems used ... More

Iterative Clustering for Energy-Efficient Large-Scale Tracking SystemsFeb 08 2019A new technique is presented to design energy-efficient large-scale tracking systems based on mobile clustering. The new technique optimizes the formation of mobile clusters to minimize energy consumption in large-scale tracking systems. This technique ... More

Supervised learning based on temporal coding in spiking neural networksJun 27 2016Gradient descent training techniques are remarkably successful in training analog-valued artificial neural networks (ANNs). Such training techniques, however, do not transfer easily to spiking networks due to the spike generation hard non-linearity and ... More

Supervised learning based on temporal coding in spiking neural networksJun 27 2016Aug 16 2017Gradient descent training techniques are remarkably successful in training analog-valued artificial neural networks (ANNs). Such training techniques, however, do not transfer easily to spiking networks due to the spike generation hard non-linearity and ... More

Parameter Efficient Training of Deep Convolutional Neural Networks by Dynamic Sparse ReparameterizationFeb 15 2019Mar 19 2019Deep neural networks are typically highly over-parameterized with pruning techniques able to remove a significant fraction of network parameters with little loss in accuracy. Recently, techniques based on dynamic re-allocation of non-zero parameters have ... More

Parameter Efficient Training of Deep Convolutional Neural Networks by Dynamic Sparse ReparameterizationFeb 15 2019May 13 2019Modern deep neural networks are typically highly overparameterized. Pruning techniques are able to remove a significant fraction of network parameters with little loss in accuracy. Recently, techniques based on dynamic reallocation of non-zero parameters ... More

Two body problems with magnetic interactionsJan 30 2019Feb 02 2019In the present work, we present different two-body potentials which have oscillatory shapes with magnetic interactions. The eigenvalues and eigenfunctions are obtained for one of those problems using Nikiforov-Uvarov method.

A learning framework for winner-take-all networks with stochastic synapsesAug 14 2017Feb 05 2018Many recent generative models make use of neural networks to transform the probability distribution of a simple low-dimensional noise process into the complex distribution of the data. This raises the question of whether biological networks operate along ... More

Parameter Efficient Training of Deep Convolutional Neural Networks by Dynamic Sparse ReparameterizationFeb 15 2019Deep neural networks are typically highly over-parameterized with pruning techniques able to remove a significant fraction of network parameters with little loss in accuracy. Recently, techniques based on dynamic re-allocation of non-zero parameters have ... More

On Stochastic Geometry Modeling of Cellular Uplink Transmission with Truncated Channel Inversion Power ControlJan 23 2014Using stochastic geometry, we develop a tractable uplink modeling paradigm for outage probability and spectral efficiency in both single and multi-tier cellular wireless networks. The analysis accounts for per user equipment (UE) power control as well ... More

Stochastic Interpretation of Quasi-periodic Event-based SystemsDec 09 2015Many networks used in machine learning and as models of biological neural networks make use of stochastic neurons or neuron-like units. We show that stochastic artificial neurons can be realized on silicon chips by exploiting the quasi-periodic behavior ... More

Bound state of heavy quarks using a general polynomial potentialOct 17 2018Dec 29 2018In the present work, the mass spectra of the bound states of heavy quarks b and c quarks and the Bc meson are studied within the frame work of non relativistic Schrodinger equation. First, we solve Schr\"odinger's equation with a general polynomial potential ... More

Single-Particle Spectrum of Pure Neutron MatterFeb 06 2015We have calculated the self-consistent auxiliary potential effects on the binding energy of neutron matter using the Brueckner Hartree Fock approach by adopting the Argonne V18 and CD-Bonn potentials. The binding energy with the four different choices ... More

Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular NetworksMay 08 2014May 12 2014Device-to-device (D2D) communication enables the user equipments (UEs) located in close proximity to bypass the cellular base stations (BSs) and directly connect to each other, and thereby, offload traffic from the cellular infrastructure. D2D communication ... More

