About
151
Publications
16,108
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,249
Citations
Citations since 2017
Introduction
Additional affiliations
October 2009 - present
July 2009 - present
Publications
Publications (151)
This paper studies the Multi-Input-Multi-Output (MIMO) interference networks with arbitrary number of transmitters and receivers, where both the transmitters and receivers are equipped with caches. The main goal is to design content placement and delivery schemes that minimize the worst case normalized delivery time (NDT). First, we propose a deliv...
In this paper, we propose a Reinforcement Learning-based MAC layer protocol for cognitive radio networks, based on exploiting the feedback of the Primary User (PU). Our proposed model relies on two pillars, namely an infinite-state Partially Observable Markov Decision Process (POMDP) to model the system dynamics besides a queuing-theoretic model fo...
Cognitive radios have emerged as a key enabler for opportunistic spectrum access, in order to tackle the wireless spectrum scarcity and under utilization problems over the past two decades. In this paper, we aim to enhance the secondary user (SU) performance while maintaining the desired average packet delay for the primary user (PU). In particular...
In this paper, we study a full-duplex cooperative cognitive radio network with multiple full-duplex secondary users acting as potential relays for transmitting the packets of a primary user. In addition to having full-duplex capability, the receivers also have multi-packet reception capability allowing them to simultaneously decode packets incoming...
In this paper, we consider a class of wireless powered communication devices using hybrid automatic repeat request (HARQ) protocol to ensure reliable communications. In particular, we analyze the trade-off between accumulating mutual information and harvesting RF energy at the receiver of a point-to-point link over a time-varying independent and id...
In this paper, we generalize conventional time division multiple access (TDMA) wireless networks to a new type of wireless networks coined generalized wireless powered communication networks (g-WPCNs). Our prime objective is to optimize the design of g-WPCNs where nodes are equipped with radio frequency (RF) energy harvesting circuitries along with...
The original version of this article contained error in author affiliation. Also, the article note and acknowledgement sections are missing.
In this paper, an interference network with arbitrary number of transmitters and receivers is studied, where each transmitter is equipped with a finite size cache. We obtain an information-theoretic lower bound on both the peak normalized delivery time (NDT), and the \textit{expected} NDT of cache-aided interference networks with uniform content po...
The optimal allocation of time and energy resources is characterized in a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). We consider two different formulations; in the first one (max-sum), the sum-throughput of all users is maximized. In the second one (max-min), and targeting fairness among users, we cons...
The optimal allocation of time and energy resources is characterized in a Wireless Powered Communication Network (WPCN) with non-Orthogonal Multiple Access (NOMA). We consider two different formulations; in the first one (max-sum), the sum-throughput of all users is maximized. In the second one (max-min), and targeting fairness among users, we cons...
The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable RFID-based solutions for ubiquitous real-time monitoring and tracking. Bit tracking based anti-collision algorithms have attracted considerable attention, recently, due to its positive impact on decreasing the identi...
In this paper, we study a two-tier cellular network with cache-enabled small base stations (SBSs). In our model, a SBS has the ability to coordinate with neighboring SBSs and fetch data from their caches. We focus on the effect of SBSs' density on the network's energy efficiency. To this end, stochastic geometry theory is used to model the SBSs and...
Indoor/outdoor localization, tracking and positioning applications are developed using the GPS receivers, ultrasound, infrared and RF (Wi-Fi and cellular) signals. The key point of such upper layer applications is to detect precisely whether a user is indoor or outdoor. This detection is crucial to improve the performance drastically through making...
This paper studies cache-aided interference networks with arbitrary number of transmitters and receivers, whereby each transmitter has a cache memory of finite size. Each transmitter fills its cache memory from a content library of files in the placement phase. In the subsequent delivery phase, each receiver requests one of the library files, and t...
In this work, we consider a class of wireless powered devices employing Hybrid Automatic Repeat reQuest (HARQ) to ensure reliable end-to-end communications over a time-varying channel. By using Simultaneous Wireless Information and Power Transfer (SWIPT), the perpetually powered transmitter transmits information bearing RF signal to the receiver. T...
In this paper, we characterize optimal resource allocation for the uplink and downlink of wireless powered cellular networks (WPCNs). In particular, we investigate a time-slotted WPCN, where a hybrid access point (HAP) is in charge of energy replenishing of M cellular users (CUs), along with transmission/reception of information to/from them. Unlik...
In this paper we study social networks as an enabling technology for new applications and services leveraging, largely unutilized, opportunistic mobile encounters. More specifically, we quantify mobile user similarity and introduce a novel mathematical framework, grounded in information theory, to characterize fundamental limits and quantify the pe...
This paper studies a generic model for cooperative cognitive radio networks where the secondary user is equipped with a finite length relaying queue as well as a finite length battery queue. Our prime objective is to characterize the stable throughput region. Nevertheless, the complete characterization of stable throughput region is notoriously dif...
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Different...
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Different...
This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of Kr users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently sto...
This paper characterizes the performance of a generic K-tier cache-aided heterogeneous network (CHN), in which the base stations (BSs) across tiers differ in terms of their spatial densities, transmission powers, pathloss exponents, activity probabilities conditioned on the serving link and placement caching strategies. We consider that each user c...
This paper studies the problem of cooperative communications in cognitive radio networks where the secondary user is equipped with finite length relaying queue as well as finite length battery queue. The major hurdle towards fully characterizing the stable throughput region stems from the sheer complexity associated with solving the two-dimensional...
