Learn More
The conventional MAC (Medium Access Control) protocols assume that only one packet can be received at a given time. However, with the advent of sophisticated signal processing and antenna array techniques, it is possible to achieve multipacket reception (MPR) in the physical layer (PHY). In this paper, we propose a PHY methodology and the corresponding MAC(More)
—Achieving weighted throughput maximization (WTM) through power control has been a long standing open problem in interference-limited wireless networks. The complicated coupling between the mutual interferences of links gives rise to a non-convex optimization problem. Previous work has considered the WTM problem in the high signal to interference-and-noise(More)
Due to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station(More)
—This paper proposes a real-time pricing scheme that reduces the peak-to-average load ratio through demand response management in smart grid systems. The proposed scheme solves a two-stage optimization problem. On one hand, each user reacts to prices announced by the retailer and maximizes its payoff, which is the difference between its quality-of-usage and(More)
– Adaptive resource management has become a key technique for the next-generation wireless systems to provide desired services at appropriate QoS. Most of the current resource management algorithms are confined to a single layer of the network protocol stack, which leads to an inferior performance. In this paper, we propose a joint MAC-PHY layer resource(More)
This is Part II of a two-part paper series that studies the use of the proportional fairness (PF) utility function as the basis for resource allocation and scheduling in multi-channel multi-rate wireless networks. The contributions of Part II are twofold. (i) First, we extend the problem formulation, theoretical results, and algorithms to the case of(More)
—In cognitive radio (CR) networks with multiple-input multiple-output (MIMO) links, secondary users (SUs) can exploit " spectrum holes " in the space domain to access the spectrum allocated to a primary system. However, they need to suppress the interference caused to primary users (PUs), as the secondary system should be transparent to the primary system.(More)