Skip to main content

Showing 1–39 of 39 results for author: Wong, W S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.10753  [pdf, ps, other

    cs.IT eess.SP

    Pinching Antennas: Principles, Applications and Challenges

    Authors: Zheng Yang, Ning Wang, Yanshi Sun, Zhiguo Ding, Robert Schober, George K. Karagiannidis, Vincent W. S. Wong, Octavia A. Dobre

    Abstract: Flexible-antenna systems, such as fluid antennas and movable antennas, have been recognized as key enabling technologies for sixth-generation (6G) wireless networks, as they can intelligently reconfigure the effective channel gains of the users and hence significantly improve their data transmission capabilities. However, existing flexible-antenna systems have been designed to combat small-scale f… ▽ More

    Submitted 18 January, 2025; originally announced January 2025.

  2. arXiv:2411.09460  [pdf, other

    cs.IT

    Analysis Methodology for Age of Information under Sequence Based Scheduling

    Authors: Fang Liu, Wing Shing Wong, Yuan-Hsun Lo, Yijin Zhang, Chung Shue Chen

    Abstract: We focus on the Age of Information (AoI) performance in a system where each user generates packets periodically to send to a common access point (AP) for status updating. To avoid heavy overhead, we assume that channel sensing, feedback information from the AP, and time synchronization are not available in the system. We adopt a multi-access scheme called the sequence scheme, where each user is as… ▽ More

    Submitted 14 November, 2024; originally announced November 2024.

  3. arXiv:2410.15428  [pdf, other

    cs.IT

    Multiset Combinatorial Gray Codes with Application to Proximity Sensor Networks

    Authors: Chung Shue Chen, Wing Shing Wong, Yuan-Hsun Lo, Tsai-Lien Wong

    Abstract: We investigate coding schemes that map source symbols into multisets of an alphabet set. Such a formulation of source coding is an alternative approach to the traditional framework and is inspired by an object tracking problem over proximity sensor networks. We define a \textit{multiset combinatorial Gray code} as a mulitset code with fixed multiset cardinality that possesses combinatorial Gray co… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

    Comments: 30 pages, 4 figures

  4. arXiv:2401.01433  [pdf, other

    cs.IT eess.SP

    Multiple Access Techniques for Intelligent and Multi-Functional 6G: Tutorial, Survey, and Outlook

    Authors: Bruno Clerckx, Yijie Mao, Zhaohui Yang, Mingzhe Chen, Ahmed Alkhateeb, Liang Liu, Min Qiu, Jinhong Yuan, Vincent W. S. Wong, Juan Montojo

    Abstract: Multiple access (MA) is a crucial part of any wireless system and refers to techniques that make use of the resource dimensions to serve multiple users/devices/machines/services, ideally in the most efficient way. Given the needs of multi-functional wireless networks for integrated communications, sensing, localization, computing, coupled with the surge of machine learning / artificial intelligenc… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

    Comments: submitted for publication in Proceedings of the IEEE

  5. arXiv:2307.02736  [pdf

    physics.med-ph cs.CV

    An Uncertainty Aided Framework for Learning based Liver $T_1ρ$ Mapping and Analysis

    Authors: Chaoxing Huang, Vincent Wai Sun Wong, Queenie Chan, Winnie Chiu Wing Chu, Weitian Chen

    Abstract: Objective: Quantitative $T_1ρ$ imaging has potential for assessment of biochemical alterations of liver pathologies. Deep learning methods have been employed to accelerate quantitative $T_1ρ$ imaging. To employ artificial intelligence-based quantitative imaging methods in complicated clinical environment, it is valuable to estimate the uncertainty of the predicated $T_1ρ$ values to provide the con… ▽ More

    Submitted 9 October, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

  6. arXiv:2009.11754  [pdf, ps, other

    cs.IT math.CO

    Multichannel Conflict-Avoiding Codes of Weights Three and Four

    Authors: Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong, Yijin Zhang

    Abstract: Conflict-avoiding codes (CACs) were introduced by Levenshtein as a single-channel transmission scheme for a multiple-access collision channel without feedback. When the number of simultaneously active source nodes is less than or equal to the weight of a CAC, it is able to provide a hard guarantee that each active source node transmits at least one packet successfully within a fixed time duration,… ▽ More

    Submitted 20 April, 2021; v1 submitted 24 September, 2020; originally announced September 2020.

