1,370 research outputs found
UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV),
aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In
this case, the management of multiple UAVs is important. This paper considers
the power allocation strategy for a UAV swarm-enabled aerial network to enhance
the physical layer security of the downlink transmission, where an eavesdropper
moves following the trajectory of the swarm for better eavesdropping. Unlike
existing works, we use only the large-scale channel state information (CSI) and
maximize the secrecy throughput in a whole-trajectory-oriented manner. The
overall transmission energy constraint on each UAV and the total transmission
duration for all the legitimate users are considered. The non-convexity of the
formulated problem is solved by using max-min optimization with iteration. Both
the transmission power of desired signals and artificial noise (AN) are derived
iteratively. Simulation results are presented to validate the effectiveness of
our proposed power allocation algorithm and to show the advantage of aerial
CoMP by using only the large-scale CSI
Tight Bounds for Set Disjointness in the Message Passing Model
In a multiparty message-passing model of communication, there are
players. Each player has a private input, and they communicate by sending
messages to one another over private channels. While this model has been used
extensively in distributed computing and in multiparty computation, lower
bounds on communication complexity in this model and related models have been
somewhat scarce. In recent work \cite{phillips12,woodruff12,woodruff13}, strong
lower bounds of the form were obtained for several
functions in the message-passing model; however, a lower bound on the classical
Set Disjointness problem remained elusive.
In this paper, we prove tight lower bounds of the form
for the Set Disjointness problem in the message passing model. Our bounds are
obtained by developing information complexity tools in the message-passing
model, and then proving an information complexity lower bound for Set
Disjointness. As a corollary, we show a tight lower bound for the task
allocation problem \cite{DruckerKuhnOshman} via a reduction from Set
Disjointness
Computer Science and Game Theory: A Brief Survey
There has been a remarkable increase in work at the interface of computer
science and game theory in the past decade. In this article I survey some of
the main themes of work in the area, with a focus on the work in computer
science. Given the length constraints, I make no attempt at being
comprehensive, especially since other surveys are also available, and a
comprehensive survey book will appear shortly.Comment: To appear; Palgrave Dictionary of Economic
Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications
From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks. Traditional studies focused on optimizing the throughput of the system by proposing elaborate schemes able to reach the network capacity. With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy. Instantly decodable network coding presents itself as a new paradigm in network coding that trades off these two aspects. This paper review instantly decodable network coding schemes by identifying, categorizing, and evaluating various algorithms proposed in the literature. The first part of the manuscript investigates the conventional centralized systems, in which all decisions are carried out by a central unit, e.g., a base-station. In particular, two successful approaches known as the strict and generalized instantly decodable network are compared in terms of reliability, performance, complexity, and packet selection methodology. The second part considers the use of instantly decodable codes in a device-to-device communication network, in which devices speed up the recovery of the missing packets by exchanging network coded packets. Although the performance improvements are directly proportional to the computational complexity increases, numerous successful schemes from both the performance and complexity viewpoints are identified
- …