UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 673
1.
  • The Capacity of Private Inf... The Capacity of Private Information Retrieval From Coded Databases
    Banawan, Karim; Ulukus, Sennur IEEE transactions on information theory, 03/2018, Letnik: 64, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    We consider the problem of private information retrieval (PIR) over a distributed storage system. The storage system consists of N non-colluding databases, each storing an MDS-coded version of M ...
Celotno besedilo

PDF
2.
  • The Capacity of Private Inf... The Capacity of Private Information Retrieval from Byzantine and Colluding Databases
    Banawan, Karim; Ulukus, Sennur IEEE transactions on information theory, 02/2019, Letnik: 65, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    We consider the problem of single-round private information retrieval (PIR) from <inline-formula> <tex-math notation="LaTeX">N </tex-math></inline-formula> replicated databases. We consider the case ...
Celotno besedilo

PDF
3.
  • Optimal Packet Scheduling i... Optimal Packet Scheduling in an Energy Harvesting Communication System
    Jing Yang; Ulukus, Sennur IEEE transactions on communications, 2012-January, 2012, 2012-01-00, Letnik: 60, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    We consider the optimal packet scheduling problem in a single-user energy harvesting wireless communication system. In this system, both the data packets and the harvested energy are modeled to ...
Celotno besedilo

PDF
4.
  • Wireless Physical-Layer Sec... Wireless Physical-Layer Security: Lessons Learned From Information Theory
    Yener, Aylin; Ulukus, Sennur Proceedings of the IEEE, 2015-Oct., 2015-10-00, 20151001, Letnik: 103, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Physical-layer security utilizes resources of the transmission medium to guarantee secure communication against an adversary with unlimited computational power. Rooted in information theory, ...
Celotno besedilo

PDF
5.
  • Achieving AWGN Capacity Und... Achieving AWGN Capacity Under Stochastic Energy Harvesting
    Ozel, O.; Ulukus, S. IEEE transactions on information theory, 10/2012, Letnik: 58, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    In energy harvesting communication systems, an exogenous recharge process supplies energy necessary for data transmission and the arriving energy can be buffered in a battery before consumption. We ...
Celotno besedilo

PDF
6.
  • Age of Information: An Intr... Age of Information: An Introduction and Survey
    Yates, Roy D.; Sun, Yin; Brown, D. Richard ... IEEE journal on selected areas in communications, 05/2021, Letnik: 39, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    We summarize recent contributions in the broad area of age of information (AoI). In particular, we describe the current state of the art in the design and optimization of low-latency cyberphysical ...
Celotno besedilo

PDF
7.
  • Energy Cooperation in Energ... Energy Cooperation in Energy Harvesting Communications
    Gurakan, Berk; Ozel, Omur; Jing Yang ... IEEE transactions on communications, 12/2013, Letnik: 61, Številka: 12
    Journal Article
    Recenzirano
    Odprti dostop

    In energy harvesting communications, users transmit messages using energy harvested from nature during the course of communication. With an optimum transmit policy, the performance of the system ...
Celotno besedilo

PDF
8.
  • Optimal packet scheduling i... Optimal packet scheduling in a multiple access channel with energy harvesting transmitters
    Jing Yang; Ulukus, S. Journal of communications and networks, 04/2012, Letnik: 14, Številka: 2
    Journal Article

    In this paper, we investigate the optimal packet scheduling problem in a two-user multiple access communication system, where the transmitters are able to harvest energy from the nature. Under a ...
Celotno besedilo
9.
  • Secure Degrees of Freedom o... Secure Degrees of Freedom of One-Hop Wireless Networks
    Jianwei Xie; Ulukus, Sennur IEEE transactions on information theory, 06/2014, Letnik: 60, Številka: 6
    Journal Article, Conference Proceeding
    Recenzirano
    Odprti dostop

    We study the secure degrees of freedom (d.o.f.) of one-hop wireless networks by considering four fundamental wireless network structures: 1) Gaussian wiretap channel; 2) Gaussian broadcast channel ...
Celotno besedilo

PDF
10.
  • Minimizing age of informati... Minimizing age of information with soft updates
    Bastopcu, Melih; Ulukus, Sennur Journal of communications and networks, 06/2019, Letnik: 21, Številka: 3
    Journal Article
    Odprti dostop

    We consider an information updating system where an information provider and an information receiver engage in an update process over time. Different from the existing literature where updates are ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 673

Nalaganje filtrov