EURECOM

Displaying 1-40 of 115 results

  • White Papers // Apr 2014

    Private and Dynamic Time-Series Data Aggregation With Trust Relaxation

    With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that allows the data analyzer to compute global statistics over the set of individual inputs that are...

    Provided By EURECOM

  • White Papers // Sep 2013

    ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage

    With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of...

    Provided By EURECOM

  • White Papers // Sep 2013

    Towards the Model-Driven Engineering of Security Requirements for Embedded Systems

    This paper discusses why and how security requirements engineering must be adapted to the model-driven approach usually adopted to design and develop embedded systems. In particular, the authors discuss to what extent the elicitation of security requirements and the Y-chart partitioning approach, a central design methodology in embedded systems, can...

    Provided By EURECOM

  • White Papers // Sep 2013

    Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting

    Fingerprinting 802.11 devices has been proposed to identify devices in order to mitigate IEEE 802.11 weaknesses. However, important limitations prevent any real deployment. On the first hand, fingerprinting has a low accuracy when the devices have similar hardware and software. On the second hand, attackers may forge signatures to impersonate...

    Provided By EURECOM

  • White Papers // Jul 2013

    Elastic SIEM: Elastic Detector Integrated With OSSIM

    Cloud computing adoption is rising fast. Flexibility, pay-per-use and available resources on-demand with the promise of lower ownership costs are a very attractive value proposition. On the other hand, Infrastructure as a Service (IaaS) providers, such as Amazon Web Services (AWS), are being asked for flexible cloud offerings while needing...

    Provided By EURECOM

  • White Papers // Jul 2013

    Secure Alert Tracking in Supply Chain

    Risk management practices, techniques and tools with respect to companies' supply chains have begun to receive more attention recently, as the need to improve supply chain performances has increased in order to keep the balance between financial considerations and those of the customer interests. With the multiplication of intermediate actors,...

    Provided By EURECOM

  • White Papers // Jun 2013

    Bootstrapping Security Associations in Opportunistic Networks

    Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper, the authors analyze the requirements of key management in the framework of opportunistic networks and content-based forwarding. This key management solution relies on two phases: a first phase where nodes are...

    Provided By EURECOM

  • White Papers // Jun 2013

    Effective and Efficient Security Policy Engines for Automotive On-Board Networks

    The configuration of security mechanisms in automotive onboard networks makes it necessary to define and deploy adapted security policies. This paper discusses how to design policy engines that implement an effective enforcement in such architectures despite the complexity of the protocol stacks of on-board electronic control units. It also evaluates...

    Provided By EURECOM

  • White Papers // Jun 2013

    The Role of Phone Numbers in Understanding Cyber-Crime Schemes

    Internet and telephones are part of everyone's modern life. Unfortunately, several criminal activities also rely on these technologies to reach their victims. While the use and importance of the Internet has been largely studied, previous work overlooked the role that phone numbers can play in understanding online threats. In this...

    Provided By EURECOM

  • White Papers // Jun 2013

    QoE-Aware Traffic Management for Mobile Video Delivery

    Video delivery has become a major challenge for mobile networks. The increasing spread of smartphones, along with the expanding availability of LTE coverage, has contributed to an extensively growing mobile video demand, bringing large volumes of video traffic and far exceeding the capacity of mobile networks. As a result, wireless...

    Provided By EURECOM

  • White Papers // Jun 2013

    Degrees of Freedom of Downlink Single-And Multi-Cell Multi-User MIMO Systems With Location Based CSIT

    Multiple antennas facilitate the coexistence of multiple users in wireless communications, leading to spatial multiplexing and spatial division and to significant system capacity increase. However, this comes at the cost of very precise Channel State Information at the Transmitters (CSIT). The authors advocate the use of channel propagation models to...

    Provided By EURECOM

  • White Papers // Jun 2013

    Analysis of Pilot Decontamination Based on Power Control

    A subspace method for channel estimation is proposed for asymmetric antenna array systems. The so-called pilot contamination problem reported in is found to be due to the linearity of channel estimation in. The authors show that it does not occur in cellular systems with power control and power-controlled handoff when...

