On Self-interference Suppression Methods for Low-complexity Full-duplex MIMO
Related publications (36)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We address the problem of prioritized video streaming over lossy overlay networks. We propose to exploit network path diversity via a novel Randomized Network Coding (RNC) approach that provides unequal error protection (UEP) to the packets conveying the v ...
Non-coherent energy-detection receivers are an attractive choice for IEEE 802.15.4a networks. They can exploit the ranging capabilities and the multipath resistance of impulse-radio ultra-wide band (IR-UWB) at a low complexity. However, IEEE 802.15.4a rece ...
We consider networks of impulse-radio ultra-wide band (IR-UWB) devices. We are interested in the architecture, design, and performance evaluation of these networks in a low data-rate, self-organized, and multi-hop setting. IR-UWB is a potential physical la ...
The design of efficient IEEE 802.11 physical (PHY) rate adaptation algorithms is a challenging research topic and usually the issues surrounding their implementations on real 802.11 devices are not disclosed. In this paper, we identify and evaluate the key ...
The application of the reconfigurable reflectarray structure to software-defined and cognitive radio is discussed for the first time. The main idea is that the reflectarray has the potential-in addition to dynamical beamforming-of simultaneous frequency an ...
IEEE Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, NJ 08855-1331 USA2010
In this letter, we introduce a novel method for constructing large size generalized Welch bound equality (GWBE) matrices. This method can also be used for the construction of large WBE matrices. The advantage of this method is its low complexity for constr ...
Institute of Electrical and Electronics Engineers2010
This paper addresses the problem of distortion modeling for video transmission over burst-loss channels characterized by a finite state Markov chain. A Distortion Trellis model is pro- posed, enabling us to estimate at the frame level the expected mean-squ ...
In handsfree tele or video conferencing acoustic echoes arise due to the coupling between the loudspeaker and microphone. Usually an acoustic echo canceler (AEC) is used for eliminating the undesired echoes. The weaknesses of AEC are that it is relatively ...
We consider a wide-band ad-hoc network with coherent radios in a slow-fading environment, and we analyze the performance of different physical layer (PHY) and medium access (MAC) schemes in such a network. Most of the existing analysis assume that PHY is b ...
We present a minimum spanning tree based energy aware multicast protocol (MSTEAM), which is a localized geographic multicast routing scheme designed for ad hoc and sensor networks. It uses locally-built minimum spanning trees (MST) as an efficient approxim ...