Coded slotted ALOHA: A graph-based method for uncoordinated multiple access

E Paolini, G Liva, M Chiani - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In this paper, a random access scheme is introduced, which relies on the combination of
packet erasure correcting codes and successive interference cancellation (SIC). The …

Throughput with delay constraints in a shared access network with priorities

Z Chen, N Pappas, M Kountouris… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we analyze a shared access network with a fixed primary node and randomly
distributed secondary nodes whose spatial distribution follows a poisson point process. The …

To transmit or not to transmit? Distributed queueing games in infrastructureless wireless networks

Z Guan, T Melodia, G Scutari - IEEE/ACM Transactions on …, 2015 - ieeexplore.ieee.org
We study distributed queueing games in interference-limited wireless networks. We
formulate the throughput maximization problem via distributed selection of users' …

Energy efficiency versus performance in cognitive wireless networks

M Costa, A Ephremides - IEEE Journal on Selected Areas in …, 2016 - ieeexplore.ieee.org
Energy efficiency is a critical issue in wireless networks, not only due to the technological
limitations on energy supplies, but also due to the environmental impact caused by the …

Power control and relay selection in cognitive radio ad hoc networks using game theory

OLA Lopez, SM Sanchez, SB Mafra… - IEEE Systems …, 2016 - ieeexplore.ieee.org
This paper employs game theory to optimize the performance of multiple secondary users
(SUs) in a cognitive radio ad hoc network where the primary and SUs have quality of service …

Co-operative caching in dynamic shared spectrum networks

D Das, AA Abouzeid - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
This paper considers co-operation between primary and secondary users in shared
spectrum radio networks via caching. We first consider a network with one channel shared …

Performance analysis of opportunistic cooperation schemes in cognitive radio networks

D Xu, Y Gao, C Yang, Y Yao… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we propose an opportunistic cooperation scheme in a two-user buffer-aided
cognitive radio network. In each time slot, the secondary user (SU) will either transmit its own …

A sparsity-aware cooperative protocol for cognitive radio networks with energy-harvesting primary user

A El Shafie, N Al-Dhahir… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We consider a cognitive setting composed of multiple primary frequency bands each of
which consists of a limited-battery energy-harvesting primary user and a secondary user …

Throughput analysis of smart objects with delay constraints

Z Chen, N Pappas, M Kountouris… - 2016 IEEE 17th …, 2016 - ieeexplore.ieee.org
In this paper, we analyze a shared access network with one primary device and randomly
distributed smart objects with secondary priority. Assuming random traffic at the primary …

Stable throughput region and admission control for device-to-device cellular coexisting networks

H Lu, Y Wang, Y Chen, KJR Liu - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Device-to-device (D2D) communication is proposed as a vital technique to enhance system
capacity in cellular networks, which requires efficient interference modeling and …