    Comments: 12 pages. Accepted for publication in IEEE Transaction on Information Theory

    MSC Class: 94B25

  7. arXiv:2009.09190  [pdf, other

    cs.IT

    Schedule Sequence Design for Broadcast in Multi-channel Ad Hoc Networks

    Authors: Fang Liu, Kenneth W. Shum, Yijin Zhang, Wing Shing Wong

    Abstract: We consider a single-hop ad hoc network in which each node aims to broadcast packets to its neighboring nodes by using multiple slotted, TDD collision channels. There is no cooperation among the nodes. To ensure successful broadcast, we propose to pre-assign each node a periodic sequence to schedule transmissions and receptions at each time slot. These sequences are referred to as schedule sequenc… ▽ More

    Submitted 19 September, 2020; originally announced September 2020.

  8. arXiv:2006.07668  [pdf, other

    cs.NI

    Delay-Constrained Topology-Transparent Distributed Scheduling for MANETs

    Authors: Lei Deng, Fang Liu, Yijin Zhang, Wing Shing Wong

    Abstract: Transparent topology is common in many mobile ad hoc networks (MANETs) such as vehicle ad hoc networks (VANETs), unmanned aerial vehicle (UAV) ad hoc networks, and wireless sensor networks due to their decentralization and mobility nature. There are many existing works on distributed scheduling scheme design for topology-transparent MANETs. Most of them focus on delay-unconstrained settings. Howev… ▽ More

    Submitted 25 December, 2020; v1 submitted 13 June, 2020; originally announced June 2020.

  9. arXiv:2005.02479  [pdf, other

    cs.NI

    Online Bitrate Selection for Viewport Adaptive 360-Degree Video Streaming

    Authors: Ming Tang, Vincent W. S. Wong

    Abstract: 360-degree video streaming provides users with immersive experience by letting users determine their field-of-views (FoVs) in real time. To enhance the users' quality of experience (QoE) given their limited bandwidth, recent works have proposed a viewport adaptive 360-degree video streaming model by exploiting the bitrate adaptation in spatial and temporal domains. Under this video streaming model… ▽ More

    Submitted 10 April, 2020; originally announced May 2020.

  10. arXiv:2005.02459  [pdf, other

    cs.NI

    Deep Reinforcement Learning for Task Offloading in Mobile Edge Computing Systems

    Authors: Ming Tang, Vincent W. S. Wong

    Abstract: In mobile edge computing systems, an edge node may have a high load when a large number of mobile devices offload their tasks to it. Those offloaded tasks may experience large processing delay or even be dropped when their deadlines expire. Due to the uncertain load dynamics at the edge nodes, it is challenging for each device to determine its offloading decision (i.e., whether to offload or not,… ▽ More

    Submitted 10 April, 2020; originally announced May 2020.

  11. arXiv:2004.07911  [pdf, ps, other

    cs.IT eess.SP

    A Deep Reinforcement Learning Approach for Dynamic Contents Caching in HetNets

    Authors: Manyou Ma, Vincent W. S. Wong

    Abstract: The recent development in Internet of Things necessitates caching of dynamic contents, where new versions of contents become available around-the-clock and thus timely update is required to ensure their relevance. The age of information (AoI) is a performance metric that evaluates the freshness of contents. Existing works on AoI-optimization of cache content update algorithms focus on minimizing t… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: Accepted for publication in Proc. of IEEE International Conference on Communications (ICC), Dublin, Ireland, Jun. 2020

  12. arXiv:2004.07395  [pdf, ps, other

    cs.IT cs.LG eess.SP stat.ML

    Joint User Pairing and Association for Multicell NOMA: A Pointer Network-based Approach