    Provided By EURECOM

  • White Papers // Jun 2013

    MIMO BC With Imperfect and Delayed Channel State Information at the Transmitter and Receivers

    In the setting of the two-user (M;N) Multiple-Input Multiple-Output (MIMO) Broadcast Channel (BC), recent work by Maddah-Ali and Tse, and Vaze and Varanasi have revealed the usefulness of delayed Channel State Information at the Transmitter (perfect delayed CSIT). The authors' work studies the general case of communicating with imperfect delayed...

    Provided By EURECOM

  • White Papers // Jun 2013

    Implementation and Test of a DSRC Prototype on OpenAirInterface SDR Platform

    This paper presents OpenAirITS, an open-source Software-Defined Radio platform for DSRC (802.11p) technology. They extended the Linux 802.11 subsystem, developed a soft-modem and a dedicated driver for the OpenAirInterface Express-MIMO FPGA board. The low-layer PHY functions of DSRC have not been coded on the chipset, but instead as a soft-modem,...

    Provided By EURECOM

  • White Papers // May 2013

    Space Time Interference Alignment Scheme for the MIMO BC and IC with Delayed Csit and Finite Coherence Time

    Interference is a major limitation in wireless networks and the search for efficient ways of transmitting in this context has been productive and diversified. Numerous techniques allow the increase of the multiplexing gain. However, most techniques, even promising linear solutions rely on perfect current CSIT which is not realistic. Though...

    Provided By EURECOM

  • White Papers // May 2013

    Reference Monitors for Security and Interoperability in OAuth 2.0

    OAuth 2.0 is a recent IETF standard devoted to providing authorization to clients requiring access to specific resources over HTTP. It was recently adopted by major internet players like Google, Facebook, and Microsoft. It has been pointed out that this framework is potentially subject to security issues, as well as...

    Provided By EURECOM

  • White Papers // May 2013

    Evolving Security Requirements in Multi-Layered Service-Oriented-Architectures

    Due to today's rapidly changing corporate environments, business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet of services, and the introduction of new security regulations (imposed by national and international regulatory bodies,...

    Provided By EURECOM

  • White Papers // Apr 2013

    Power Monitor V2: Novel PowEr Saving Android Application

    This paper presents a novel scheme to derive power saving profiles based on the usage patterns of the Android devices. The entire architecture is developed as an Android app "Power Monitor v2" and is deployed to the smart devices. A monitoring module of the app periodically collects several data from...

    Provided By EURECOM

  • White Papers // Apr 2013

    Broadcasting User Content Over Novel Mobile Networks

    In the "Youtube Era", mobile consumption of video, such as Video on Demand (VoD) and User Generated Content (UGC), has been steadily increasing. However, mobile networks are showing to be unprepared for such phenomenal traffic volume, whereas the devices' multiple interfaces are being exploited to address this problem. As such,...

    Provided By EURECOM

  • White Papers // Mar 2013

    An Architecture to Aggregate Heterogeneous and Semantic Sensed Data

    Sensor networks are used in a great deal of realms such as home monitoring, environmental monitoring (e.g., weather forecasting), health monitoring (e.g., pacemaker, brain waves), vehicular networks, etc. The authors are surrounding by sensor networks such as healthcare, home or environmental monitoring, weather forecasting, etc. All sensor-based applications proposed are...

    Provided By EURECOM

  • White Papers // Mar 2013

    The DoF of Network MIMO With Backhaul Delays

    The authors consider the problem of downlink precoding for Network (multi-cell) MIMO networks where Transmitters (TXs) are provided with imperfect Channel State Information (CSI). Specifically, each TX receives a delayed channel estimate with the delay being specific to each channel component. This model is particularly adapted to the scenarios where...

