By Topic

2013 Asilomar Conference on Signals, Systems and Computers

Date 3-6 Nov. 2013

Filter Results

Displaying Results 1 - 25 of 492
  • [Front cover]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (253 KB)
    Freely Available from IEEE
  • Student paper contest finalists

    Publication Year: 2013, Page(s): xxxv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2013, Page(s): xxxvi
    Request permission for commercial reuse | PDF file iconPDF (134 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session MA1b: Full-duplex MIMO communications I [breaker page]

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Advanced self-interference cancellation and multiantenna techniques for full-duplex radios

    Publication Year: 2013, Page(s):3 - 8
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    In an in-band full-duplex system, radios transmit and receive simultaneously in the same frequency band at the same time, providing a radical improvement in spectral efficiency over a half-duplex system. However, in order to design such a system, it is necessary to mitigate the self-interference due to simultaneous transmission and reception, which seriously limits the maximum transmit power of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of channel estimation errors on in-band full-duplex MIMO radios using adaptive transmit spatial mitigation

    Publication Year: 2013, Page(s):9 - 13
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    In-band (cochannel) full-duplex multiple-Input multiple-output (MIMO) radios employ independent transmit and receive antenna arrays to enable simultaneous transmission and reception. One of the most significant challenges is the mitigation of the radio's self-interference. While there are numerous issues, such as dynamic range, that limit the ability of the radio to mitigate the interference, in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On uplink/downlink full-duplex networks

    Publication Year: 2013, Page(s):14 - 18
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Recent results in wireless full-duplex promise rate gains over the half-duplex counterpart when two nodes exchange messages with each other. However, when multiple full-duplex nodes operate simultaneously, the resulting network has increased internode interference compared to the half-duplex counterpart. The increased internode interference can potentially limit the rate gain achievable due to int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmit antenna-switched receive diversity for bi-directional beamforming in two-way communications

    Publication Year: 2013, Page(s):19 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    This paper investigates an attempt to improve reliability in two-way communication through the bi-directional use of spatial resources when time selectivity exists and instantaneous channel information is not available at the transmitter. The system, which uses spatial resources bi-directionally and employs beamforming, is called a `bi-directional beamforming (BBF)' system. The use of full bandwid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA2b: Stochastic optimization in control and wireless communications [breaker page]

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Enhancing the delay performance of dynamic backpressure algorithms

    Publication Year: 2013, Page(s):27 - 31
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    The backpressure algorithm for dynamic network resource allocation achieves throughput optimality by making use of one-hop queue length differences. This elegant algorithm, on the other hand, does not yield good delay performance in general. We introduce a new class of enhanced dynamic backpressure algorithms which make use of a general queue-dependent bias function to exploit queue state informat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of estimation and communication tradeoff using an event-based approach

    Publication Year: 2013, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    In this paper, we consider estimating the state of a linear time-invariant system over a network subject to limited sensor communications. A sensor locally computes the state estimate for the system from its observations and send it to a remote estimator under the constraint that the total transmission times are no more than a pre-specified value. The sensor needs to decide when to send the local ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA3b: Applications of single processing in financial engieering [breaker page]

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • ARCH modeling in the presence of missing data

    Publication Year: 2013, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    The problem of estimating an autoregressive conditionally heteroscedastic (ARCH) model in the presence of missing data is investigated. A two-stage least squares estimator which is easy to calculate is proposed and its strong consistency and asymptotic normality are established. The behaviour of the estimator for finite samples is analyzed via Monte Carlo simulations, and is compared to a Yule-Wal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust order execution under box uncertainty sets

    Publication Year: 2013, Page(s):44 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5436 KB) | HTML iconHTML

    Order execution for algorithmic trading has been studied in the literature as a means of determining the optimal strategy by minimizing a trade-off between expected execution cost and risk. However, the variance has been recognized not to be practical since it is a symmetric measure of risk and, hence, penalizes the low-cost events. In this paper, we propose the use of the conditional value-at-ris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA4b: Networking with physical layer security [breaker page]

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Guessing a password over a wireless channel (on the effect of noise non-uniformity)

    Publication Year: 2013, Page(s):51 - 55
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    A string is sent over a noisy channel that erases some of its characters. Knowing the statistical properties of the string's source and which characters were erased, a listener that is equipped with an ability to test the veracity of a string, one string at a time, wishes to fill in the missing pieces. Here we characterize the influence of the stochastic properties of both the string's source and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key generation through two-way relay channels under active attacks

    Publication Year: 2013, Page(s):56 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Most of the existing work on key generation from wireless fading channels requires a direct wireless link between legitimate users so that they can obtain correlated observations from the common wireless link. Furthermore, most of the existing work assumes that the attacker is passive. This paper studies the key generation problem in the two-way relay channel, in which there is no direct channel b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An information theoretic approach to RF fingerprinting

    Publication Year: 2013, Page(s):61 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from legitimate nodes. We provide a systematic approach rooted from information theory to understand basic performance limits of RF fingerprinting. We develop a novel channel model to cover RF fingerprinting systems, where the imperfections in the RF chai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA5b: Wireless healthcare [breaker page]

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • A unified framework for energy efficient physical activity tracking

    Publication Year: 2013, Page(s):69 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    A unified framework of joint state tracking and control design is proposed for energy-efficient physical activity tracking in heterogeneous Wireless Body Area Networks (WBANs). The objective is to devise sensor selection strategies for the WBAN's fusion center to optimize the trade-off between tracking performance and energy consumption. Our recently proposed Kalman-like estimator is employed for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.