Systematics of nucleon density distributions and neutron skin of nucleiApr 30 2015May 19 2015Proton and neutron density profiles of 760 nuclei in the mass region of A=16-304are analyzed using the Skyrme energy density for the parameter set SLy4. Simple formulae are obtained to fit the resulting radii and diffuseness data. These formulae may be ... More

The Relay-Eavesdropper Channel: Cooperation for SecrecyDec 07 2006This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several ... More

The Water-Filling Game in Fading Multiple Access ChannelsDec 03 2005We adopt a game theoretic approach for the design and analysis of distributed resource allocation algorithms in fading multiple access channels. The users are assumed to be selfish, rational, and limited by average power constraints. We show that the ... More

FlexNGIA: A Flexible Internet Architecture for the Next-Generation Tactile InternetMay 17 2019From virtual reality and telepresence, to augmented reality, holoportation, and remotely controlled robotics, these future network applications promise an unprecedented development for society, economics and culture by revolutionizing the way we live, ... More

Limits on the Capacity of In-Band Full Duplex Communication in Uplink Cellular NetworksNov 17 2015Simultaneous co-channel transmission and reception, denoted as in-band full duplex (FD) communication, has been promoted as an attractive solution to improve the spectral efficiency of cellular networks. However, in addition to the self-interference problem, ... More

Proactive Data Download and User Demand Shaping for Data NetworksApr 21 2013Dec 28 2014In this work, we propose and study optimal proactive resource allocation and demand shaping for data networks. Motivated by the recent findings on the predictability of human behavior patterns in data networks, and the emergence of highly capable handheld ... More

Cooperative Lattice Coding and DecodingFeb 13 2006Feb 16 2006A novel lattice coding framework is proposed for outage-limited cooperative channels. This framework provides practical implementations for the optimal cooperation protocols proposed by Azarian et al. In particular, for the relay channel we implement ... More

Distributed Spectrum Sensing with Sequential Ordered Transmissions to a Cognitive Fusion CenterMay 30 2011Cooperative spectrum sensing is a robust strategy that enhances the detection probability of primary licensed users. However, a large number of detectors reporting to a fusion center for a final decision causes significant delay and also presumes the ... More

A Blockchain Example for Cooperative Interference ManagementAug 04 2018We present an example where a distributed coordinated protocol supported by a blockchain-enabled monetary mechanism leads to achieving optimal information theoretic degrees of freedom gains. The considered setting is that of a linear interference network, ... More

Harvesting Full-Duplex Rate Gains in Cellular Networks with Half-Duplex User TerminalsNov 01 2015Feb 28 2016Full-Duplex (FD) transceivers may be expensive in terms of complexity, power consumption, and price to be implemented in all user terminals. Therefore, techniques to exploit in-band full-duplex communication with FD base stations (BSs) and half-duplex ... More

The Three Node Wireless Network: Achievable Rates and Cooperation StrategiesJul 01 2005We consider a wireless network composed of three nodes and limited by the half-duplex and total power constraints. This formulation encompasses many of the special cases studied in the literature and allows for capturing the common features shared by ... More

Synaptic Plasticity Dynamics for Deep Continuous Local Learning (DECOLLE)Nov 27 2018May 31 2019A growing body of work underlines striking similarities between biological neural networks and recurrent, binary neural networks. A relatively smaller body of work, however, discusses similarities between learning dynamics employed in deep artificial ... More

Polar Coding for Secure Transmission and Key AgreementMar 06 2010Wyner's work on wiretap channels and the recent works on information theoretic security are based on random codes. Achieving information theoretical security with practical coding schemes is of definite interest. In this note, the attempt is to overcome ... More

Surrogate Gradient Learning in Spiking Neural NetworksJan 28 2019A growing number of neuromorphic spiking neural network processors that emulate biological neural networks create an imminent need for methods and tools to enable them to solve real-world signal processing problems. Like conventional neural networks, ... More

