Search Results - "Stahlbuhk, Thomas"
-
1
Learning Algorithms for Minimizing Queue Length Regret
Published in IEEE transactions on information theory (01-03-2021)“…We consider a system consisting of a single transmitter/receiver pair and N channels over which they may communicate. Packets randomly arrive to the…”
Get full text
Journal Article -
2
Learning algorithms for scheduling in wireless networks with unknown channel statistics
Published in Ad hoc networks (15-03-2019)“…We study the problem of learning channel statistics to efficiently schedule transmissions in wireless networks subject to interference constraints. We propose…”
Get full text
Journal Article -
3
Throughput Maximization in Uncooperative Spectrum Sharing Networks
Published in IEEE/ACM transactions on networking (01-12-2020)“…Throughput-optimal transmission scheduling in wireless networks has been a well considered problem in the literature, and the method for achieving optimality,…”
Get full text
Journal Article -
4
Rate Control with Autoregressive Forecasting for High Frequency Communication
Published in MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (28-11-2022)“…This work introduces a data-driven framework for rate control and applies it to high frequency (HF) communication systems that propagate via the Earth's…”
Get full text
Conference Proceeding -
5
Persistent Throughput-Optimal Scheduling for Smart Jamming Resiliency
Published in MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM) (30-10-2023)“…This paper considers transmission scheduling for wireless networks with interference constraints that experience control information loss to jamming…”
Get full text
Conference Proceeding -
6
Crypto-Mine: Cryptanalysis Via Mutual Information Neural Estimation
Published in ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (14-04-2024)“…The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown…”
Get full text
Conference Proceeding -
7
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks
Published in MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) (29-11-2021)“…We consider the problem of post-quantum secure and ultra-reliable communication through a heterogeneous network consisting of multiple connections. Three…”
Get full text
Conference Proceeding -
8
Robust Network Protocols for Large Swarms of Small UAVs
Published in 2022 IEEE Aerospace Conference (AERO) (05-03-2022)“…In this work, we detail a synchronized channel hopping network for autonomous swarms of small unmanned aerial vehicles (UAVs) conducting intelligence,…”
Get full text
Conference Proceeding -
9
Learning Algorithms for Minimizing Queue Length Regret
Published in 2018 IEEE International Symposium on Information Theory (ISIT) (01-06-2018)“…We consider a system consisting of a single transmitter and N channels. Packets randomly arrive to the transmitter's queue, and at each time slot a controller…”
Get full text
Conference Proceeding -
10
Throughput Maximization in Uncooperative Spectrum Sharing Networks
Published 04-08-2020“…Throughput-optimal transmission scheduling in wireless networks has been a well considered problem in the literature, and the method for achieving optimality,…”
Get full text
Journal Article -
11
Learning Algorithms for Minimizing Queue Length Regret
Published 11-05-2020“…We consider a system consisting of a single transmitter/receiver pair and $N$ channels over which they may communicate. Packets randomly arrive to the…”
Get full text
Journal Article -
12
CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation
Published 14-09-2023“…The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown…”
Get full text
Journal Article -
13
CERMET: Coding for Energy Reduction with Multiple Encryption Techniques -- $It's\ easy\ being\ green
Published 09-08-2023“…This paper presents CERMET, an energy-efficient hardware architecture designed for hardware-constrained cryptosystems. CERMET employs a base cryptosystem in…”
Get full text
Journal Article -
14
Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems
Published 08-05-2024“…The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This…”
Get full text
Journal Article -
15
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks
Published 13-08-2021“…We consider the problem of post-quantum secure and ultra-reliable communication through a heterogeneous network consisting of multiple connections. Three…”
Get full text
Journal Article -
16
Topology control for wireless networks with highly-directional antennas
Published in 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) (01-05-2016)“…In order to steer antenna beams towards one another for communication, wireless nodes with highly-directional antennas must track the channel state of their…”
Get full text
Conference Proceeding -
17
Throughput maximization in uncooperative spectrum sharing networks
Published in 2016 IEEE International Symposium on Information Theory (ISIT) (01-07-2016)“…We consider an opportunistic communication system in which a secondary transmitter communicates over the unused time slots of a primary user. In particular, we…”
Get full text
Conference Proceeding Journal Article -
18
Reliability guarantees for lossy network coding subgraph construction
Published in 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton) (01-10-2012)“…Random linear network coding can provide robustness to link losses, and in this work we present an approach to achieve a chosen level of reliability. We…”
Get full text
Conference Proceeding