# IEEE Transactions on Communications

## Filter Results

Displaying Results 1 - 25 of 39

Publication Year: 2014, Page(s):C1 - C4
| |PDF (95 KB)
• ### IEEE Transactions on Communications publication information

Publication Year: 2014, Page(s): C2
| |PDF (151 KB)
• ### Sequentially-Constructible Reversible Variable Length Codes

Publication Year: 2014, Page(s):2605 - 2614
Cited by:  Papers (1)
| |PDF (993 KB) | HTML

Dominant codelength sequences for reversible variable length codes (RVLCs) have been recently introduced and studied as a means to looking into optimal RVLCs. However, obtaining the dominant sequences for RVLCs is computationally challenging. In this paper, we consider a special subset of all RVLCs, namely, the sequentially-constructible (SC) RVLCs, for which the dominant sequences can be obtained... View full abstract»

• ### On Decoding of the (73, 37, 13) Quadratic Residue Code

Publication Year: 2014, Page(s):2615 - 2625
| |PDF (1717 KB) | HTML

In this paper, a method to search the set of syndromes' indices needed in computing the unknown syndromes for the (73, 37, 13) quadratic residue (QR) code is proposed. According to the resulting index sets, one computes the unknown syndromes and thus finds the corresponding error-locator polynomial by using an inverse-free Berlekamp-Massey (BM) algorithm. Based on the modified Chase-II algorithm, ... View full abstract»

• ### Algebraic Quasi-Cyclic LDPC Codes: Construction, Low Error-Floor, Large Girth and a Reduced-Complexity Decoding Scheme

Publication Year: 2014, Page(s):2626 - 2637
Cited by:  Papers (28)
| |PDF (1297 KB) | HTML

This paper presents a simple and very flexible method for constructing quasi-cyclic (QC) low density paritycheck (LDPC) codes based on finite fields. The code construction is based on two arbitrary subsets of elements from a given field. Some well known constructions of QC-LDPC codes based on finite fields and combinatorial designs are special cases of the proposed construction. The proposed const... View full abstract»

• ### Polar Coding for Fading Channels: Binary and Exponential Channel Cases

Publication Year: 2014, Page(s):2638 - 2650
Cited by:  Papers (9)
| |PDF (1151 KB) | HTML

This work presents a polar coding scheme for fading channels, focusing primarily on fading binary symmetric and additive exponential noise channels. For fading binary symmetric channels, a hierarchical coding scheme is presented, utilizing polar coding both over channel uses and over fading blocks. The receiver uses its channel state information (CSI) to distinguish states, thus constructing an ov... View full abstract»

• ### Cooperative Spectrum Sharing in Cognitive Radio Networks: A Distributed Matching Approach

Publication Year: 2014, Page(s):2651 - 2664
Cited by:  Papers (32)
| |PDF (1386 KB) | HTML

We study the relay-based communication schemes for cooperative spectrum sharing among multiple primary users (PUs) and multiple secondary users (SUs) with incomplete information. Inspired by the matching theory, we model the network as a matching market. In this market, each PU proposes a certain proposal representing a combination of relay power and spectrum access time to attract the SUs, while ... View full abstract»

• ### Spectrum Sensing for Cognitive Radios in Time-Variant Flat-Fading Channels: A Joint Estimation Approach

Publication Year: 2014, Page(s):2665 - 2680
Cited by:  Papers (22)
| |PDF (1440 KB) | HTML

Most of the existing spectrum sensing schemes utilize only the statistical property of fading channels, which unfortunately fails to cope with the time-varying fading channel that has disastrous effects on sensing performance. As a consequence, such sensing schemes may not be applicable to distributed cognitive radio networks. In this paper, we develop a promising spectrum sensing algorithm for ti... View full abstract»

• ### Optimized Spoofing and Jamming a Cognitive Radio

Publication Year: 2014, Page(s):2681 - 2695
Cited by:  Papers (4)
| |PDF (1076 KB) | HTML

We examine the performance of a cognitive radio system in a hostile environment where an intelligent adversary tries to disrupt communications by minimizing the system throughput. We investigate the optimal strategy for spoofing and jamming a cognitive radio network with a Gaussian noise signal over a Rayleigh fading channel. We analyze a cluster-based network of secondary users (SUs). The adversa... View full abstract»

• ### Optimal Sequential Channel Estimation and Probing for Multiband Cognitive Radio Systems

Publication Year: 2014, Page(s):2696 - 2708
Cited by:  Papers (1)
| |PDF (930 KB) | HTML