On the Secrecy Rate Region for the Interference ChannelMay 01 2009This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The ... More

On Power Control and Frequency Reuse in the Two User Cognitive ChannelOct 16 2008This paper considers the generalized cognitive radio channel where the secondary user is allowed to reuse the frequency during both the idle and active periods of the primary user, as long as the primary rate remains the same. In this setting, the optimal ... More

Blind Cognitive MAC ProtocolsOct 08 2008We consider the design of cognitive Medium Access Control (MAC) protocols enabling an unlicensed (secondary) transmitter-receiver pair to communicate over the idle periods of a set of licensed channels, i.e., the primary network. The objective is to maximize ... More

On the Throughput-Delay Tradeoff in Cellular MulticastJun 07 2005In this paper, we adopt a cross layer design approach for analyzing the throughput-delay tradeoff of the multicast channel in a single cell system. To illustrate the main ideas, we start with the single group case, i.e., pure multicast, where a common ... More

Prioritized Multi-stream Traffic in Uplink IoT Networks: Spatially Interacting Vacation QueuesJul 18 2019Massive Internet of Things (IoT) is foreseen to introduce plethora of applications for a fully connected world. Heterogeneous traffic is envisaged, where packets generated at each IoT device should be differentiated and served according to their priority. ... More

Rhythmic inhibition allows neural networks to search for maximally consistent statesMar 10 2015Gamma-band rhythmic inhibition is a ubiquitous phenomenon in neural circuits yet its computational role still remains elusive. We show that a model of Gamma-band rhythmic inhibition allows networks of coupled cortical circuit motifs to search for network ... More

Vehicular Communication and Mobility Sustainability: the Mutual Impacts in Large-scale Smart CitiesAug 22 2019Intelligent Transportation Systems (ITSs) is the backbone of transportation services in smart cities. ITSs produce better-informed decisions using real-time data gathered from connected vehicles. In ITSs, Vehicular Ad hoc Network (VANET) is a communication ... More

Unified Stochastic Geometry Model for MIMO Cellular Networks with RetransmissionsApr 11 2016This paper presents a unified mathematical paradigm, based on stochastic geometry, for downlink cellular networks with multiple-input-multiple-output (MIMO) base stations (BSs). The developed paradigm accounts for signal retransmission upon decoding errors, ... More

Synaptic Plasticity Dynamics for Deep Continuous Local LearningNov 27 2018Mar 04 2019A growing body of work underlines striking similarities between spiking neural networks modeling biological networks and recurrent, binary neural networks. A relatively smaller body of work, however, discuss similarities between learning dynamics employed ... More

Flexible Design for $α$-Duplex Communications in Multi-Tier Cellular NetworksNov 24 2015Apr 20 2016Backward compatibility is an essential ingredient for the success of new technologies. In the context of in-band full-duplex (FD) communication, FD base stations (BSs) should support half-duplex (HD) users' equipment (UEs) without sacrificing the foreseen ... More

Static Free Space Detection with Laser Scanner using Occupancy Grid MapsJan 02 2018Drivable free space information is vital for autonomous vehicles that have to plan evasive maneuvers in real-time. In this paper, we present a new efficient method for environmental free space detection with laser scanner based on 2D occupancy grid maps ... More

ARQ Secrecy: From Theory to PracticeAug 17 2009Inspired by our earlier work on Automatic Repeat reQuest (ARQ) secrecy, we propose a simple, yet efficient, security overlay protocol to existing 802.11 networks. Our work targets networks secured by the Wired Equivalent Privacy (WEP) protocol because ... More

Deep supervised learning using local errorsNov 17 2017Error backpropagation is a highly effective mechanism for learning high-quality hierarchical features in deep networks. Updating the features or weights in one layer, however, requires waiting for the propagation of error signals from higher layers. Learning ... More

Surrogate Gradient Learning in Spiking Neural NetworksJan 28 2019May 03 2019Spiking neural networks are nature's versatile solution to fault-tolerant and energy efficient signal processing. To translate these benefits into hardware, a growing number of neuromorphic spiking neural network processors attempt to emulate biological ... More

