SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Médard Muriel) "

Sökning: WFRF:(Médard Muriel)

  • Resultat 1-10 av 15
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Adams, David C., et al. (författare)
  • Delay constrained throughput-reliability tradeoff in network-coded wireless systems
  • 2014
  • Konferensbidrag (refereegranskat)abstract
    • We investigate the performance of delay constrained data transmission over wireless networks without end-to-end feedback. Forward error-correction coding (FEC) is performed at the bit level to combat channel distortions and random linear network coding (RLNC) is performed at the packet level to recover from packet erasures. We focus on the scenario where RLNC re-encoding is performed at intermediate nodes and we assume that any packet that contains bit errors after FEC decoding can be detected and erased. To facilitate explicit characterization of data transmission over network-coded wireless systems, we propose a generic two-layer abstraction of a network that models both bit/symbol-level operations at the lower layer (termed PHY-layer) over several heterogeneous links and packet-level operations at the upper layer (termed NET-layer). Based on this model, we propose a network reduction method to characterize the throughput-reliability function of the end-to-end transmission. Our approach not only reveals an explicit tradeoff between data delivery rate and reliability, but also provides an intuitive visualization of the bottlenecks within the underlying network. We illustrate our approach via a point-to-point link and a relay network and highlight the advantages of this method over capacity-based approaches.
  •  
2.
  • Du, Jinfeng, et al. (författare)
  • Cross-layer design of network-coded transmission with a delay constraint
  • 2015
  • Ingår i: Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2015. - : IEEE. - 9781479919307 ; , s. 156-160
  • Konferensbidrag (refereegranskat)abstract
    • We investigate the cross-layer design of wireless networks where end-to-end data transmission is subject to delayconstraint and there is no end-to-end feedback. The transmission is coded by random linear network coding (RLNC) on packet level to recover from packet erasures and by forward error-correction coding (FEC) on bit level to combatchannel distortions. Based on the two-layer model developed by Adams et al. where the end-to-end coded transmission ischaracterized by a throughput-reliability function, we formulate the cross-layer design as a goodput optimizationproblem relax the integrality constraint. We show that for single-hop transmissions there exists a globally optimal operating point for the relaxed problem. For multiple-hop transmissions, the goodput function is component-wiseconcave with respect to the physical layer data rate over each individual link.
  •  
3.
  • Du, Jinfeng, et al. (författare)
  • Lower bounding models for wireless networks
  • 2013
  • Ingår i: Proceedings of IEEE International Symposium on Information Theory, 2013. - : IEEE conference proceedings. ; , s. 1456-1460
  • Konferensbidrag (refereegranskat)abstract
    • Motivated by the framework of network equivalencetheory [1], [2], we present capacity lower bounding models forwireless networks by construction of noiseless networks whichcan be used to calculate an inner bound for the correspondingwireless network. We first extend the “one-shot” lower boundingmodel [6] to many-user scenarios, and then propose a two-stepupdate of the one-shot models to incorporate the broadcast natureof wireless transmission. The main advantage of the proposedlower bounding method is its simplicity and the fact that it can beeasily extended to larger networks. We demonstrate by examplesthat the resulting lower bounds can even approach the capacityin some setups.
  •  
4.
  • Du, Jinfeng, et al. (författare)
  • Network reduction for coded multiple-hop networks
  • 2015
  • Ingår i: 2015 IEEE International Conference on Communications (ICC). - : IEEE conference proceedings. - 9781467364324 ; , s. 4518-4523
  • Konferensbidrag (refereegranskat)abstract
    • Data transmission over multiple-hop networks is impaired by random deleterious events, and characterizing the probability of error for the end-to-end transmission is challenging as the size of networks grows. Adams et al. showed that, when re-encoding at intermediate nodes is enabled, coded transmission over tandem/parallel links can be reduced to a single equivalent link with a specified probability function. Although iterative application of the tandem/parallel reduction techniques in alternation can simplify the task, they are generally not sufficient to reduce an arbitrary network to a single link. In this paper, we propose upper- and lower- bounding processes to bound the end-to-end probability distribution of a network by combining the parallel/tandem link reduction with the structure of flows over the network. We evaluate the performance of the proposed bounding methods at the 99% success rate of end-to-end data transmission over randomly generated acyclic networks. The numerical results demonstrate that our bounding approaches enable us to characterize a network by a single probability function to a very good precision.