    Authors: Manyou Ma, Vincent W. S. Wong

    Abstract: In this paper, we investigate the joint user pairing and association problem for multicell non-orthogonal multiple access (NOMA) systems. We consider a scenario where the user equipments (UEs) are located in a multicell network equipped with multiple base stations. Each base station has multiple orthogonal physical resource blocks (PRBs). Each PRB can be allocated to a pair of UEs using NOMA. Each… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: accepted for publication in Proc. of 6th International Workshop on NOMA for 5G and Beyond, co-located with IEEE International Conference on Communications (ICC), Dublin, Ireland, Jun. 2020

  13. arXiv:1901.04372  [pdf, other

    cs.DS math.OC

    Online Inventory Management with Application to Energy Procurement in Data Centers

    Authors: Lin Yang, Mohammad H. Hajiesmaili, Ramesh Sitaraman, Enrique Mallada, Wing S. Wong, Adam Wierman

    Abstract: Motivated by the application of energy storage management in electricity markets, this paper considers the problem of online linear programming with inventory management constraints. Specifically, a decision maker should satisfy some units of an asset as her demand, either form a market with time-varying price or from her own inventory. The decision maker is presented a price in slot-by-slot manne… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

  14. arXiv:1811.04216  [pdf, other

    cs.IT cs.NI

    On Stability Condition of Wireless Networked Control Systems under Joint Design of Control Policy and Network Scheduling Policy

    Authors: Lei Deng, Cheng Tan, Wing Shing Wong

    Abstract: In this paper, we study a wireless networked control system (WNCS) with $N \ge 2$ sub-systems sharing a common wireless channel. Each sub-system consists of a plant and a controller and the control message must be delivered from the controller to the plant through the shared wireless channel. The wireless channel is unreliable due to interference and fading. As a result, a packet can be successful… ▽ More

    Submitted 10 November, 2018; originally announced November 2018.

  15. arXiv:1809.02826  [pdf, other

    cs.NI

    Delay-Constrained Input-Queued Switch

    Authors: Lei Deng, Wing Shing Wong, Po-Ning Chen, Yunghsiang S. Han, Hanxu Hou

    Abstract: In this paper, we study the delay-constrained input-queued switch where each packet has a deadline and it will expire if it is not delivered before its deadline. Such new scenario is motivated by the proliferation of real-time applications in multimedia communication systems, tactile Internet, networked controlled systems, and cyber-physical systems. The delay-constrained input-queued switch is co… ▽ More

    Submitted 27 September, 2018; v1 submitted 8 September, 2018; originally announced September 2018.

  16. arXiv:1804.05358  [pdf, other

    cs.DC

    Forwarding and Optical Indices in an All-Optical BCube Network

    Authors: Suzhen Wang, Jingjing Luo, Yuan-Hsun Lo, Wing Shing Wong

    Abstract: BCube is a highly scalable and cost-effective networking topology, which has been widely applied to modular datacenters. Optical technologies based on Wavelength Division Multiplexing (WDM) are gaining popularity for Data Center Networks (DCNs) due to their technological strengths such as low communication latency, low power consumption, and high link bandwidth. Therefore, it is worth investigatin… ▽ More

    Submitted 15 April, 2018; originally announced April 2018.

    Comments: 8 pages, 4 figures, a conference paper

  17. Cache-Aided Non-Orthogonal Multiple Access: The Two-User Case

    Authors: Lin Xiang, Derrick Wing Kwan Ng, Xiaohu Ge, Zhiguo Ding, Vincent W. S. Wong, Robert Schober

    Abstract: In this paper, we propose a cache-aided non-orthogonal multiple access (NOMA) scheme for spectrally efficient downlink transmission. The proposed scheme not only reaps the benefits associated with NOMA and caching, but also exploits the data cached at the users for interference cancellation. As a consequence, caching can help to reduce the residual interference power, making multiple decoding orde… ▽ More

    Submitted 19 March, 2019; v1 submitted 29 January, 2018; originally announced January 2018.