Cooperative encoding for secrecy in interference channelsMay 25 2009Apr 21 2011This paper investigates the fundamental performance limits of the two-user interference channel in the presence of an external eavesdropper. In this setting, we construct an inner bound, to the secrecy capacity region, based on the idea of cooperative ... More

Proactive Resource Allocation: Harnessing the Diversity and Multicast GainsOct 21 2011This paper introduces the novel concept of proactive resource allocation through which the predictability of user behavior is exploited to balance the wireless traffic over time, and hence, significantly reduce the bandwidth required to achieve a given ... More

Proactive Resource Allocation: Turning Predictable Behavior into Spectral GainOct 09 2010This paper introduces the novel concept of proactive resource allocation in which the predictability of user behavior is exploited to balance the wireless traffic over time, and hence, significantly reduce the bandwidth required to achieve a given blocking/outage ... More

Managing shop floor systems Using RFID in the Middle EastOct 30 2014The controllability of a factory is highly dependent on the capability of a given enterprise planning system to interact with the shop floor, and the capability of any authorized user to review the operation plans, as well as the status of any sales order ... More

Cognitive MAC Protocols for General Primary Network ModelsJul 23 2009We consider the design of cognitive Medium Access Control (MAC) protocols enabling a secondary (unlicensed) transmitter-receiver pair to communicate over the idle periods of a set of primary (licensed) channels. More specifically, we propose cognitive ... More

Reactive Collision Avoidance using Evolutionary Neural NetworksSep 27 2016Collision avoidance systems can play a vital role in reducing the number of accidents and saving human lives. In this paper, we introduce and validate a novel method for vehicles reactive collision avoidance using evolutionary neural networks (ENN). A ... More

An event-based architecture for solving constraint satisfaction problemsMay 04 2015Constraint satisfaction problems (CSPs) are typically solved using conventional von Neumann computing architectures. However, these architectures do not reflect the distributed nature of many of these problems and are thus ill-suited to solving them. ... More

Cyclic Queuing and Forwarding for Large Scale Deterministic Networks: A SurveyMay 21 2019This paper provides a comprehensive survey of queueing and scheduling mechanisms for supporting large scale deterministic networks (LDNs). The survey finds that extensive mechanism design research and standards development for LDNs has been conducted ... More

Single-bit-per-weight deep convolutional neural networks without batch-normalization layers for embedded systemsJul 16 2019Batch-normalization (BN) layers are thought to be an integrally important layer type in today's state-of-the-art deep convolutional neural networks for computer vision tasks such as classification and detection. However, BN layers introduce complexity ... More

Semi-supervised Classification: Cluster and Label Approach using Particle Swarm OptimizationJun 03 2017Classification predicts classes of objects using the knowledge learned during the training phase. This process requires learning from labeled samples. However, the labeled samples usually limited. Annotation process is annoying, tedious, expensive, and ... More

Single-bit-per-weight deep convolutional neural networks without batch-normalization layers for embedded systemsJul 16 2019Jul 22 2019Batch-normalization (BN) layers are thought to be an integrally important layer type in today's state-of-the-art deep convolutional neural networks for computer vision tasks such as classification and detection. However, BN layers introduce complexity ... More

Using Network Coding to Achieve the Capacity of Deterministic Relay Networks with Relay MessagesApr 18 2014Apr 26 2014In this paper, we derive the capacity of the deterministic relay networks with relay messages. We consider a network which consists of five nodes, four of which can only communicate via the fifth one. However, the fifth node is not merely a relay as it ... More

Integrating UAVs into Existing Wireless Networks: A Stochastic Geometry ApproachOct 09 2018The integration of unmanned aerial vehicles (UAVs) into wireless networks has opened a new horizon to meet the capacity and coverage requirements foreseen in future wireless networks. Harnessing UAVs as flying base stations (BSs) has helped to achieve ... More