  •  
5.
  • Du, Jinfeng, et al. (författare)
  • Scalable Capacity Bounding Models for Wireless Networks
  • 2016
  • Ingår i: IEEE Transactions on Information Theory. - : IEEE Press. - 0018-9448 .- 1557-9654. ; 62:1, s. 208-229
  • Tidskriftsartikel (refereegranskat)abstract
    • The framework of network equivalence theory developed by Koetter et al. introduces a notion of channel emulation to construct noiseless networks as upper (respectively, lower) bounding models, which can be used to calculate the outer (respectively, inner) bounds for the capacity region of the original noisy network. Based on the network equivalence framework, this paper presents scalable upper and lower bounding models for wireless networks with potentially many nodes. A channel decoupling method is proposed to decompose wireless networks into decoupled multiple-access channels and broadcast channels. The upper bounding model, consisting of only point-to-point bit pipes, is constructed by first extending the one-shot upper bounding models developed by Calmon et al. and then integrating them with network equivalence tools. The lower bounding model, consisting of both point-to-point and point-to-points bit pipes, is constructed based on a two-step update of the lower bounding models to incorporate the broadcast nature of wireless transmission. The main advantages of the proposed methods are their simplicity and the fact that they can be extended easily to large networks with a complexity that grows linearly with the number of nodes. It is demonstrated that the resulting upper and lower bounds can approach the capacity in some setups.
  •  
6.
  • Du, Jinfeng, et al. (författare)
  • Scalable capacity bounding models for wireless networks
  • Annan publikation (övrigt vetenskapligt/konstnärligt)abstract
    • Based on the framework of network equivalence theory developed by Koetter et al., this paper presents scalable capacity upper and lower bounding models for wireless networks by construction of noiseless networks that can be used to calculate outer and inner bounds, respectively, for the original networks. A channel decoupling method is proposed to decompose wireless networks into point-to-point channels, and (potentially) coupled multiple-access channels (MACs) and broadcast channels (BCs). The upper bounding model, consisting of only point-to-point bit-pipes, is constructed by firstly extending the "one-shot" bounding models developed by Calmon et al. and then integrating them with network equivalence tools. The lower bounding model, consisting of both point-to-point and point-to-points bit-pipes, is constructed based on a two-step update of the one-shot models to incorporate the broadcast nature of wireless transmission. The main advantages of the proposed methods are their simplicity and the fact that they can be extended easily to large networks with a complexity that grows linearly with the number of nodes. It is demonstrated that the gap between the resulting upper and lower bounds is usually not large, and they can approach the capacity in some setups.
  •  
7.
  • Du, Jinfeng, et al. (författare)
  • Scalable upper bounding models for wireless networks
  • 2014
  • Ingår i: Proceedings of IEEE International Symposium on Information Theory. - : IEEE conference proceedings. ; , s. 241-245
  • Konferensbidrag (refereegranskat)abstract
    • The framework of network equivalence theory developed by Koetter et al. introduces a notion of channel emulation to construct noiseless networks as upper/lower bounding models for the original noisy network. This paper presents scalable upper bounding models for wireless networks, by firstly extending the ``one-shot'' bounding models developed by Calmon et al. and then integrating them with network equivalence tools. A channel decoupling method is proposed to decompose wireless networks into decoupled multiple-access channels (MACs) and broadcast channels (BCs). The main advantages of the proposed method is its simplicity and the fact that it can be extended easily to large networks with a complexity that grows linearly with the number of nodes. It is demonstrated that the resulting upper bounds can approach the capacity in some setups.
  •  
8.