    Comments: Accepted for publication in IEEE J. Sel. Topics Signal Process. arXiv admin note: text overlap with arXiv:1712.09557

  18. arXiv:1712.09557  [pdf, ps, other

    cs.IT

    Cache-Aided Non-Orthogonal Multiple Access

    Authors: Lin Xiang, Derrick Wing Kwan Ng, Xiaohu Ge, Zhiguo Ding, Vincent W. S. Wong, Robert Schober

    Abstract: In this paper, we propose a novel joint caching and non-orthogonal multiple access (NOMA) scheme to facilitate advanced downlink transmission for next generation cellular networks. In addition to reaping the conventional advantages of caching and NOMA transmission, the proposed cache-aided NOMA scheme also exploits cached data for interference cancellation which is not possible with separate cachi… ▽ More

    Submitted 29 January, 2018; v1 submitted 27 December, 2017; originally announced December 2017.

    Comments: Accepted for presentation at IEEE ICC 2018

  19. arXiv:1711.02483  [pdf, ps, other

    cs.IT

    Cache-Enabled Physical Layer Security for Video Streaming in Backhaul-Limited Cellular Networks

    Authors: Lin Xiang, Derrick Wing Kwan Ng, Robert Schober, Vincent W. S. Wong

    Abstract: In this paper, we propose a novel wireless caching scheme to enhance the physical layer security of video streaming in cellular networks with limited backhaul capacity. By proactively sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperative joint transmission of several BSs can be dynamically enabled in accordance with the cache status… ▽ More

    Submitted 7 November, 2017; originally announced November 2017.

    Comments: Accepted for publication in IEEE Trans. Wireless Commun.; 17 pages, 5 figures

  20. arXiv:1711.01526  [pdf, other

    cs.LG eess.SY math.OC

    On Identification of Distribution Grids

    Authors: Omid Ardakanian, Vincent W. S. Wong, Roel Dobbe, Steven H. Low, Alexandra von Meier, Claire Tomlin, Ye Yuan

    Abstract: Large-scale integration of distributed energy resources into residential distribution feeders necessitates careful control of their operation through power flow analysis. While the knowledge of the distribution system model is crucial for this type of analysis, it is often unavailable or outdated. The recent introduction of synchrophasor technology in low-voltage distribution grids has created an… ▽ More

    Submitted 4 November, 2017; originally announced November 2017.

  21. arXiv:1710.06089  [pdf, other

    cs.DC cs.GT cs.NI

    Hierarchical Fog-Cloud Computing for IoT Systems: A Computation Offloading Game

    Authors: Hamed Shah-Mansouri, Vincent W. S. Wong

    Abstract: Fog computing, which provides low-latency computing services at the network edge, is an enabler for the emerging Internet of Things (IoT) systems. In this paper, we study the allocation of fog computing resources to the IoT users in a hierarchical computing paradigm including fog and remote cloud computing services. We formulate a computation offloading game to model the competition between IoT us… ▽ More

    Submitted 17 October, 2017; originally announced October 2017.

  22. arXiv:1709.04136  [pdf, other

    cs.LG

    Recursive Exponential Weighting for Online Non-convex Optimization

    Authors: Lin Yang, Cheng Tan, Wing Shing Wong

    Abstract: In this paper, we investigate the online non-convex optimization problem which generalizes the classic {online convex optimization problem by relaxing the convexity assumption on the cost function. For this type of problem, the classic exponential weighting online algorithm has recently been shown to attain a sub-linear regret of $O(\sqrt{T\log T})$. In this paper, we introduce a novel recursi… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

  23. arXiv:1708.09135  [pdf, other

    cs.DC

    Randomized Load-balanced Routing for Fat-tree Networks

    Authors: Suzhen Wang, Jingjing Luo, Bruce Kwong-Bun Tong, Wing S. Wong

    Abstract: Fat-tree networks have been widely adopted to High Performance Computing (HPC) clusters and to Data Center Networks (DCN). These parallel systems usually have a large number of servers and hosts, which generate large volumes of highly-volatile traffic. Thus, distributed load-balancing routing design becomes critical to achieve high bandwidth utilization, and low-latency packet delivery. Existing d… ▽ More

    Submitted 30 August, 2017; originally announced August 2017.

