Information theory has long pointed to the promise of physical layer cooperation in boosting the spectral efficiency of wireless networks. Yet, the optimum relaying strategy to achieve the network capacity has till date remained elusive. Recently however, ...
In this thesis, I investigate wireless communication from an architectural perspective. I am using design prototypes to explore possibilities for interaction and designing with wirelessness in mind. The public primarily regards wireless networking technolo ...
This study addresses the problem of profit maximization between wireless service providers (WSPs) and content providers (CPs) in wireless broadcasting systems, while simultaneously providing high quality of experience for end-users (EUs). We first study th ...
The topology of a mobile wireless network changes over time. Maintaining routes between all nodes requires the continuous transmission of control information, which consumes precious power and bandwidth resources. Many routing protocols have been developed ...
In this dissertation, we consider the problem of assigning spectrum to wireless local-area networks (WLANs). In line with recent IEEE 802.11 amendments and newer hardware capabilities, we consider situations where wireless nodes have the ability to adapt n ...
The advent of wireless communication technologies has created a paradigm shift in the accessibility of communication. With it has come an increased demand for throughput, a trend that is likely to increase further in the future. A key aspect of these chall ...
Compute-and-Forward (CF), also known as reliable physical layer network coding, is a technique that provides the possibility of exploiting the features of broadcast and superposition in wireless networks. It has been shown that the throughput for multiple ...
Institute of Electrical and Electronics Engineers2014
Mobile devices and wireless networks have a prominent place in our interaction with the environment and with each other. Like every new technology, it has been a subject to inflated expectations. Scholars, writers, artists and architects have explored how ...
The method of the invention, comprising at the user side: a) checking if the load of a first gateway to which a user terminal device is wirelessly connected, falls below a given low load threshold; b) if said first gateway load has fallen below said given ...
We analyze symmetric protocols to rationally coordinate on an asymmetric, efficient allocation in an infinitely repeated N-agent, C-resource allocation problems, where the resources are all homogeneous. Bhaskar proposed one way to achieve this in 2-agent, ...