# IEEE Communications Letters

## Filter Results

Displaying Results 1 - 25 of 51

Publication Year: 2014, Page(s):C1 - C2
| PDF (105 KB)
• ### IEEE Communications Letters publication information

Publication Year: 2014, Page(s): C2
| PDF (131 KB)
• ### Least Maintenance Batch Scheduling in Cloud Data Center Networks

Publication Year: 2014, Page(s):901 - 904
| | PDF (477 KB) | HTML

Nowadays, to efficiently safeguard the uptime of data centers, system-scale preventive maintenance is necessary. If all servers are under maintenance at the same time, it will completely disrupt the service continuity of all virtual machines that run over servers, thus it necessitates the proposition of an appropriate multi-batch scheme in which during each batch only a partial set of servers are ... View full abstract»

• ### On Optimum Decoding of Certain Product Codes

Publication Year: 2014, Page(s):905 - 908
Cited by:  Papers (3)
| | PDF (346 KB) | HTML

Optimum decoding of a class of product codes is investigated. The class is the one given by the serial concatenation of a binary single-parity-check code with a low-dimension binary linear block code. It was proved by Wolf that maximum likelihood decoding for this class of product codes can be efficiently performed through the Viterbi algorithm over a compact trellis representation of the code. In... View full abstract»

• ### PLC Performance Analysis Assuming BPSK Modulation Over Nakagami- $m$ Additive Noise

Publication Year: 2014, Page(s):909 - 912
Cited by:  Papers (20)
| | PDF (171 KB) | HTML

In this letter, we derive a maximum likelihood receiver of binary phase shift keying signals over Nakagami-m distributed additive noise in power line communication system. The decision variable is characterized by using copula approach. The analytical average bit error rate of the considered scheme is numerically evaluated by using the cumulative distribution function of the decision variable. It ... View full abstract»

• ### On the Use of Photon Arrival-Times for Non-Line-of-Sight Solar-Blind UV Channels

Publication Year: 2014, Page(s):913 - 916
Cited by:  Papers (1)
| | PDF (526 KB) | HTML

A non-line-of-sight (NLOS) solar-blind UV link can be modelled as a stochastic photon-limited channel with memory. There are two fundamental observations for the received photons: their instantaneous arrival times and their counts during one channel use. In this letter, we compare achievable information rates for NLOS channels with these observables under uniform, binary-input rectangular on-off k... View full abstract»

• ### Universal Encoding Scheme for General Zig-Zag Network

Publication Year: 2014, Page(s):917 - 920
| | PDF (224 KB) | HTML

In recent works, authors discussed upper bound for unequal capacity network called zig-zag network. It shows that there are several variants of upper bounds starting from cut set bound according to topology of the zig-zag network. We propose an universal coding structure, on which the same detection and decoding strategy can be applied to achieve any particular variants of cut set bound. View full abstract»

• ### Topology Inference With Network Tomography Based on t-Test

Publication Year: 2014, Page(s):921 - 924
Cited by:  Papers (5)
| | PDF (272 KB) | HTML

Network tomography is a promising inference technique for network topology from end-to-end measurements. In this letter, we propose a novel binary tree pruning algorithm based on t-test to infer the network topology. A binary tree topology is first inferred using the existing Agglomerative Likelihood Tree (ALT) method, and then two samples t-test is applied to prune the binary tree, thus a general... View full abstract»

• ### A Serial Layered Scheduling Algorithm for Factor Graph Equalization

Publication Year: 2014, Page(s):925 - 928
Cited by:  Papers (1)
| | PDF (619 KB) | HTML

This letter proposes a novel factor graph equalization based on a serial layered scheduling (SLS) algorithm of belief propagation, where the channel convolutional matrix is decomposed according to the distribution of its non-zero elements. In the SLS algorithm based factor graph equalization, factor nodes are classified into multiple layers referring to the decomposition of channel convolutional m... View full abstract»

• ### Three-Dimensional Channel Characteristics for Molecular Communications With an Absorbing Receiver

Publication Year: 2014, Page(s):929 - 932
Cited by:  Papers (70)
| | PDF (458 KB) | HTML

Within the domain of molecular communications, researchers mimic the techniques in nature to come up with alternative communication methods for collaborating nanomachines. This letter investigates the channel transfer function for molecular communications via diffusion. In nature, information-carrying molecules are generally absorbed by the target node via receptors. Using the concentration functi... View full abstract»