    Comments: 13 pages, 1 table, 6 figure,

  24. arXiv:1707.08050  [pdf, ps, other

    cs.IT

    Secure Video Streaming in Heterogeneous Small Cell Networks with Untrusted Cache Helpers

    Authors: Lin Xiang, Derrick Wing Kwan Ng, Robert Schober, Vincent W. S. Wong

    Abstract: This paper studies secure video streaming in cache-enabled small cell networks, where some of the cache-enabled small cell base stations (BSs) helping in video delivery are untrusted. Unfavorably, caching improves the eavesdropping capability of these untrusted helpers as they may intercept both the cached and the delivered video files. To address this issue, we propose joint caching and scalable… ▽ More

    Submitted 29 January, 2018; v1 submitted 25 July, 2017; originally announced July 2017.

    Comments: Accepted for publication in IEEE Trans. Wireless Commun

  25. arXiv:1612.01189  [pdf, other

    cs.IT

    Cache-Enabled Physical-Layer Security for Video Streaming in Wireless Networks with Limited Backhaul

    Authors: Lin Xiang, Derrick Wing Kwan Ng, Robert Schober, Vincent W. S. Wong

    Abstract: In this paper, we investigate for the first time the benefits of wireless caching for the physical layer security (PLS) of wireless networks. In particular, a caching scheme enabling power-efficient PLS is proposed for cellular video streaming with constrained backhaul capacity. By sharing video data across a subset of base stations (BSs) through both caching and backhaul loading, secure cooperati… ▽ More

    Submitted 4 December, 2016; originally announced December 2016.

    Comments: Accepted for presentation at IEEE Globecom 2016, Washington, DC, Dec. 2016

  26. arXiv:1611.03012  [pdf, ps, other

    cs.IT math.CO

    New CRT sequence sets for a collision channel without feedback

    Authors: Yijin Zhang, Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong

    Abstract: Protocol sequences are binary and periodic sequences used for deterministic multiple access in a collision channel without feedback. In this paper, we focus on user-irrepressible (UI) protocol sequences that can guarantee a positive individual throughput per sequence period with probability one for a slot-synchronous channel, regardless of the delay offsets among the users. As the sequence period… ▽ More

    Submitted 4 July, 2017; v1 submitted 9 November, 2016; originally announced November 2016.

    Comments: 21 pages, 1 figure, 4 tables

  27. arXiv:1609.05448   

    cs.IT

    Achieving Zero-Error Capacity 1 for a Collision Channel Without Feedback

    Authors: Yijin Zhang, Yi Chen, Yuan-Hsun Lo, Wing Shing Wong

    Abstract: The collision channel without feedback (CCw/oFB) model introduced by Massey and Mathys, depicts a scenario in which M users share a thermal noise-free communication channel with random relative time offsets among their clocks. This paper considers an extension of this model, which allows the receiver to use successive interference cancellation (SIC) to iteratively cancel the interference caused by… ▽ More

    Submitted 21 February, 2019; v1 submitted 18 September, 2016; originally announced September 2016.

    Comments: We find some mistakes in basic definitions

  28. arXiv:1603.08179  [pdf, ps, other

    cs.IT

    Channel Hopping Sequences for Maximizing Rendezvous Diversity in Cognitive Radio Networks

    Authors: Yijin Zhang, Yuan-Hsun Lo, Wing Shing Wong

    Abstract: In cognitive radio networks (CRNs), establishing a communication link between a pair of secondary users (SUs) requires them to rendezvous on a common channel which is not occupied by primary users (PUs). Under time-varying PU traffic, asynchronous sequence-based channel hopping (CH) with the maximal rendezvous diversity is a representative technique to guarantee an upper bounded time-torendezvous… ▽ More

    Submitted 15 April, 2016; v1 submitted 27 March, 2016; originally announced March 2016.

