Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Signals, Systems and Computers, 2013 Asilomar Conference on

Date 3-6 Nov. 2013

Filter Results

Displaying Results 1 - 25 of 492
  • [Front cover]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (55 KB)  
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (53 KB)  
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (99 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (65 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013 , Page(s): v - xxxiv
    Save to Project icon | Request Permissions | PDF file iconPDF (253 KB)  
    Freely Available from IEEE
  • Student paper contest finalists

    Publication Year: 2013 , Page(s): xxxv
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • Foreword

    Publication Year: 2013 , Page(s): xxxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (134 KB)  
    Freely Available from IEEE
  • Session MA1b: Full-duplex MIMO communications I [breaker page]

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Advanced self-interference cancellation and multiantenna techniques for full-duplex radios

    Publication Year: 2013 , Page(s): 3 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    In an in-band full-duplex system, radios transmit and receive simultaneously in the same frequency band at the same time, providing a radical improvement in spectral efficiency over a half-duplex system. However, in order to design such a system, it is necessary to mitigate the self-interference due to simultaneous transmission and reception, which seriously limits the maximum transmit power of the full-duplex device. Especially, large differences in power levels in the receiver front-end sets stringent requirements for the linearity of the transceiver electronics. We present an advanced architecture for a compact full-duplex multiantenna transceiver combining antenna design with analog and digital cancellation, including both linear and nonlinear signal processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of channel estimation errors on in-band full-duplex MIMO radios using adaptive transmit spatial mitigation

    Publication Year: 2013 , Page(s): 9 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (477 KB) |  | HTML iconHTML  

    In-band (cochannel) full-duplex multiple-Input multiple-output (MIMO) radios employ independent transmit and receive antenna arrays to enable simultaneous transmission and reception. One of the most significant challenges is the mitigation of the radio's self-interference. While there are numerous issues, such as dynamic range, that limit the ability of the radio to mitigate the interference, in this paper effects associated with self-interference channel estimation are considered. In this paper, adaptive transmit processing is used to protect the radio's receive antenna array from self-interference. We develop bounds on post-mitigation self-interference residual to provide guidance on the amount of training required to effectively remove channel estimation as a limiting concern. To allow extending the system dynamic range beyond the dynamic range of the receiver, we consider using a training signal that is lower in transmit power than the data signal. As a specific example, the three-node relay problem is explored. Simulation results are presented to demonstrate the validity of the bound. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On uplink/downlink full-duplex networks

    Publication Year: 2013 , Page(s): 14 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (163 KB) |  | HTML iconHTML  

    Recent results in wireless full-duplex promise rate gains over the half-duplex counterpart when two nodes exchange messages with each other. However, when multiple full-duplex nodes operate simultaneously, the resulting network has increased internode interference compared to the half-duplex counterpart. The increased internode interference can potentially limit the rate gain achievable due to introduction of full-duplex capability. In this paper, we present new interference management strategies tha handle internode interference for full-duplex enabled network and achieve rate gains over its half-duplex counterpart. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmit antenna-switched receive diversity for bi-directional beamforming in two-way communications

    Publication Year: 2013 , Page(s): 19 - 23
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    This paper investigates an attempt to improve reliability in two-way communication through the bi-directional use of spatial resources when time selectivity exists and instantaneous channel information is not available at the transmitter. The system, which uses spatial resources bi-directionally and employs beamforming, is called a `bi-directional beamforming (BBF)' system. The use of full bandwidth and the reciprocity between time and frequency allow the BBF system to reduce the symbol duration. Focusing on this reduction in symbol duration, we propose a transmit antenna-switched receive diversity for BBF (TAS-BBF) scheme designed to improve reliability in time selective environments. The resulting TAS-BBF scheme with N antennas can achieve diversity order of 2(N-1) in fast fading environments without channel state information at the transmitter, whereas conventional schemes are only able to achieve a diversity order of N in this environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA2b: Stochastic optimization in control and wireless communications [breaker page]

    Publication Year: 2013 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • Enhancing the delay performance of dynamic backpressure algorithms

    Publication Year: 2013 , Page(s): 27 - 31
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    The backpressure algorithm for dynamic network resource allocation achieves throughput optimality by making use of one-hop queue length differences. This elegant algorithm, on the other hand, does not yield good delay performance in general. We introduce a new class of enhanced dynamic backpressure algorithms which make use of a general queue-dependent bias function to exploit queue state information beyond one hop. We prove the throughput optimality of the enhanced algorithms. We further elaborate on two specific algorithms within this class, which have demonstrably improved delay performance while maintaining acceptable implementation complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of estimation and communication tradeoff using an event-based approach

    Publication Year: 2013 , Page(s): 32 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (194 KB) |  | HTML iconHTML  