    Provided By EURECOM

  • White Papers // Mar 2013

    A P2P Based Usage Control Enforcement Scheme Resilient to Re-injection Attacks

    Existing privacy controls based on access control techniques do not prevent massive dissemination of private data by malevolent acquaintances of social network, unauthorized duplication of files or personal messages, or persistence of some files in third-party operated storage beyond their deletion by their owners. The authors suggest a usage control...

    Provided By EURECOM

  • White Papers // Feb 2013

    On the Value of Spectrum Sharing Among Operators in Multicell Networks

    This paper considers the benefits of allowing spectrum sharing among co-located wireless service providers operating in the same multi-cell network. Although spectrum sharing was shown to be valuable in some scenarios where the created interference can be eliminated, the benefits have not clearly shown for multi-cell networks with aggressive reuse....

    Provided By EURECOM

  • White Papers // Feb 2013

    Optimal Combining of Instantaneous and Statistical CSI in the SIMO Interference Channel

    The uplink of the two-user multiple-antenna interference channel is considered and the optimal (in the ergodic rate sense) BeamForming (BF) problem is posed and solved. Specifically, a feedback scenario is studied whereby a Base Station (BS) is allowed to estimate the instantaneous channel vector information from the users it serves,...

    Provided By EURECOM

  • White Papers // Feb 2013

    Decontaminating Pilots in Massive MIMO Systems

    Pilot contamination is known to severely limit the performance of large-scale antenna ("Massive MIMO") systems due to degraded channel estimation. This paper proposes a twofold approach to this problem. First, the authors show analytically that pilot contamination can be made to vanish asymptotically in the number of antennas for a...

    Provided By EURECOM

  • White Papers // Jan 2013

    T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags

    One prominent application of RFID technology is the automation of safety inspections when transporting hazardous goods such as highly reactive chemicals in supply chains. Here, it is dangerous to place specific, reactive chemicals close to each other, because small leaks can already result in a threat to the life of...

    Provided By EURECOM

  • White Papers // Jan 2013

    Secure Product Tracking in Supply Chain

    In this paper, the authors propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors' privacy. Their solution is based on generating identifiers of the actors and...

    Provided By EURECOM

  • White Papers // Dec 2012

    Behind the Scenes of Online Attacks: An Analysis of Exploitation Behaviors on the Web

    Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This...

    Provided By EURECOM

  • White Papers // Nov 2012

    A General Scalable and Accurate Decentralized Level Monitoring Method for Large-Scale Dynamic Service Provision in Hybrid Clouds

    Hybrid cloud computing combines private clouds with geographically-distributed resources from public clouds, desktop grids or in-house gateways to provide the most flexibility of each kind of cloud platforms. Service provisioning for wide-area applications such as cloud backup or cloud network games is sensitive to wide-area network metric such as round...

    Provided By EURECOM

  • White Papers // Nov 2012

    On the Resilience of the Dependability Framework to the Intrusion of New Security Threats

    Initially thought of with a strong emphasis on accidental faults, it has paid more attention over the years to intentional ones and, thus, to classical security concepts as well. Recently, a couple of incidents have received a lot of attention: the Hydraq and Stuxnet worms outbreaks. They have been used...

    Provided By EURECOM

  • White Papers // Nov 2012

    HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems

    Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly syntax, making it difficult for security administrators and for business analysts to create intelligible specifications. The authors introduce the Hierarchical Policy Language for Distributed Systems (HiPoLDS), which has...

    Provided By EURECOM

  • White Papers // Sep 2012

    Computing the Nash Equilibria of Intruder Classification Games

    The authors investigate the problem of classifying an intruder of two different types (spy or spammer). The classification is based on the number of file server and mail server attacks a network defender observes during a fixed window. The spammer naively attacks (with a known distribution) his main target: the...

    Provided By EURECOM

  • White Papers // Sep 2012

    Towards Assisted Remediation of Security Vulnerabilities

    Security vulnerabilities are still prevalent in systems despite the existence of their countermeasures for several decades. In order to detect the security vulnerabilities missed by developers, complex solutions are undertaken like static analysis, often after the development phase and with a loss of context. Although vulnerabilities are found, there is...