In this paper, we characterize the stability region of cognitive radio networks with a dedicated relay node. In particular, we study this system under two different MAC protocols: perfect sensing and random access. In the perfect sensing protocol, the relay node and the secondary user access the medium only when the primary user is idle. In the ran...
We consider the problem of optimizing the performance of a cooperative cognitive radio user subject to constraints on the quality-of-service (QoS) of the primary user (PU). In particular, we design the probabilistic admission control parameter of the PU packets in the secondary user (SU) relaying queue and the randomized service parameter at the SU...
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two mes...
Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common (centralized approach) for spectrum sensing. In this paper, we...
Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common " centralized approach " for spectrum sensing. In this paper, w...
In this paper, we study the problem of scalable videos multicast streaming over multi-channel multi-radio wireless mesh networks over a contention-based MAC, with the objective of maximizing the overall received videos quality. We propose a three-stage heuristic framework solution for the complex joint channel assignment, video quality selection an...
In this paper we study the problem of tag identification in multi-reader RFID systems. In particular, we propose a novel solution to the reader-to-reader collisions and tag collisions in multi-reader systems, using the concept of bit tracking [1]. Towards this objective, we propose the multi-reader RFID tag identification using bit tracking (MRTI-B...
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary...
In this paper, we introduce the novel concept of cost-effective mobile health care which leverages the multiple wireless interfaces onboard most mobile phones today. First, we study the problem of uploading medical data using the “least cost” radio interface. Toward this objective, we propose the wireless interface selection algorithm (WISA) which...
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to...
The optimal resource allocation scheme in a full-duplex Wireless Powered Communication Network (WPCN) composed of one Access Point (AP) and two wireless devices is analyzed and derived. AP operates in a full-duplex mode and is able to broadcast wireless energy signals in downlink and receive information data in uplink simultaneously. On the other h...
In this paper, we generalize conventional time division multiple access (TDMA) wireless networks to a new type of wireless networks coined generalized wireless powered communication networks (g-WPCNs). Our prime objective is to optimize the design of g-WPCNs where nodes are equipped with radio frequency (RF) energy harvesting circuitries along with...
This paper studies optimal resource allocation in a wireless powered communication network with two groups of users; one is assumed to have radio frequency (RF) energy harvesting capability and no other energy sources, while the other group has legacy nodes that are assumed not to have RF energy harvesting capability and are equipped with dedicated...
This paper studies optimal resource allocation in a wireless powered communication network with two groups of users; one is assumed to have radio frequency (RF) energy harvesting capability and no other energy sources, while the other group has legacy nodes that are assumed not to have RF energy harvesting capability and are equipped with dedicated...
In this paper, we study the impact of a full-duplex secondary node on a cognitive cooperative network with Multipacket Reception (MPR) capabilities at the receivers. Motivated by recent schemes that make full-duplex communication feasible, we study a model with one primary and one secondary transmitter-receiver pair, where the secondary transmitter...
This paper presents an energy efficient relay deployment algorithm that determines the optimal location and number of relays for future wireless networks, including Long Term Evolution (LTE)-Advanced heterogeneous networks. We formulate an energy minimization problem for macro-relay heterogeneous networks as a Mixed Integer Linear Programming (MILP...
In this paper we establish fundamental limits on the performance of knowledge
sharing in opportunistic social net- works. In particular, we introduce a novel
information-theoretic model to characterize the performance limits of knowledge
sharing policies. Towards this objective, we first introduce the notions of
knowledge gain and its upper bound,...
In this paper, we study the fundamental trade-off between delay-constrained primary and secondary users in cognitive radio networks. In particular, we characterize and optimize the trade-off between the secondary user (SU) effective capacity and the primary user (PU) average packet delay. Towards this objective, we employ Markov chain models to qua...
In this paper we analyze the performance of a secondary link in a cognitive radio relaying system operating under a statistical quality of service (QoS) delay constraint. In particular, we quantify analytically the Effective Capacity improvement for the secondary user when it offers a packet relaying service to the primary user packets that are los...
In this paper we study the problem of optimal power control for a Z-interference channel abstracting an underlay cognitive radio network where the secondary user has delay constraints. More specifically, we minimize the packet drop probability at the secondary user (equivalent to delay bound violation probability) subject to quality of service (QoS...
In this paper, we study Two-way relaying networks well-known for its
throughput merits. In particular, we study the fundamental throughput delay
trade-off in two-way relaying networks using opportunistic network coding. We
characterize the optimal opportunistic network coding policy that maximizes the
aggregate network throughput subject to an aver...
In this paper, we propose fractional sequential sensing (FSS) as a novel cooperative sensing scheme for cognitive radio networks. FSS compromises a tradeoff between sensing accuracy and efficiency by formulating an optimization problem whose solution identifies FSS sensing parameters. These parameters include the sensing period and channels allocat...
Energy harvesting (EH) is a promising technology for realizing energy
efficient wireless networks. In this paper, we utilize the ambient RF energy,
particularly interference from neighboring transmissions, to replenish the
batteries of the EH enabled nodes. However, RF energy harvesting imposes new
challenges into the design of wireless networks. I...
In this paper, we examine a cognitive spectrum access scheme in which a secondary user exploits the primary feedback information. We consider an overlay model in which the secondary user accesses the channel by certain access probabilities that are function of the spectrum sensing metric. In setting our problem, we assume that the secondary user ca...