• ### Outage Probability of Two-Way Full-Duplex Relaying With Imperfect Channel State Information

Publication Year: 2014, Page(s):933 - 936
Cited by:  Papers (28)
| | PDF (228 KB) | HTML

In this letter, we investigate two-way full-duplex (TWFD) relaying with a residual loop interference (LI). In the TWFD relaying, two full-duplex users exchange data with each other via a full-duplex relay, and each node attempts to subtract the estimate of the residual LI from its received signal. We derive the exact integral and approximate closed-form expressions for the outage probability of th... View full abstract»

• ### A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding

Publication Year: 2014, Page(s):937 - 940
Cited by:  Papers (3)
| | PDF (308 KB) | HTML

In this letter, a new secure information transmission scheme based on polar codes with a pre-shared secret key is proposed. In polar codes, after the channel polarization is induced, good split channels are used to transmit the user message and bad channels are utilized to support the reconstruction of the message by sharing fixed information. If the fixed information in bad channels is secret, an... View full abstract»

• ### Simplified Compression of Redundancy Free Trellis Sections in Turbo Decoder

Publication Year: 2014, Page(s):941 - 944
Cited by:  Papers (2)
| | PDF (273 KB) | HTML

It has been recently shown that a sequence of R = q(M - 1) redundancy free trellis stages of a recursive convolutional decoder can be compressed in a sequence of L = M - 1 trellis stages, where M is the number of states of the trellis and q is a positive integer. In this paper, we show that for an M state Turbo decoder, among the L compressed trellis stages, only m = 3 or even m = 2 are necessary.... View full abstract»

• ### On Detection Method for Soft Iterative Decoding in the Presence of Impulsive Interference

Publication Year: 2014, Page(s):945 - 948
Cited by:  Papers (5)
| | PDF (750 KB) | HTML

This paper deals with the performance improvement of soft iterative decoders in impulsive interference modeled by additive noise. In case of α-stable noise, the inputs of the belief propagation decoder are too complex to compute. We propose to use an approximation of the log likelihood ratio in an impulsive environment. Even with this simplification, we show that the performance stays close... View full abstract»

• ### Low-Complexity Sphere Decoding Detector for Generalized Spatial Modulation Systems

Publication Year: 2014, Page(s):949 - 952
Cited by:  Papers (13)
| | PDF (291 KB) | HTML

This letter presents a sphere decoding strategy for generalized spatial modulation (GSM) systems. The proposed modifications reduce the exhaustive tree search for lattice points and exploits the structure of GSM, restraining the tree branches to those that result in valid antenna combinations. As a result, every found lattice point results in valid GSM transmitted symbols. The numerical results ex... View full abstract»

• ### Nested Maximum Likelihood Group Detection in Generalized Spatial Modulation MIMO Systems

Publication Year: 2014, Page(s):953 - 956
Cited by:  Papers (7)
| | PDF (633 KB) | HTML

This letter presents a new detection scheme for the generalized spatial modulation MIMO system. The strategy is based on the successive use of maximum likelihood detectors, applied in a nested fashion, to variable-length partitions of the post-equalization received signal. The choice of the antenna combination mapping, named spatial constellation, as well as the detection ordering strategy are key... View full abstract»

• ### ANC-ALOHA: Analog Network Coding ALOHA for Satellite Networks

Publication Year: 2014, Page(s):957 - 960
Cited by:  Papers (3)
| | PDF (433 KB) | HTML

We propose a new random access protocol based on reservation ALOHA (R-ALOHA), called ANC-ALOHA, for applying analog network coding (ANC) to the slotted ALOHA channel of satellite networks (SATNETs). Although ANC promises excellent performance in SATNETs, ANC is not guaranteed in slotted ALOHA owing to the inherent randomness. R-ALOHA can be used to acquire a slot for ANC, but there are still two r... View full abstract»

• ### Spatial Group Based Random Access for M2M Communications

Publication Year: 2014, Page(s):961 - 964
Cited by:  Papers (32)
| | PDF (4121 KB) | HTML