    Provided By EURECOM

  • White Papers // Sep 2012

    Catch the Jammer in Wireless Sensor Network

    Jamming attacks can severely affect the performance of Wireless Sensor Networks (WSNs) due to their broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the source of the attack. In this paper, the authors investigate the feasibility of localizing an omni-antenna...

    Provided By EURECOM

  • White Papers // Sep 2012

    Data Transfer Scheduling for P2P Storage

    In peer-to-peer storage and backup applications, large amounts of data have to be transferred between nodes. In general, recipient of data transfers are not chosen randomly from the whole set of nodes in the peer-to-peer networks, but they are chosen according to peer selection rules imposing several criteria, such as...

    Provided By EURECOM

  • White Papers // Jul 2012

    A Measurement Study of the Wuala On-line Storage Service

    Wuala is a popular online backup and file sharing system that has been successfully operated for several years. Very little is known about the design and implementation of Wuala. The authors capture the network traffic exchanged between the machines participating in Wuala to reverse engineer the design and operation of...

    Provided By EURECOM

  • White Papers // Jun 2012

    Enabling Message Security for RESTful Services

    The security and dependability of cloud applications require strong confidence in the communication protocol used to access web resources. The mainstream service providers nowadays are shifting to REST-based services in the detriment of SOAP-based ones. REST proposes a lightweight approach to consume resources with no specific encapsulation, thus lacking of...

    Provided By EURECOM

  • White Papers // Jun 2012

    Android Stack Integration in Embedded Systems

    Smartphone usage has increased manifold upon introduction of Google's Android. Since its introduction, Android has evolved at an outstanding pace in terms of application development, commercialization and market share of Android powered devices. Although originally developed for Smartphones, now the embedded system industry has realized the capabilities of Android. Due...

    Provided By EURECOM

  • White Papers // May 2012

    CSI Feedback Allocation in Multicell MIMO Channels

    In this paper, the authors consider the joint pre-coding across K Transmitters (TXs), sharing the knowledge of the user's data symbols being transmitted to K single-antenna Receivers (RXs). They consider a Distributed Channel State Information (DCSI) configuration where each TX has its own local estimate of the overall multiuser MIMO...

    Provided By EURECOM

  • White Papers // May 2012

    On Enhancing Inter-User Spatial Separation for Downlink Multiuser MIMO Systems

    In practical downlink multiuser MIMO channels, users' channels are non-orthogonal, which results in inter-user interference and in turn degrades system performance. In this paper, a new subspace-domain linear transmit preprocessing technique is proposed in enhancing users' spatial separation and suppressing inter-user interference. The authors show by simulations that sum rate...

    Provided By EURECOM

  • White Papers // Dec 2012

    Behind the Scenes of Online Attacks: An Analysis of Exploitation Behaviors on the Web

    Web attacks are nowadays one of the major threats on the Internet, and several studies have analyzed them, providing details on how they are performed and how they spread. However, no study seems to have sufficiently analyzed the typical behavior of an attacker after a website has been compromised. This...

    Provided By EURECOM

  • White Papers // Sep 2010

    Space-Time Codes That Are Approximately Universal for the Parallel, Multi-Block and Cooperative DDF Channels

    Explicit codes are constructed that achieve the diversity-multiplexing gain tradeoff (DMT) of the cooperativerelay channel under the dynamic decode-and-forward protocol for any network size and for all numbers of transmit and receive antennas at the relays. Along the way, the authors prove that spacetime codes previously constructed in the literature...

    Provided By EURECOM

  • White Papers // May 2010

    Low Complexity Soft Detection for Spatially Multiplexed BICM MIMO OFDM System

    This paper presents a new approach to soft detection of spatial data streams in Multiple Input Multiple Output (MIMO) channels in slow fading channels. The authors focus on high spectral efficiency Bit Interleaved Coded Modulation (BICM) MIMO OFDM system where, after serial to parallel conversion and per antenna coding, spatial...