Can Uplink Transmissions Survive in Full-duplex Cellular Environments?Apr 09 2016In-band full-duplex (FD) communication is considered a potential candidate to be adopted by the fifth generation (5G) cellular networks. FD communication renders the entire spectrum simultaneously accessible by uplink and downlink, and hence, is optimistically ... More

Real-time Distracted Driver Posture ClassificationJun 28 2017Nov 29 2018In this paper, we present a new dataset for "distracted driver" posture estimation. In addition, we propose a novel system that achieves 95.98% driving posture estimation classification accuracy. The system consists of a genetically-weighted ensemble ... More

Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability AnalysisSep 17 2016The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, are natural ... More

Modeling Cellular Networks with Full Duplex D2D Communication: A Stochastic Geometry ApproachAug 22 2016Full-duplex (FD) communication is optimistically promoted to double the spectral efficiency if sufficient self-interference cancellation (SIC) is achieved. However, this is not true when deploying FD-communication in a large-scale setup due to the induced ... More

The MIMO Wireless Switch: Relaying Can Increase the Multiplexing GainJan 16 2009This paper considers an interference network composed of K half-duplex single-antenna pairs of users who wish to establish bi-directional communication with the aid of a multi-input-multi-output (MIMO) half-duplex relay node. This channel is referred ... More

A New Class of TAST Codes With A Simplified Tree StructureJan 19 2010Jan 21 2010We consider in this paper the design of full diversity and high rate space-time codes with moderate decoding complexity for arbitrary number of transmit and receive antennas and arbitrary input alphabets. We focus our attention to codes from the threaded ... More

Keys through ARQAug 01 2009This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses ... More

In-Band $α$-Duplex Scheme for Cellular Networks: A Stochastic Geometry ApproachSep 03 2015Jul 11 2016In-band full-duplex (FD) communications have been optimistically promoted to improve the spectrum utilization and efficiency. However, the penetration of FD communications to the cellular networks domain is challenging due to the imposed uplink/downlink ... More

In-Band Full-Duplex Communications for Cellular Networks with Partial Uplink/Downlink OverlapAug 12 2015Aug 25 2015In-band full-duplex (FD) communications have been optimistically promoted to improve the spectrum utilization in cellular networks. However, the explicit impact of spatial interference, imposed by FD communications, on uplink and downlink transmissions ... More

Delay Asymptotics with Retransmissions and Incremental Redundancy Codes over Erasure ChannelsFeb 20 2012Recent studies have shown that retransmissions can cause heavy-tailed transmission delays even when packet sizes are light-tailed. Moreover, the impact of heavy-tailed delays persists even when packets size are upper bounded. The key question we study ... More

Mobility-Aware Modeling and Analysis of Dense Cellular Networks with C-plane/U-plane Split ArchitectureJul 21 2016The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number of ... More

Fingerprinting with Minimum Distance DecodingOct 15 2007This work adopts an information theoretic framework for the design of collusion-resistant coding/decoding schemes for digital fingerprinting. More specifically, the minimum distance decision rule is used to identify 1 out of t pirates. Achievable rates, ... More

Handover Rate Characterization in 3D Ultra-Dense Heterogeneous NetworksJun 27 2018Ultra-dense networks (UDNs) envision the massive deployment of heterogenous base stations (BSs) to meet the desired traffic demands. Furthermore, UDNs are expected to support the diverse devices e.g., personal mobile devices and unmanned ariel vehicles. ... More

On the Efficiency-vs-Security Tradeoff in the Smart GridSep 09 2012The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage the delay tolerance of energy ... More

Towards Jointly Optimal Placement and Delivery: To Code or Not to Code in Wireless Caching NetworksFeb 12 2019Coded caching techniques have received significant attention lately due to their provable gains in reducing the cost of data delivery in wireless networks. These gains, however, have only been demonstrated under the assumption of a free placement phase. ... More