In this paper, we propose a novel sequential channel estimation approach for multiband cognitive radio (CR) systems. We introduce a general model and test two scenarios of practical interest. The two scenarios are as follows: 1) CR users optimally estimate all the available bands; and 2) CR users find one good channel with a large gain. In particular, we use a sequential search in which the CR use... View full abstract»

• ### Interference-Constrained Optimal Power-Adaptive Amplify-and-Forward Relaying and Selection for Underlay Cognitive Radios

Publication Year: 2014, Page(s):2709 - 2720
Cited by:  Papers (6)
| |PDF (798 KB) | HTML

In an underlay cognitive radio (CR) system, a secondary user can transmit when the primary is transmitting but is subject to tight constraints on the interference it causes to the primary receiver. Amplify-and-forward (AF) relaying is an effective technique that significantly improves the performance of a CR by providing an alternate path for the secondary transmitter's signal to reach the seconda... View full abstract»

• ### Asymptotic Analysis on Throughput and Delay in Cognitive Social Networks

Publication Year: 2014, Page(s):2721 - 2732
Cited by:  Papers (3)
| |PDF (1130 KB) | HTML

In this paper, we study the throughput and delay in wireless cognitive social networks. Specifically, we consider a common scenario for cognitive radio networks (CRNs) where the primary and secondary networks operate at the same time and space and share the spectrum. On this basis, we integrate a social relationship into the CRN where each source node selects its destination upon a rank-based mode... View full abstract»

• ### Performance Analysis of Relay-Based Cooperative Spectrum Sensing in Cognitive Radio Networks Over Non-Identical Nakagami- $m$ Channels

Publication Year: 2014, Page(s):2733 - 2746
Cited by:  Papers (6)
| |PDF (1026 KB) | HTML

This paper provides performance analysis of relay-based cognitive radio (CR) networks and presents a detect-amplify-and-forward (DAF) relaying strategy for cooperative spectrum sensing over non-identical Nakagami-m fading channels. An advanced statistical approach is introduced to derive new exact closed-form expressions for average false alarm probability and average detection probability. We als... View full abstract»

• ### Outage Performance Analysis of Imperfect-CSI-Based Selection Cooperation in Random Networks

Publication Year: 2014, Page(s):2747 - 2757
Cited by:  Papers (10)
| |PDF (1020 KB) | HTML

Selection of relays is central to efficient utilization of cooperative diversity gains when multiple relays are available in the network. Such selection is generally based on some form of channel state information (CSI), which is always imperfect in practice. The effects of using imperfect CSI in a relay selection process have been generally considered in existing literature without the account fo... View full abstract»

• ### An Optimal Full-Duplex AF Relay for Joint Analog and Digital Domain Self-Interference Cancellation

Publication Year: 2014, Page(s):2758 - 2772
Cited by:  Papers (15)
| |PDF (583 KB) | HTML

In this paper, a full-duplex (FD) amplify-and-forward (AF) relay is designed to compensate for the duplexing loss of the half-duplex (HD) AF relay. In particular, when there is no direct link between a source and a destination, joint analog domain self-interference suppression and digital domain residual self-interference cancellation is considered with an FD-AF relay having single receive antenna... View full abstract»

• ### Two Time-Scale Cross-Layer Scheduling for Cellular/WLAN Interworking

Publication Year: 2014, Page(s):2773 - 2789
Cited by:  Papers (8)
| |PDF (1352 KB) | HTML

In this paper, we investigate uplink resource allocation for wireless local area network and cellular network interworking to provide multi-homing voice and data services. The problem is formulated based on the physical layer and medium access control layer technologies of the two networks to ensure that the resource allocation decisions are feasible and can be executed at the lower layers. Furthe... View full abstract»

• ### Robust Linear Video Transmission Over Rayleigh Fading Channel

Publication Year: 2014, Page(s):2790 - 2801
Cited by:  Papers (5)
| |PDF (873 KB) | HTML

This research addresses the problem of robust linear video transmission over the Rayleigh fading channel, where only statistical channel state information (CSI) is available to the sender. We observe that discarding low-priority (LP) data and saving the channel uses for high-priority (HP) data can significantly improve the quality of the received video. We formulate an optimization problem that ai... View full abstract»

• ### A Spectral Approach to Inter-Carrier Interference Mitigation in OFDM Systems

Publication Year: 2014, Page(s):2802 - 2811
Cited by:  Papers (5)
| |PDF (1295 KB) | HTML