    Provided By EURECOM

  • White Papers // Nov 2010

    Linear Precoders for Multiuser MIMO for Finite Constellations and a Simplified Receiver Structure Under Controlled Interference

    This paper is an extension to the earlier proposed idea of exploiting the discrete constellation alphabets in linear precoding for the downlink of MultiUser (MU) MIMO. In the earlier work, it was shown that the transmission of controlled interference to the users bears the potential of exploiting the interference structure...

    Provided By EURECOM

  • White Papers // Jan 2010

    On Full Diversity Equalization for Precoded Block Transmission Systems

    Equalization techniques other than Maximum Likelihood Equalization (MLE) that collect full diversity offered by doubly selective channels are investigated. With appropriate precoding at the transmitter, it is known the both Linear Equalizers (LE) and MLE collect full multiplicative multipath-Doppler diversity available in the channel. The authors close the gap between...

    Provided By EURECOM

  • White Papers // Oct 2009

    Energy Efficiency of SISO Algorithms for Turbo-Decoding Message-Passing LDPC Decoders

    The decoding of LDPC codes using the turbo-decoding message-passing strategy is considered. This strategy can be used with different SISO message computation kernels. The authors analyze the suitability for VLSI implementation of various message computation algorithms in terms of implementation area, energy consumption and error-correcting performance. As one of the...

    Provided By EURECOM

  • White Papers // May 2010

    Channel Capacity for Linearly Precoded Multiuser MIMO for Discrete Constellations

    This paper is based on the idea of exploiting the discrete constellation alphabets in linear precoding for the downlink of MultiUser (MU) MIMO. The authors study the effect of discrete constellation inputs on the sum rate of different linear pre-coders while confining ourselves to the case of two single antenna...

    Provided By EURECOM

  • White Papers // Apr 2013

    Power Monitor V2: Novel PowEr Saving Android Application

    This paper presents a novel scheme to derive power saving profiles based on the usage patterns of the Android devices. The entire architecture is developed as an Android app "Power Monitor v2" and is deployed to the smart devices. A monitoring module of the app periodically collects several data from...

    Provided By EURECOM

  • White Papers // Feb 2013

    On the Value of Spectrum Sharing Among Operators in Multicell Networks

    This paper considers the benefits of allowing spectrum sharing among co-located wireless service providers operating in the same multi-cell network. Although spectrum sharing was shown to be valuable in some scenarios where the created interference can be eliminated, the benefits have not clearly shown for multi-cell networks with aggressive reuse....

    Provided By EURECOM

  • White Papers // Jun 2013

    Degrees of Freedom of Downlink Single-And Multi-Cell Multi-User MIMO Systems With Location Based CSIT

    Multiple antennas facilitate the coexistence of multiple users in wireless communications, leading to spatial multiplexing and spatial division and to significant system capacity increase. However, this comes at the cost of very precise Channel State Information at the Transmitters (CSIT). The authors advocate the use of channel propagation models to...

    Provided By EURECOM

  • White Papers // Feb 2013

    Optimal Combining of Instantaneous and Statistical CSI in the SIMO Interference Channel

    The uplink of the two-user multiple-antenna interference channel is considered and the optimal (in the ergodic rate sense) BeamForming (BF) problem is posed and solved. Specifically, a feedback scenario is studied whereby a Base Station (BS) is allowed to estimate the instantaneous channel vector information from the users it serves,...

    Provided By EURECOM

  • White Papers // May 2013

    Space Time Interference Alignment Scheme for the MIMO BC and IC with Delayed Csit and Finite Coherence Time

    Interference is a major limitation in wireless networks and the search for efficient ways of transmitting in this context has been productive and diversified. Numerous techniques allow the increase of the multiplexing gain. However, most techniques, even promising linear solutions rely on perfect current CSIT which is not realistic. Though...

