Search Results - "Khalaj, Babak Hossein"
-
1
Physical-Layer Schemes for Wireless Coded Caching
Published in IEEE transactions on information theory (01-05-2019)“…We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for…”
Get full text
Journal Article -
2
Multi-Antenna Interference Management for Coded Caching
Published in IEEE transactions on wireless communications (01-03-2020)“…A multi-antenna broadcast channel scenario is considered where a base station delivers contents to cache-enabled user terminals. A joint design of coded…”
Get full text
Journal Article -
3
Hybrid QoE-Based Joint Admission Control and Power Allocation
Published in IEEE transactions on vehicular technology (01-01-2024)“…Quality of Experience (QoE) is an important indicator of user satisfaction. In this paper, we propose a learning-based QoE model for voice services based on…”
Get full text
Journal Article -
4
On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems With Randomly-Distributed Eavesdroppers
Published in IEEE transactions on communications (01-02-2022)“…In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a…”
Get full text
Journal Article -
5
Delay Analysis of Network Coding in Multicast Networks With Markovian Arrival Processes: A Practical Framework in Cache-Enabled Networks
Published in IEEE transactions on vehicular technology (01-08-2018)“…We develop an analytical framework for queueing and delay analysis in the case of a number of distinct flows arriving at a network node, where asynchronous…”
Get full text
Journal Article -
6
Performance Analysis of Heterogeneous Cellular Caching Networks With Overlapping Small Cells
Published in IEEE transactions on vehicular technology (01-02-2022)“…Caching at network edges has attracted more and more research interests recently for the purpose of alleviating the network traffic pressure especially in…”
Get full text
Journal Article -
7
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries
Published in IEEE wireless communications letters (01-04-2022)“…In this letter, we examine the PHY layer secret key generation (PHY-SKG) scheme in the presence of man-in-the-middle (MiM) adversary, while legitimate parties…”
Get full text
Journal Article -
8
K -User Interference Channels With Backhaul Cooperation: DoF vs. Backhaul Load Trade-Off
Published in IEEE transactions on information theory (01-11-2019)“…In this paper, we consider K-user interference channels with M antennas per node and with backhaul collaboration in one side (among the transmitters or among…”
Get full text
Journal Article -
9
Optimum Transmission Delay for Function Computation in NFV-Based Networks: The Role of Network Coding and Redundant Computing
Published in IEEE journal on selected areas in communications (01-10-2018)“…In this paper, we study the problem of delay minimization in network function virtualization-based networks. In such systems, the ultimate goal of any request…”
Get full text
Journal Article -
10
On the Optimality of 0-1 Data Placement in Cache Networks
Published in IEEE transactions on communications (01-03-2018)“…Considering cache enabled networks, optimal content placement minimizing the total cost of communication in such networks is studied, leading to a surprising…”
Get full text
Journal Article -
11
Learning-Based Secret Key Generation in Relay Channels Under Adversarial Attacks
Published in IEEE open journal of vehicular technology (2023)“…Wireless secret key generation (WSKG) facilitates efficient key agreement protocols for securing the sixth generation (6G) wireless networks thanks to its…”
Get full text
Journal Article -
12
Distributed Controller-Switch Assignment in 5G Networks
Published in IEEE eTransactions on network and service management (01-06-2021)“…Software defined networking (SDN) is a promising technology in fifth generation wireless networks (5G) where due to the adoption of a centralized…”
Get full text
Journal Article -
13
Near-Optimal Robust Virtual Controller Placement in 5G Software Defined Networks
Published in IEEE transactions on network science and engineering (01-04-2021)“…Fifth generation (5G) wireless networksare characterized by applying the software defined networking (SDN) and network function virtualization (NFV) concepts…”
Get full text
Journal Article -
14
Meta-aligner: long-read alignment based on genome statistics
Published in BMC bioinformatics (23-02-2017)“…Current development of sequencing technologies is towards generating longer and noisier reads. Evidently, accurate alignment of these reads play an important…”
Get full text
Journal Article -
15
On Degrees of Freedom of the Cognitive MIMO Two-Interfering Multiple-Access Channels
Published in IEEE transactions on vehicular technology (01-06-2013)“…This paper characterizes the exact spatial Degrees of Freedom (DoF) region of the two-user multiple-input-multiple-output two-interfering multiple-access…”
Get full text
Journal Article -
16
QoSNC: A Novel Approach to QoS-Based Network Coding for Fixed Networks
Published in Journal of communications and networks (2010)“…In this paper, we present a decentralized algorithm to find minimum cost quality of service (QoS) flow subgraphs in network coded multicast schemes. The main…”
Get full text
Journal Article -
17
Analytical Modeling and Performance Analysis of Flooding in CSMA-Based Wireless Networks
Published in IEEE transactions on vehicular technology (01-02-2011)“…Although different broadcasting techniques are widely deployed in wireless networks, there are limited comprehensive analytical frameworks to evaluate the…”
Get full text
Journal Article -
18
Multi-Server Coded Caching
Published in IEEE transactions on information theory (01-12-2016)“…In this paper, we consider multiple cache-enabled clients connected to multiple servers through an intermediate network. We design several topology-aware…”
Get full text
Journal Article -
19
Modeling Nonsaturated Contention-Based IEEE 802.11 Multihop Ad Hoc Networks
Published in IEEE transactions on vehicular technology (01-09-2009)“…The IEEE 802.11 contention-based distributed coordination function has been used in ad hoc networks, and so far, a comprehensive mathematical analysis of such…”
Get full text
Journal Article -
20
Model-based reinforcement learning approach for federated learning resource allocation and parameter optimization
Published in Computer communications (01-12-2024)“…In this paper, we investigate the performance of a model-based approach for solving resource allocation and parameter adjustment problems in federated learning…”
Get full text
Journal Article