    In this paper, we consider estimating the state of a linear time-invariant system over a network subject to limited sensor communications. A sensor locally computes the state estimate for the system from its observations and send it to a remote estimator under the constraint that the total transmission times are no more than a pre-specified value. The sensor needs to decide when to send the local estimate in order to minimize the average estimation error covariance at the remote estimator. Offline scheduling and online scheduling policies are two typical solutions. The main contribution of this paper is that we propose a novel form of hybrid scheduling policies, which combine the two conventional ones and demonstrate that the estimator performance is improved when compared with the optimal offline schedule while the computation complexity is reduced when compared with the optimal online schedule. Therefore, the proposed schedules provide a trade-off between the two classic approaches in terms of estimation quality and computation complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA3b: Applications of single processing in financial engieering [breaker page]

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • ARCH modeling in the presence of missing data

    Publication Year: 2013 , Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB) |  | HTML iconHTML  

    The problem of estimating an autoregressive conditionally heteroscedastic (ARCH) model in the presence of missing data is investigated. A two-stage least squares estimator which is easy to calculate is proposed and its strong consistency and asymptotic normality are established. The behaviour of the estimator for finite samples is analyzed via Monte Carlo simulations, and is compared to a Yule-Walker estimator and to some estimators based on a complete data set obtained after filling the missing observations by imputation procedures. An application to real data is also reported. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust order execution under box uncertainty sets

    Publication Year: 2013 , Page(s): 44 - 48
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5436 KB) |  | HTML iconHTML  

    Order execution for algorithmic trading has been studied in the literature as a means of determining the optimal strategy by minimizing a trade-off between expected execution cost and risk. However, the variance has been recognized not to be practical since it is a symmetric measure of risk and, hence, penalizes the low-cost events. In this paper, we propose the use of the conditional value-at-risk (CVaR) of the execution cost as risk measure for the multiple assets case order execution problem. In addition, for the particular box-type parameter estimation errors, we extend both the existing mean-variance approach and our proposed CVaR approach to their robust designs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA4b: Networking with physical layer security [breaker page]

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (60 KB)  
    Freely Available from IEEE
  • Guessing a password over a wireless channel (on the effect of noise non-uniformity)

    Publication Year: 2013 , Page(s): 51 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (151 KB) |  | HTML iconHTML  

    A string is sent over a noisy channel that erases some of its characters. Knowing the statistical properties of the string's source and which characters were erased, a listener that is equipped with an ability to test the veracity of a string, one string at a time, wishes to fill in the missing pieces. Here we characterize the influence of the stochastic properties of both the string's source and the noise on the channel on the distribution of the number of attempts required to identify the string, its guesswork. In particular, we establish that the average noise on the channel is not a determining factor for the average guesswork and illustrate simple settings where one recipient with, on average, a better channel than another recipient, has higher average guesswork. These results stand in contrast to those for the capacity of wiretap channels and suggest the use of techniques such as friendly jamming with pseudo-random sequences to exploit this guesswork behavior. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key generation through two-way relay channels under active attacks

    Publication Year: 2013 , Page(s): 56 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (211 KB) |  | HTML iconHTML  

    Most of the existing work on key generation from wireless fading channels requires a direct wireless link between legitimate users so that they can obtain correlated observations from the common wireless link. Furthermore, most of the existing work assumes that the attacker is passive. This paper studies the key generation problem in the two-way relay channel, in which there is no direct channel between the key generating terminals, under active attacks. We propose an effective key generation scheme. We also investigate the effects of the active attacker on the proposed key generation protocol. We characterize the optimal attacker's strategy that minimizes the key rate of the proposed scheme. Furthermore, we establish the maximal attacker's power under which our scheme can still achieve a non-zero key rate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An information theoretic approach to RF fingerprinting

    Publication Year: 2013 , Page(s): 61 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from legitimate nodes. We provide a systematic approach rooted from information theory to understand basic performance limits of RF fingerprinting. We develop a novel channel model to cover RF fingerprinting systems, where the imperfections in the RF chain are modeled as a fingerprint channel, cascaded to the physical channel. We analyze authentication problem in the presence of an adversary, where both the legitimate transmitter and the adversary are equipped with unique fingerprint channels. We provide bounds for the error exponents of the legitimate nodes, and the success exponent of the adversary, as a function of their fingerprints. We illustrate that concepts analogous to Maurer's simulatability are necessary to guarantee authentication via RF fingerprints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session MA5b: Wireless healthcare [breaker page]

    Publication Year: 2013 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • A unified framework for energy efficient physical activity tracking

    Publication Year: 2013 , Page(s): 69 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (175 KB) |  | HTML iconHTML  

    A unified framework of joint state tracking and control design is proposed for energy-efficient physical activity tracking in heterogeneous Wireless Body Area Networks (WBANs). The objective is to devise sensor selection strategies for the WBAN's fusion center to optimize the trade-off between tracking performance and energy consumption. Our recently proposed Kalman-like estimator is employed for state tracking. The associated mean-squared error and an appropriate energy consumption metric are used in a partially observable Markov decision process formulation to derive the optimal selection strategy. A low-complexity suboptimal strategy is also proposed. Numerical results are provided using real WBAN experimental data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.