    Provided By EURECOM

  • White Papers // Mar 2013

    An Architecture to Aggregate Heterogeneous and Semantic Sensed Data

    Sensor networks are used in a great deal of realms such as home monitoring, environmental monitoring (e.g., weather forecasting), health monitoring (e.g., pacemaker, brain waves), vehicular networks, etc. The authors are surrounding by sensor networks such as healthcare, home or environmental monitoring, weather forecasting, etc. All sensor-based applications proposed are...

    Provided By EURECOM

  • White Papers // Jun 2013

    Analysis of Pilot Decontamination Based on Power Control

    A subspace method for channel estimation is proposed for asymmetric antenna array systems. The so-called pilot contamination problem reported in is found to be due to the linearity of channel estimation in. The authors show that it does not occur in cellular systems with power control and power-controlled handoff when...

    Provided By EURECOM

  • White Papers // Jun 2013

    MIMO BC With Imperfect and Delayed Channel State Information at the Transmitter and Receivers

    In the setting of the two-user (M;N) Multiple-Input Multiple-Output (MIMO) Broadcast Channel (BC), recent work by Maddah-Ali and Tse, and Vaze and Varanasi have revealed the usefulness of delayed Channel State Information at the Transmitter (perfect delayed CSIT). The authors' work studies the general case of communicating with imperfect delayed...

    Provided By EURECOM

  • White Papers // Feb 2013

    Decontaminating Pilots in Massive MIMO Systems

    Pilot contamination is known to severely limit the performance of large-scale antenna ("Massive MIMO") systems due to degraded channel estimation. This paper proposes a twofold approach to this problem. First, the authors show analytically that pilot contamination can be made to vanish asymptotically in the number of antennas for a...

    Provided By EURECOM

  • White Papers // Apr 2013

    Broadcasting User Content Over Novel Mobile Networks

    In the "Youtube Era", mobile consumption of video, such as Video on Demand (VoD) and User Generated Content (UGC), has been steadily increasing. However, mobile networks are showing to be unprepared for such phenomenal traffic volume, whereas the devices' multiple interfaces are being exploited to address this problem. As such,...

    Provided By EURECOM

  • White Papers // Mar 2013

    The DoF of Network MIMO With Backhaul Delays

    The authors consider the problem of downlink precoding for Network (multi-cell) MIMO networks where Transmitters (TXs) are provided with imperfect Channel State Information (CSI). Specifically, each TX receives a delayed channel estimate with the delay being specific to each channel component. This model is particularly adapted to the scenarios where...

    Provided By EURECOM

  • White Papers // Jun 2013

    QoE-Aware Traffic Management for Mobile Video Delivery

    Video delivery has become a major challenge for mobile networks. The increasing spread of smartphones, along with the expanding availability of LTE coverage, has contributed to an extensively growing mobile video demand, bringing large volumes of video traffic and far exceeding the capacity of mobile networks. As a result, wireless...

    Provided By EURECOM

  • White Papers // Jun 2013

    Implementation and Test of a DSRC Prototype on OpenAirInterface SDR Platform

    This paper presents OpenAirITS, an open-source Software-Defined Radio platform for DSRC (802.11p) technology. They extended the Linux 802.11 subsystem, developed a soft-modem and a dedicated driver for the OpenAirInterface Express-MIMO FPGA board. The low-layer PHY functions of DSRC have not been coded on the chipset, but instead as a soft-modem,...

    Provided By EURECOM

  • White Papers // Sep 2010

    Error Exponents for Backhaul-Constrained Parallel Relay Networks

    In this paper, the authors assess the random coding Error Exponents (EEs) corresponding to Decode-and-Forward (DF), Compress-and-Forward (CF) and Quantize-and-Forward (QF) relaying strategies for a Parallel Relay Network (PRN), consisting of a single source and two relays. Moreover, through numerical analysis they show that the EEs achieved by using QF...