We expect that the number of machine-to-machine (M2M) devices will rapidly increase in the near future due to a growing demand for a wide range of M2M applications such as e-health, public safety, surveillance, remote maintenance and control, and smart metering. Therefore, the future cellular networks should accommodate a large number of M2M devices and their random access (RA) requests at a speci... View full abstract»

• ### A Downstream Power Back-Off Procedure for Mixed FTTC and FTTDp Scenarios

Publication Year: 2014, Page(s):965 - 968
Cited by:  Papers (5)
| | PDF (409 KB) | HTML

VDSL2 achieves high bit rates thanks to far-end crosstalk suppression and proper selection of the access network infrastructure. In this paper, we consider one architectural solution, which adopts the standard VDSL2 profile in a Fiber-To-The-Distribution point (FTTDp). During the transition process, FTTDp has to coexist with Fiber-To-The-Cabinet (FTTC) in a mixed VDSL2 scenario. Downstream Power B... View full abstract»

• ### Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback

Publication Year: 2014, Page(s):969 - 972
Cited by:  Papers (11)
| | PDF (376 KB) | HTML

This paper investigates the ergodic secrecy sum-rate for the downlink multiuser MIMO system with independent confidential messages, each of which is intended for one of the users and should keep secret from others. We adopt zero-forcing beamforming with limited channel state information (CSI) feedback at the transmitter, and derive the closed-form expression for the ergodic secrecy sum-rate. Moreo... View full abstract»

• ### Energy-Efficient RSSI-Based Localization for Wireless Sensor Networks

Publication Year: 2014, Page(s):973 - 976
Cited by:  Papers (16)
| | PDF (312 KB) | HTML

Sensor positioning is a fundamental block in many location-dependent applications of wireless sensor networks. Although the main objective in localization is primarily enhancing the positioning accuracy, the importance of energy consumption and localization accuracy poses new challenges. The localization is usually assisted with some self-known position sensors called anchor nodes. In this letter,... View full abstract»

• ### Energy Efficient Network Deployment With Cell DTX

Publication Year: 2014, Page(s):977 - 980
Cited by:  Papers (12)
| | PDF (499 KB) | HTML

Cell discontinuous transmission (DTX) is a new feature that enables sleep mode operations at base station (BS) side during the transmission time intervals when there is no traffic. In this letter, we analyze the maximum achievable energy saving of the cell DTX. We incorporate the cell DTX with a clean-slate network deployment and obtain optimal BS density for lowest energy consumption satisfying a... View full abstract»

• ### Comments on “IEEE 1588 Clock Synchronization Using Dual Slave Clocks in a Slave”

Publication Year: 2014, Page(s):981 - 982
Cited by:  Papers (2)
| | PDF (103 KB) | HTML

In the above letter, Chin and Chen proposed an IEEE 1588 clock synchronization method based on dual slave clocks, where they claim that multiple unknown parameters-i.e., clock offset, clock skew, and master-to-slave delay-can be estimated with only one-way time transfers using more equations than usual. This comment investigates Chin and Chen's dual clock scheme with detailed models for a master a... View full abstract»

• ### An Enhanced Signal-Timing-Offset Compensation Algorithm for Coordinated Multipoint-to-Multiuser Systems

Publication Year: 2014, Page(s):983 - 986
Cited by:  Papers (3)
| | PDF (892 KB) | HTML

In coordinated multipoint-to-multiuser systems, since coordinated base stations (BSs) may transmit their signals simultaneously to multiple user equipments (UEs) and a UE may receive signals with different signal timing offsets (STOs) from different BSs at given time-slots and subcarriers, it is impossible for BSs to pre-compensate or for UEs to post-compensate the STOs as they do it in multipoint... View full abstract»

• ### Guard Beacon: An Energy-Efficient Beacon Strategy for Time Synchronization in Wireless Sensor Networks

Publication Year: 2014, Page(s):987 - 990
Cited by:  Papers (3)
| | PDF (367 KB) | HTML

In this paper, we present Guard Beacon, which is a beacon strategy to reduce the energy consumption of time synchronization in wireless sensor networks (WSNs). In a low duty-cycled sensor network, a node may miss incoming synchronization beacons because of wrong active/sleep mode due to clock drift. Therefore, it is critical to guarantee that beacons arrive at the receiver at the right time. The p... View full abstract»

## Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

Full Aims & Scope

Editor-in-Chief
Octavia Dobre