Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Coded slotted ALOHA: A graph-based method for uncoordinated multiple access
In this paper, a random access scheme is introduced, which relies on the combination of
packet erasure correcting codes and successive interference cancellation (SIC). The …
packet erasure correcting codes and successive interference cancellation (SIC). The …
Throughput with delay constraints in a shared access network with priorities
In this paper, we analyze a shared access network with a fixed primary node and randomly
distributed secondary nodes whose spatial distribution follows a poisson point process. The …
distributed secondary nodes whose spatial distribution follows a poisson point process. The …
To transmit or not to transmit? Distributed queueing games in infrastructureless wireless networks
We study distributed queueing games in interference-limited wireless networks. We
formulate the throughput maximization problem via distributed selection of users' …
formulate the throughput maximization problem via distributed selection of users' …
Energy efficiency versus performance in cognitive wireless networks
Energy efficiency is a critical issue in wireless networks, not only due to the technological
limitations on energy supplies, but also due to the environmental impact caused by the …
limitations on energy supplies, but also due to the environmental impact caused by the …
Power control and relay selection in cognitive radio ad hoc networks using game theory
This paper employs game theory to optimize the performance of multiple secondary users
(SUs) in a cognitive radio ad hoc network where the primary and SUs have quality of service …
(SUs) in a cognitive radio ad hoc network where the primary and SUs have quality of service …
Co-operative caching in dynamic shared spectrum networks
D Das, AA Abouzeid - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
This paper considers co-operation between primary and secondary users in shared
spectrum radio networks via caching. We first consider a network with one channel shared …
spectrum radio networks via caching. We first consider a network with one channel shared …
Performance analysis of opportunistic cooperation schemes in cognitive radio networks
In this paper, we propose an opportunistic cooperation scheme in a two-user buffer-aided
cognitive radio network. In each time slot, the secondary user (SU) will either transmit its own …
cognitive radio network. In each time slot, the secondary user (SU) will either transmit its own …
A sparsity-aware cooperative protocol for cognitive radio networks with energy-harvesting primary user
A El Shafie, N Al-Dhahir… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We consider a cognitive setting composed of multiple primary frequency bands each of
which consists of a limited-battery energy-harvesting primary user and a secondary user …
which consists of a limited-battery energy-harvesting primary user and a secondary user …
Throughput analysis of smart objects with delay constraints
In this paper, we analyze a shared access network with one primary device and randomly
distributed smart objects with secondary priority. Assuming random traffic at the primary …
distributed smart objects with secondary priority. Assuming random traffic at the primary …
Stable throughput region and admission control for device-to-device cellular coexisting networks
Device-to-device (D2D) communication is proposed as a vital technique to enhance system
capacity in cellular networks, which requires efficient interference modeling and …
capacity in cellular networks, which requires efficient interference modeling and …