Secrecy Capacity of the Wiretap Channel with Noisy FeedbackOct 03 2007In this work, the role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is investigated. A model is considered in which the feed-forward and feedback signals share the same noisy channel. More specifically, a discrete memoryless ... More

Optimal Medium Access Control in Cognitive Radios: A Sequential Design ApproachJan 21 2008The design of medium access control protocols for a cognitive user wishing to opportunistically exploit frequency bands within parts of the radio spectrum having multiple bands is considered. In the scenario under consideration, the availability probability ... More

Cognitive Medium Access: Exploration, Exploitation and CompetitionOct 06 2007This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands in ... More

Randomization for Security in Half-Duplex Two-Way Gaussian ChannelsAug 26 2009This paper develops a new physical layer framework for secure two-way wireless communication in the presence of a passive eavesdropper, i.e., Eve. Our approach achieves perfect information theoretic secrecy via a novel randomized scheduling and power ... More

Hardware-efficient on-line learning through pipelined truncated-error backpropagation in binary-state networksJun 15 2017Aug 16 2017Artificial neural networks (ANNs) trained using backpropagation are powerful learning architectures that have achieved state-of-the-art performance in various benchmarks. Significant effort has been devoted to developing custom silicon devices to accelerate ... More

Interference Management with Partial Uplink/Downlink Spectrum OverlapNov 19 2015Simultaneous reuse of spectral resources by uplink and downlink, denoted as in-band full duplex (FD) communication, is promoted to double the spectral efficiency when compared to its half-duplex (HD) counterpart. Interference management, however, remains ... More

Tractable Stochastic Geometry Model for IoT Access in LTE NetworksJul 12 2016The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data ... More

Spatiotemporal Stochastic Modeling of IoT Enabled Cellular Networks: Scalability and Stability AnalysisSep 17 2016Oct 29 2016The Internet of Things (IoT) is large-scale by nature, which is manifested by the massive number of connected devices as well as their vast spatial existence. Cellular networks, which provide ubiquitous, reliable, and efficient wireless access, are natural ... More

On the Performance of Mobility-Aware D2D Caching NetworksMar 24 2019The increase in demand for spectrum-based services forms a bottleneck in wireless networks. Device-to-Device (D2D) caching networks tackle this problem by exploiting user's behavior predictability and the possibility of sharing data between them to alleviate ... More

Medical Image Retrieval Based On the Parallelization of the Cluster Sampling AlgorithmFeb 24 2017In this paper we develop parallel cluster sampling algorithms and show that a multi-chain version is embarrassingly parallel and can be used efficiently for medical image retrieval among other applications.

Optimal Medium Access Protocols for Cognitive Radio NetworksFeb 19 2008This paper focuses on the design of medium access control protocols for cognitive radio networks. The scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands within parts of the radio spectrum ... More

The Wiretap Channel with Feedback: Encryption over the ChannelApr 18 2007In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share ... More

ARQ Security in Wi-Fi and RFID NetworksOct 15 2010In this paper, we present two practical ARQ-Based security schemes for Wi-Fi and RFID networks. Our proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively. Both schemes build on the same idea; by exploiting ... More

Meta Distribution of Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson NetworksNov 06 2018We study the meta distribution (MD) of the coverage probability (CP) in downlink non-orthogonal-multiple-access (NOMA) networks. Two schemes are assessed based on the location of the NOMA users: 1) anywhere in the network, 2) cell-center users only. The ... More

On Secrecy Capacity Scaling in Wireless NetworksAug 06 2009Apr 10 2010This work studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities ... More

On the Delay Limited Secrecy Capacity of Fading ChannelsJan 19 2009May 01 2009In this paper, the delay limited secrecy capacity of the flat fading channel is investigated under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main ... More

Opportunistic Secrecy with a Strict Delay ConstraintJul 20 2009We investigate the delay limited secrecy capacity of the flat fading channel under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper ... More