    Provided By EURECOM

  • White Papers // Mar 2009

    A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems

    In distributed storage systems, erasure codes represent an attractive solution to add redundancy to stored data while limiting the storage overhead. They are able to provide the same reliability as replication requiring much less storage space. Erasure coding breaks the data into pieces that are encoded and then stored on...

    Provided By EURECOM

  • White Papers // Aug 2011

    The Multiplexing Gain of the Network MIMO Channel With Distributed CSI

    In this paper, the authors discuss the joint precoding across K transmitters (TXs), sharing the knowledge of the data symbols to be transmitted toward K single-antenna receivers (RXs). They introduce a Distributed Channel State Information (DCSI) configuration where each TX has its own local estimate of the overall multiuser MIMO...

    Provided By EURECOM

  • White Papers // Nov 2010

    Beamforming on the MISO Interference Channel With Multi-User Decoding Capability

    This paper considers the Multiple-Input-Single-Output Interference Channel (MISO-IC) in which transmitters and receivers share the same time and frequency resources. The authors consider receivers with Interference Decoding Capability (IDC) so that the interference signal can be decoded and subtracted from the received signal. On the MISO-IC with single user decoding,...

    Provided By EURECOM

  • White Papers // Nov 2010

    Low-Complexity Multiple-Relay Strategies for Improving Uplink Coverage in 4G Wireless Networks

    In this paper the authors present low-complexity coded-modulation strategies for distributed relaying in 4G wireless networks. The primary goal of these strategies is to improve coverage on the uplink while retaining high spectral efficiency through multiuser spatial-multiplexing using two or more relays between the users and the base station. They...

    Provided By EURECOM

  • White Papers // Jan 2010

    Balancing Egoism and Altruism on Interference Channel: The MIMO Case

    This paper considers the so-called Multiple-Input-Multiple-Output interference channel (MIMO-IC) which has relevance in applications such as multi-cell coordination in cellular networks as well as spectrum sharing in cognitive radio networks among others. The authors address the design of precoding (i.e. beamforming) vectors at each sender with the aim of striking...

    Provided By EURECOM

  • White Papers // Aug 2009

    Hybrid Pilot/Quantization Based Feedback in Multi-Antenna TDD Systems

    The communication between a multiple-antenna transmitter and multiple receivers (users) with either a single or multiple-antenna each can be significantly enhanced by providing the Channel State Information at the Transmitter (CSIT) of the users, as this allows for scheduling, beamforming and multiuser multiplexing gains. The traditional view on how to...

    Provided By EURECOM

  • White Papers // Feb 2009

    Coordination on the Miso Interference Channel Using the Virtual SINR Framework

    This paper addresses the problem of coordination on the Interference Channel (IC), which has attracted a lot of attention in the research community recently. More precisely, coordinated beamforming is considered, in a multi-cell/link environment where base stations equipped with multiple antennas each attempt to serve a separate user despite the...

    Provided By EURECOM

  • White Papers // Jan 2011

    Spatial Transmit Prefiltering for Frequency-Flat MIMO Transmission With Mean and Covariance Information

    In this paper techniques are proposed for combining information about the mean and the covariance of the channel for the purpose of MIMO transmission. (Partial) Channel State Information at the Transmitter (CSIT) is typically used in MIMO systems for the design of spatial prefiltering and waterfilling. For the purpose of...

    Provided By EURECOM

  • White Papers // Feb 2011

    The Multiplexing Gain of a Two-Cell MIMO Channel With Unequal CSI

    In this paper, the joint precoding across two distant transmitters (TXs) to two receivers (RXs), each equipped with one antenna is discussed. The authors consider a distributed Channel State Information (CSI) configuration where each TX has a separate local estimate of the channel. The authors assume that no communication is...

    Provided By EURECOM

  • White Papers // May 2010

    Scheduling and CAC in IEEE 802.16 Fixed BWNs: A Comprehensive Survey and Taxonomy

    IEEE 802.16 technology has emerged as a competitive alternative to wireline broadband access solution. IEEE 802.16 can provide Quality of Service (QoS) guarantees for heterogeneous classes of traffic with different QoS requirements. The standard, however, leaves open the resource management and scheduling issues, which are crucial components to guarantee QoS...

