#### Filter Results:

- Full text PDF available (40)

#### Publication Year

1936

2017

- This year (3)
- Last 5 years (27)
- Last 10 years (45)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

We consider the following queueing system which arises as a model of a wireless link shared by multiple users. There is a nite number N of input ows served by a server. The system operates in discrete time t = 0; 1; 2; : : : . Each input ow can be described as an irreducible countable Markov chain; waiting customers of each ow are placed in a queue. The… (More)

- Sem C. Borst, Phil Whiting
- 2001

The relative delay tolerance of data applications, together with the bursty traffic characteristics, opens up the possibility for scheduling transmissions so as to optimize throughput. A particularly attractive approach, in fading environments, is to exploit the variations in the channel conditions, and transmit to the user with the currently ‘best’… (More)

We consider the following queuing system which arises as a model of a wireless link shared by multiple users+ There is a finite number N of input flows served by a server+ The system operates in discrete time t 5 0,1,2, + + + + Each input flow can be described as an irreducible countable Markov chain; waiting customers of each flow are placed in a queue+… (More)

- Phil Whiting
- Genetics
- 1943

- Olgica Milenkovic, Emina Soljanin, Phil Whiting
- IEEE Transactions on Information Theory
- 2007

We evaluate the asymptotic normalized average distributions of a class of combinatorial configurations in random, regular and irregular, binary low-density parity-check (LDPC) code ensembles. Among the configurations considered are trapping and stopping sets. These sets represent subsets of variable nodes in the Tanner graph of a code that play an important… (More)

- Urs Niesen, Phil Whiting
- IEEE Transactions on Information Theory
- 2011

We analyze the asymptotic behavior of compute-and-forward relay networks in the regime of high signal-to-noise ratios. We consider a section of such a network consisting of K transmitters and K relays. The aim of the relays is to reliably decode an invertible function of the messages sent by the transmitters. An upper bound on the capacity of this system… (More)

- Piotr W. Mirowski, Phil Whiting, +4 authors Tin Kam Ho
- J. Location Based Services
- 2012

Various methods have been developed for indoor localisation using WLAN signals. Algorithms that fingerprint the Received Signal Strength Indication (RSSI) of WiFi for different locations can achieve tracking accuracies of the order of a few meters. RSSI fingerprinting suffers though from two main limitations: first, as the signal environment changes, so… (More)

- Phil Whiting
- Genetics
- 1960

Various methods have been developed for indoor localization using WLAN signals. Algorithms that fingerprint the Received Signal Strength Indication (RSSI) of WiFi for different locations can achieve tracking accuracies of the order of a few meters. RSSI fingerprinting suffers though from two main limitations: first, as the signal environment changes, so… (More)

The downlink transmission in multi-user multipleinput multiple-output (MIMO) systems has been extensively studied from both communication-theoretic and information-theoretic perspectives. Most of these papers assume perfect/imperfect channel knowledge. In general, the problem of channel estimation is studied separately. However, in interference-limited… (More)