In this paper, we propose a new method for intercarrier interference (ICI) mitigation in orthogonal frequency-division multiplexing (OFDM) systems. The proposed approach views the signal reconstruction problem at the receiver end as an integer least squares (ILS) problem, and uses a recently developed spectral approach called sequential probabilistic ILS (SPILS) to solve it. The proposed approach ... View full abstract»

• ### Characterization of the Pareto Boundary for the Two-User Symmetric Gaussian InterferenceChannel

Publication Year: 2014, Page(s):2812 - 2824
Cited by:  Papers (2)
| |PDF (1117 KB) | HTML

We characterize the Pareto boundary of the achievable rate region of the two-user symmetric Gaussian interference channel when transmitters control their transmission power and receivers have successive interference cancellation capability. By identifying the shape of achievable rate region according to the strength of interference channels, we find combinations of decoding and power allocation st... View full abstract»

• ### Performance of Multiantenna Linear MMSE Receivers in Doubly Stochastic Networks

Publication Year: 2014, Page(s):2825 - 2839
| |PDF (988 KB) | HTML

A technique is presented to characterize the signal-to-interference-plus-noise ratio (SINR) of a representative link with a multiantenna linear minimum-mean-square-error receiver in a wireless network with transmitting nodes distributed according to a doubly stochastic process, which is a generalization of the Poisson point process. The cumulative distribution function of the SINR of the represent... View full abstract»

• ### Expectation Propagation Detection for High-Order High-Dimensional MIMO Systems

Publication Year: 2014, Page(s):2840 - 2849
Cited by:  Papers (10)
| |PDF (1475 KB) | HTML

Modern communications systems use multiple-input multiple-output (MIMO) and high-order QAM constellations for maximizing spectral efficiency. However, as the number of antennas and the order of the constellation grow, the design of efficient and low-complexity MIMO receivers possesses big technical challenges. For example, symbol detection can no longer rely on maximum likelihood detection or sphe... View full abstract»

• ### Blind Interference Alignment With Diversity in $K$-User Interference Channels

Publication Year: 2014, Page(s):2850 - 2859
Cited by:  Papers (22)
| |PDF (1138 KB) | HTML

In this paper, we propose blind interference alignment (BIA) schemes using reconfigurable antenna technology to achieve high degree of freedom (DoF) or diversity gain in K-user interference channels. First, two DoF-oriented BIA schemes are proposed that fully and partially align the inter-user interference, respectively. We compare the achievable DoF of the two schemes and show that the partial BI... View full abstract»

• ### A Mathematical Framework to the Computation of the Error Probability of Downlink MIMO Cellular Networks by Using Stochastic Geometry

Publication Year: 2014, Page(s):2860 - 2879
Cited by:  Papers (33)
| |PDF (2173 KB) | HTML

In this paper, a mathematical framework to the computation of the error probability of downlink cellular networks is introduced. It is based on the Poisson point process (PPP)-based abstraction for modeling the spatial locations of the base stations (BSs), and it exploits results from stochastic geometry for characterizing the distribution of the other-cell interference. The framework is applicabl... View full abstract»

• ### On the Achievable Degrees of Freedom of Two-Cell Multiuser MIMO Interference Networks

Publication Year: 2014, Page(s):2880 - 2893
Cited by:  Papers (3)
| |PDF (1398 KB) | HTML

In this paper, we study the sum degrees of freedom (DoF) of an uplink two-cell multiuser MIMO interference network with asymmetric number of users in the cells. The achievable DoF is devised based on a two-dimensional space-time spreading code framework with linear precoding/decoding design and finite channel extension. The derivation of the achievable DoF is shown related to a rank minimization p... View full abstract»

• ### Degrees of Freedom for the Constant MIMO Interference Channel With CoMP Transmission

Publication Year: 2014, Page(s):2894 - 2904
| |PDF (1158 KB) | HTML

The multiple-input-multiple-output (MIMO) interference channel (IC) is considered with constant channel coefficients, N transmit and receive antennas at each user, and coordinated multipoint (CoMP) transmission, in which each message is jointly transmitted by Mt successive transmitters. It is shown that the degrees of freedom with CoMP transmission using a two-stage scheme involving both zero forc... View full abstract»

## Aims & Scope

IEEE Transactions on Communications focuses on all telecommunications including telephone, telegraphy, facsimile, and point-to-point television by electromagnetic propagation.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Naofal Al-Dhahir
University of Texas at Dallas