  • Du, Jinfeng, et al. (författare)
  • Wireless multicast relay networks with limited-rate source-conferencing
  • 2013
  • Ingår i: IEEE Journal on Selected Areas in Communications. - : IEEE Press. - 0733-8716 .- 1558-0008. ; 31:8, s. 1390-1401
  • Tidskriftsartikel (refereegranskat)abstract
    • We investigate capacity bounds for a wireless multicast relay network where two sources simultaneously multicast to two destinations with the help of a full-duplex relay node. The two sources and the relay use the same channel resources (i.e. co-channel transmission). We assume Gaussian channels with time-invariant channel gains which are known by all nodes. The two source nodes are connected by orthogonal limited-rate error-free conferencing links. By extending the proof of the converse for the Gaussian relay channel and introducing two lemmas on conditional (co-)variance, we present two genie-aided outer bounds of the capacity region for this multicast relay network. We extend noisy network coding to use source cooperation with the help of the theory of network equivalence. We also propose a new coding scheme, partial-decode-and- forward based linear network coding, which is essentially a hybrid scheme utilizing rate-splitting and messages conferencing at the source nodes, partial decoding and linear network coding at the relay, and joint decoding at each destination. A low-complexity alternative scheme, analog network coding based on amplify-and-forward relaying, is also investigated and shown to benefit greatly from the help of the conferencing links and can even outperform noisy network coding when the coherent combining gain is dominant.
  •  
9.
  • Gómez-Cuba, Felipe, et al. (författare)
  • Unified Capacity Limit of Non-Coherent Wideband Fading Channels
  • 2015
  • Ingår i: IEEE Transactions on Information Theory. - 0018-9448 .- 1557-9654.
  • Tidskriftsartikel (refereegranskat)abstract
    • Peaky and non-peaky signaling schemes have long been considered species apart in non-coherent wideband fading channels, as the first approaches asymptotically the linear-in-power capacity of a wideband AWGN channel with the same SNR, whereas the second reaches a nearly power-limited peak rate at some finite critical bandwidth and then falls to zero as bandwidth grows to infinity. In this paper it is shown that this distinction is in fact an artifact of the limited attention paid in the past to the product between the bandwidth and the fraction of time it is in use. This fundamental quantity, that is termed bandwidth occupancy, measures average bandwidth usage over time. As it turns out, a peaky signal that transmits in an infinite bandwidth but only for an infinitesimal fraction of the time may only have a small bandwidth occupancy, and so does a non-peaky scheme that limits itself to the critical bandwidth even though more spectrum is available, so as to not degrade rate. The two types of signaling in the literature are harmonized to show that, for any type of signals, there is a fundamental limit---a critical bandwidth occupancy. All signaling schemes with the same bandwidth occupancy approach the linear-in-power capacity of wideband AWGN channels with the same asymptotic behavior as the bandwidth occupancy approaches its critical value. For a bandwidth occupancy above the critical value, rate decreases to zero as the occupancy goes to infinity. This unified analysis not only recovers previous results on capacity bounds for (non-)peaky signaling schemes, but also reveals the fundamental tradeoff between accuracy and convergence when characterizing the maximal achievable rate.
  •  
10.
  • Médard, Muriel, et al. (författare)
  • Low SNR : When Only Decoding Will Do
  • 2014
  • Ingår i: Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on. - : IEEE conference proceedings. ; , s. 891-894
  • Konferensbidrag (refereegranskat)abstract
    • We investigate the issue of distributed receiver cooperation in a multiple-relay network with memoryless independent fading channels, where the channel state information can't be obtained. The received signals at distributed receiving nodes are first compressed or quantized before being sent to the decoder via rate-limited cooperation channels for joint processing. We focus on the low SNR regime and analyze the capacity bounds using network equivalence theory and a multiple-layer binning peaky frequency shift keying (FSK). When the received signals at the relaying nodes are in low SNR regime and the cooperation rates are not sufficiently high, compressed/quantized observations at relaying nodes become useless and only decoding can help.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 15

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy