Skip to main content
    • by 
    •   12  
      MathematicsComputer ScienceGame TheoryInformation Theory
We address the fundamental question of whether or not there exist stable operating points in a network in which selfish nodes share a common channel, and if they exist, how the nodes behave at these stable operating points. We begin with... more
    • by 
    •   18  
      Computer ScienceDistributed ComputingGame TheoryWireless Network
Contention control is an important means to mitigate adverse affects of multiple access interference on transmitted data packets in wireless communication networks. Most practical contention control mechanisms, e.g., IEEE 802.11 and... more
    • by 
    •   7  
      Computer ScienceDistributed ComputingGame TheoryComputer Network
This paper analyzes layer 2 contention resolution strategies for wireless networks with multipacket reception by using noncooperative game theory. Necessary and sufficient conditions are obtained for a strategy profile to be a Nash... more
    • by 
    •   12  
      Computer ScienceDistributed ComputingGame TheoryComputer Network
This paper addresses the following question: how reliable is it to use the unbounded path-loss model G(d) = d −α , where α is the path-loss exponent, to model the decay of transmitted signal power in wireless networks? G(d) is a good... more
    • by 
    •   7  
      Computer ScienceDistributed ComputingSingularityWireless Network
This paper studies optimum power control and sumrate scaling laws for the distributed cognitive uplink. It is first shown that the optimum distributed power control policy is in the form of a threshold based water-filling power control.... more
    • by 
    •   8  
      EngineeringComputer ScienceCognitive radioPower Control
This paper introduces an analytical framework for two small-world network models, and studies the delay of targeted social search by considering messages traveling between source and target individuals in these networks. In particular, by... more
    • by 
    •   2  
      Computer ScienceElectrical And Electronic Engineering
This paper studies the structure of downlink sum-rate maximizing selective decentralized feedback policies for opportunistic beamforming under finite feedback constraints on the average number of mobile users feeding back. Firstly, it is... more
    • by 
    •   8  
      MathematicsComputer ScienceBeamformingFading
This paper investigates the problem of Gaussian approximation for the wireless multi-access interference distribution in large spatial wireless networks. First, a principled methodology is presented to establish rates of convergence of... more
    • by 
    •   5  
      MathematicsComputer ScienceMultidisciplinaryFading
Beamforming techniques utilizing only partial channel state information (CSI) has gained popularity over other communication strategies requiring perfect CSI thanks to their lower feedback requirements. The amount of feedback in... more
    • by 
    •   6  
      MathematicsComputer ScienceBeamformingThresholding
In cognitive multiple access networks, primarysecondary feedback links are needed to convey secondary transmitter primary base station (STPB) channel gains from the primary base station (PBS) to the secondary base station (SBS). To reduce... more
    • by 
    •   4  
      Computer ScienceThroughputTransmitterBase station
This paper studies optimal distributed power allocation and scheduling policies (DPASPs) for distributed total power and interference limited (DTPIL) cognitive multiple access networks in which secondary users (SU) independently perform... more
    • by 
    •   7  
      MathematicsComputer ScienceCognitive radioComputer Network
This paper studies the outage capacity of a network consisting of a multitude of heterogenous mobile users, and operating according to the classical opportunistic beamforming framework. The base station is located at the center of the... more
    • by 
    •   6  
      MathematicsComputer ScienceBeamformingScaling
This paper analyzes the behavior of selfish transmitters under imperfect location information. The scenario considered is that of a wireless network consisting of selfish nodes that are randomly distributed over the network domain... more
    • by 
    •   9  
      MathematicsComputer ScienceGame TheoryInformation Theory
This paper studies a class of random access games for wireless channels with multipacket reception. First, necessary and sufficient equilibrium conditions for a contention strategy profile to be a Nash equilibrium for general wireless... more
    • by 
    • Computer Science
This paper studies optimum power control and sum-rate scaling laws for the distributed cognitive uplink. It is first shown that the optimum distributed power control policy is in the form of a threshold based water-filling power control.... more
    • by 
    •   7  
      MathematicsComputer ScienceCognitive radioPower Control
In cognitive multiple access networks, feedback is an important mechanism to convey secondary transmitter primary base station (STPB) channel gains from the primary base station (PBS) to the secondary base station (SBS). This paper... more
    • by 
    •   3  
      MathematicsComputer ScienceFading
This paper studies the outage capacity of a network consisting of a multitude of heterogenous mobile users, and operating according to the classical opportunistic beamforming framework. The base station is located at the center of the... more
    • by 
    •   9  
      EngineeringComputer ScienceBeamformingFading
This paper derives tight performance upper and lower bounds on the downlink outage efficiency of K-tier heterogeneous cellular networks (HCNs) for general signal propagation models with Poisson distributed base stations in each tier. In... more
    • by 
    •   6  
      MathematicsComputer ScienceFadingCellular Network
This paper studies the achievable throughput performance of the cognitive uplink under a limited primary cooperation scenario wherein the primary base station cannot feed back all interference channel gains to the secondary base station.... more
    • by 
    •   6  
      Computer ScienceCognitive radioComputer NetworkThroughput