    Comments: 24 pages, 8 figures, 1 table. submitted to TWC

  29. arXiv:1511.05410  [pdf, ps, other

    cs.IT cs.NI

    Cross-Layer Optimization of Fast Video Delivery in Cache-Enabled Relaying Networks

    Authors: Lin Xiang, Derrick Wing Kwan Ng, Toufiqul Islam, Robert Schober, Vincent W. S. Wong

    Abstract: This paper investigates the cross-layer optimization of fast video delivery and caching for minimization of the overall video delivery time in a two-hop relaying network. The half-duplex relay nodes are equipped with both a cache and a buffer which facilitate joint scheduling of fetching and delivery to exploit the channel diversity for improving the overall delivery performance. The fast delivery… ▽ More

    Submitted 17 November, 2015; originally announced November 2015.

    Comments: 7 pages, 4 figures; accepted for presentation at IEEE Globecom, San Diego, CA, Dec. 2015

  30. arXiv:1509.07029  [pdf, other

    cs.DM

    The Global Packing Number for an Optical Network

    Authors: Yuan-Hsun Lo, Yijin Zhang, Wing Shing Wong, Hung-Lin Fu

    Abstract: The global packing number problem arises from the investigation of optimal wavelength allocation in an optical network that employs Wavelength Division Multiplexing (WDM). Consider an optical network that is represented by a connected, simple graph $G$. We assume all communication channels are bidirectional, so that all links and paths are undirected. It follows that there are ${|G|\choose 2}$ dis… ▽ More

    Submitted 23 September, 2015; originally announced September 2015.

    Comments: 23 pages, 3 figures

  31. arXiv:1505.05290  [pdf, other

    stat.ME cs.IT

    Sparsest Error Detection via Sparsity Invariant Transformation based $\ell_1$ Minimization

    Authors: Suzhen Wang, Sheng Han, Zhiguo Zhang, Wing Shing Wong

    Abstract: This paper presents a new method, referred to here as the sparsity invariant transformation based $\ell_1$ minimization, to solve the $\ell_0$ minimization problem for an over-determined linear system corrupted by additive sparse errors with arbitrary intensity. Many previous works have shown that $\ell_1$ minimization can be applied to realize sparse error detection in many over-determined linear… ▽ More

    Submitted 20 May, 2015; originally announced May 2015.

    Comments: 20 pages, single column. 7 Figures. To be submitted and under review

  32. Partially user-irrepressible sequence sets and conflict-avoiding codes

    Authors: Yuan-Hsun Lo, Wing Shing Wong, Hung-Lin Fu

    Abstract: In this paper we give a partial shift version of user-irrepressible sequence sets and conflict-avoiding codes. By means of disjoint difference sets, we obtain an infinite number of such user-irrepressible sequence sets whose lengths are shorter than known results in general. Subsequently, the newly defined partially conflict-avoiding codes are discussed.

    Submitted 15 May, 2016; v1 submitted 10 November, 2014; originally announced December 2014.

    Comments: 13 pages, 4 figures, 3 tables. Published in Designs, Codes and Cryptography

    MSC Class: 94B25; 94C15; 05B10

    Journal ref: Des. Codes Cryptogr. (2016) 78:679-691

  33. Optimal strongly conflict-avoiding codes of even length and weight three

    Authors: Yijin Zhang, Yuan-Hsun Lo, Wing Shing Wong

    Abstract: Strongly conflict-avoiding codes (SCACs) are employed in a slot-asynchronous multiple-access collision channel without feedback to guarantee that each active user can send at least one packet successfully in the worst case within a fixed period of time. Assume all users are assigned distinct codewords, the number of codewords in an SCAC is equal to the number of potential users that can be support… ▽ More

    Submitted 10 November, 2014; v1 submitted 24 June, 2014; originally announced June 2014.