On the Secrecy Capacity of Fading ChannelsOct 17 2006We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized ... More

TSN Algorithms for Large Scale Networks: A Survey and Conceptual ComparisonMay 21 2019Jun 19 2019This paper provides a comprehensive survey of queueing and scheduling mechanisms for supporting large scale deterministic networks (LDNs). The survey finds that extensive mechanism design research and standards development for LDNs has been conducted ... More

ARQ-Based Secret Key SharingOct 07 2008This paper develops a novel framework for sharing secret keys using existing Automatic Repeat reQuest (ARQ) protocols. Our approach exploits the multi-path nature of the wireless environment to hide the key from passive eavesdroppers. The proposed framework ... More

Authentication over Noisy ChannelsFeb 19 2008In this work, message authentication over noisy channels is studied. The model developed in this paper is the authentication theory counterpart of Wyner's wiretap channel model. Two types of opponent attacks, namely impersonation attacks and substitution ... More

On The Security of AoA EstimationJul 02 2016Angle of Arrival (AoA) estimation has found its way to a wide range of applications. Much attention have been paid to study different techniques for AoA estimation and its applications for jamming suppression, however, security vulnerability issues of ... More

End-to-End Deep Learning for Steering Autonomous Vehicles Considering Temporal DependenciesOct 10 2017Nov 22 2017Steering a car through traffic is a complex task that is difficult to cast into algorithms. Therefore, researchers turn to training artificial neural networks from front-facing camera data stream along with the associated steering angles. Nevertheless, ... More

Reconfiguration Algorithms for High Precision Communications in Time Sensitive Networks: Time-Aware Shaper Configuration with IEEE 802.1Qcc (Extended Version)Jun 27 2019As new networking paradigms emerge for different networking applications, e.g., cyber-physical systems, and different services are handled under a converged data link technology, e.g., Ethernet, certain applications with mission critical traffic cannot ... More

ARQ Diversity in Fading Random Access ChannelsOct 17 2006A cross-layer optimization approach is adopted for the design of symmetric random access wireless systems. Instead of the traditional collision model, a more realistic physical layer model is considered. Based on this model, an Incremental Redundancy ... More

On the Error Exponents of ARQ Channels with DeadlinesOct 18 2006We consider communication over Automatic Repeat reQuest (ARQ) memoryless channels with deadlines. In particular, an upper bound L is imposed on the maximum number of ARQ transmission rounds. In this setup, it is shown that incremental redundancy ARQ outperforms ... More

Caching to the Sky: Performance Analysis of Cache-Assisted CoMP for Cellular-Connected UAVsNov 24 2018Providing connectivity to aerial users, such as cellular-connected unmanned aerial vehicles (UAVs) or flying taxis, is a key challenge for tomorrow's cellular systems. In this paper, the use of coordinated multi-point (CoMP) transmission along with caching ... More

Interference Management in NOMA-based Fog-Radio Access Networks via Joint Scheduling and Power AdaptationFeb 27 2019Non-Orthogonal Multiple Access (NOMA) and Fog Radio Access Networks (FRAN) are promising candidates within the 5G and beyond systems. This work examines the benefit of adopting NOMA in an FRAN architecture with constrained capacity fronthaul. The paper ... More

A Diversity-Multiplexing-Delay Tradeoff of ARQ Protocols in The Z-interference ChannelFeb 08 2012Apr 03 2012In this work, we analyze the fundamental performance tradeoff of the single-antenna Automatic Retransmission reQuest (ARQ) Z-interference channel (ZIC). Specifically, we characterize the achievable three-dimensional tradeoff between diversity (reliability), ... More

Spatiotemporal Model for Uplink IoT Traffic: Scheduling & Random Access ParadoxOct 12 2018The Internet-of-things (IoT) is the paradigm where anything will be connected. There are two main approaches to handle the surge in the uplink (UL) traffic the IoT is expected to generate, namely, Scheduled UL (SC-UL) and random access uplink (RA-UL) ... More