    Provided By EURECOM

  • White Papers // Sep 2011

    Spectrum Sensing for Cognitive Radio Exploiting Spectral Masks

    In this paper, the authors will provide a straightforward look at semi blind spectrum sensing technique exploiting spectral masks. The proposed spectrum sensing technique is deployed on two stages. At a first level, the spectral masks database is built during the synchronization phase of the transmission, then in a second...

    Provided By EURECOM

  • White Papers // Oct 2011

    Combined Compressive Sampling and Distribution Discontinuities Detection Approach to Wideband Spectrum Sensing for Cognitive Radios

    This paper presents a new sensing technique for cognitive radio systems which combines algebraic tools and compressive sampling techniques. The proposed approach consists of the detection of spectrum holes using spectrum distribution discontinuities detector fed by a compressed measurements. The compressed sensing algorithm is designed to take advantage from the...

    Provided By EURECOM

  • White Papers // Sep 2011

    SINR Balancing and Beamforming for the MISO Interference Channel

    In this paper a K user Multi-Input Single-Output (MISO) InterFerence Channel (IFC) is considered where the interference at each receiver is treated as an additional Gaussian noise contribution (Noisy IFC). The authors address the MISO DownLink (DL) beamformer design and power allocation for maximizing the minimum SINR with per base...

    Provided By EURECOM

  • White Papers // Feb 2012

    A Practical Precoding Scheme for Multicell MIMO Channels With Partial User's Data Sharing

    In this paper, the authors consider a setting where K Transmitters (TXs) equipped with multiple antennas aim at transmitting to their K respective Receivers (RXs) also equipped with multiple antennas. Without exchange of the user's data symbols, this represents a conventional Interference Channel (IC), while it is a so-called MIMO...

    Provided By EURECOM

  • White Papers // Jan 2012

    Moving Face Spoofing Detection Via 3D Projective Invariants

    Face recognition provides many advantages compared with other available biometrics, but it is particularly subject to spoofing. The most accurate methods in literature addressing this problem, rely on the estimation of the three-dimensionality of faces, which heavily increase the whole cost of the system. This paper proposes an effective and...

    Provided By EURECOM

  • White Papers // Jan 2012

    Retrospective Interference Alignment for Interference Channels With Delayed Feedback

    The capacity of the most recent network architectures, such as femtocells, is severely limited by interference. This has spurred an intense research on the M-user interference channel, in which M transmitter/receiver pairs interfere with each other. Very striking recent results, though, disproved it by showing that the degrees of freedom...

    Provided By EURECOM

  • White Papers // Jan 2012

    Sparse Precoding in Multicell MIMO Systems

    In this paper, the authors consider the joint precoding across K distant Transmitters (TXs) towards K single-antenna Receivers (RXs) and they let the TXs have access to perfect Channel State Information (CSI). Instead of considering the conventional method of clustering to allocate the user's data symbols, they focus on determining...

    Provided By EURECOM

  • White Papers // Jan 2012

    3D Face Recognition: A Robust Multi-Matcher Approach to Data Degradations

    Over the past decades, 3D face has emerged as a solution to face recognition due to its reputed invariance to lighting conditions and pose. While proposed approaches have proven their efficiency over renowned databases as FRGC, less effort was spent on studying the robustness of algorithms to quality degradations. In...

    Provided By EURECOM

  • White Papers // Mar 2012

    On the Vulnerability of Automatic Speaker Recognition to Spoofing Attacks With Artificial Signals

    Automatic Speaker Verification (ASV) systems are increasingly being used for biometric authentication even if their vulnerability to imposture or spoofing is now widely acknowledged. Recent work has proposed different spoofing approaches which can be used to test vulnerabilities. This paper introduces a new approach based on artificial, tone-like signals which...

    Provided By EURECOM