    Comments: 18 pages, 1 figure. Submitted to Designs, Codes and Cryptography. 1st revision

    MSC Class: 94B25; 94C30; 11A15

    Journal ref: Des. Codes Cryptogr. (2016) 79:367-382

  34. arXiv:1401.6260  [pdf, ps, other

    cs.IT

    Protocol Sequences for Multiple-Packet Reception

    Authors: Yijin Zhang, Yuan-Hsun Lo, Feng Shu, Wing Shing Wong

    Abstract: Consider a time slotted communication channel shared by $K$ active users and a single receiver. It is assumed that the receiver has the ability of the multiple-packet reception (MPR) to correctly receive at most $γ$ ($1 \leq γ< K$) simultaneously transmitted packets. Each user accesses the channel following a specific periodical binary sequence, called the protocol sequence, and transmits a packet… ▽ More

    Submitted 26 September, 2014; v1 submitted 24 January, 2014; originally announced January 2014.

    Comments: 25 pages, 4 figures. A revision submitted to IEEE Trans. Inform. Theory

  35. arXiv:1304.6496  [pdf, other

    cs.NI

    Transmission Sequence Design and Allocation for Wide Area Ad Hoc Networks

    Authors: Wing Shing Wong

    Abstract: In this paper we examine the problem of designing and allocating transmission sequences to users in a mobile ad hoc network that has no spatial boundary. A basic tenet of the transmission sequence approach for addressing media access control is that under normal operating conditions, there is no feedback triggered re-transmission. This obviously is a major departure from the Slotted-ALOHA or CSMA… ▽ More

    Submitted 30 May, 2013; v1 submitted 24 April, 2013; originally announced April 2013.

  36. Construction and Applications of CRT Sequences

    Authors: Kenneth W. Shum, Wing Shing Wong

    Abstract: Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the protocol sequence. In order to minimize fluctuation of throughput due to delay offsets, we want to construct protocol sequences whose pairwise Hamming cross-correlation is as close to a constant as possible. In this paper… ▽ More

    Submitted 8 November, 2010; v1 submitted 29 June, 2010; originally announced June 2010.

    Comments: 16 pages, 5 figures. Some typos in Section V are corrected

    Journal ref: IEEE Trans. on Information Theory, vol. 56, no. 11, p.5780-5795, Nov, 2010

  37. arXiv:1004.4713  [pdf, ps, other

    cs.IT cs.DM

    Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee

    Authors: Kenneth W. Shum, Wing Shing Wong

    Abstract: Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worst-case system throughput is proposed. The construction is based on Chinese remainder theorem. The Hamming crosscorrelation is proved to be concentrated around the mean. The sequence period is much shorter than existing protocol s… ▽ More

    Submitted 27 April, 2010; originally announced April 2010.

    Comments: Conference paper submitted to 2010 IEEE Int. Symp. on Information Theory

  38. A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes

    Authors: Kenneth W. Shum, Wing Shing Wong, Chung Shue Chen

    Abstract: Conflict-avoiding codes are used in the multiple-access collision channel without feedback. The number of codewords in a conflict-avoiding code is the number of potential users that can be supported in the system. In this paper, a new upper bound on the size of conflict-avoiding codes is proved. This upper bound is general in the sense that it is applicable to all code lengths and all Hamming weig… ▽ More

    Submitted 6 November, 2010; v1 submitted 27 October, 2009; originally announced October 2009.

    Comments: 10 pages, 1 figure

    Journal ref: IEEE Trans. Inform. Theory, vol. 56, no.7, p.3265-3276, Jul, 2010

  39. Inter-Session Network Coding with Strategic Users: A Game-Theoretic Analysis of Network Coding

    Authors: Amir-Hamed Mohsenian-Rad, Jianwei Huang, Vincent W. S. Wong, Sidharth Jaggi, Robert Schober

    Abstract: A common assumption in the existing network coding literature is that the users are cooperative and non-selfish. However, this assumption can be violated in practice. In this paper, we analyze inter-session network coding in a wired network using game theory. We assume selfish users acting strategically to maximize their own utility, leading to a resource allocation game among users. In particul… ▽ More

    Submitted 19 April, 2009; originally announced April 2009.

    Comments: 50 pages. To be presented at ICC 2009. Submitted to IEEE Transactions on IT