Steven Weber

ORCID: 0000-0002-9235-6922
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cooperative Communication and Network Coding
  • Advanced MIMO Systems Optimization
  • Mobile Ad Hoc Networks
  • Advanced Wireless Network Optimization
  • Wireless Networks and Protocols
  • Wireless Communication Networks Research
  • Wireless Communication Security Techniques
  • Network Traffic and Congestion Control
  • Energy Harvesting in Wireless Networks
  • Complex Network Analysis Techniques
  • Energy Efficient Wireless Sensor Networks
  • Error Correcting Code Techniques
  • Caching and Content Delivery
  • Security in Wireless Sensor Networks
  • Digital Platforms and Economics
  • ICT Impact and Policies
  • Innovation Diffusion and Forecasting
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection
  • Peer-to-Peer Network Technologies
  • Distributed Sensor Networks and Detection Algorithms
  • Antenna Design and Analysis
  • Anomaly Detection Techniques and Applications
  • Optimization and Search Problems
  • Power Line Communications and Noise

Drexel University
2016-2025

Centre National de la Recherche Scientifique
2022

Laboratoire d'Informatique, de Robotique et de Microélectronique de Montpellier
2022

Polytechnic University of Turin
2022

Princeton University
2022

Nanyang Technological University
2022

École Polytechnique Fédérale de Lausanne
2022

University of Bremen
2022

Khalifa University of Science and Technology
2022

Abu Dhabi University
2022

In this paper, upper and lower bounds on the transmission capacity of spread-spectrum (SS) wireless ad hoc networks are derived. We define as product maximum density successful transmissions multiplied by their data rate, given an outage constraint. Assuming that nodes randomly distributed in space according to a Poisson point process, we derive for frequency hopping (FH-CDMA) direct sequence (DS-CDMA) SS networks, which incorporate traditional modulation types (no spreading) special case....

10.1109/tit.2005.858939 article EN IEEE Transactions on Information Theory 2005-11-22

This paper surveys and unifies a number of recent contributions that have collectively developed metric for decentralized wireless network analysis known as transmission capacity. Although it is notoriously difficult to derive general end-to-end capacity results multi-terminal or \adhoc networks, the (TC) framework allows quantification achievable single-hop rates by focusing on simplified physical/MAC-layer model. By using stochastic geometry quantify multi-user interference in network,...

10.1109/tcomm.2010.093010.090478 article EN IEEE Transactions on Communications 2010-10-12

We consider a cooperative wireless network in the presence of one more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different schemes are considered. In first scheme, cooperating nodes retransmit weighted version source signal decode-and-forward (DF) fashion. second while is transmitting, transmit noise to confound eavesdropper (cooperative jamming (CJ)). investigate two objectives, i.e., maximization achievable secrecy rate subject total...

10.1109/tsp.2011.2159598 article EN IEEE Transactions on Signal Processing 2011-06-21

The performance of wireless networks depends critically on their spatial configuration, because received signal power and interference depend the distances between numerous transmitters receivers. This is particularly true in emerging network paradigms that may include femtocells, hotspots, relays, white space harvesters, meshing approaches, which are often overlaid with traditional cellular networks. These heterogeneous approaches to providing high-capacity access characterized by randomly...

10.1109/mcom.2010.5621983 article EN IEEE Communications Magazine 2010-11-01

This paper derives the outage probability and transmission capacity of ad hoc wireless networks with nodes employing multiple antenna diversity techniques, for a general class signal distributions. analysis allows system performance to be quantified fading or non-fading environments. The is given interference-limited uniformly random on entire plane path loss exponent $\alpha>2$ in which use: (1) static beamforming through $M$ sectorized antennas, increase shown $\Theta(M^2)$ if antennas are...

10.1109/t-wc.2008.071047 article EN IEEE Transactions on Wireless Communications 2008-12-01

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> The transmission capacity (TC) of a wireless <emphasis emphasistype="boldital">ad hoc</emphasis> network is defined as the maximum spatial intensity successful transmissions such that outage probability does not exceed some specified threshold. This work studies improvement in TC obtainable with successive interference cancellation (SIC), an important receiver technique has been shown to achieve...

10.1109/tit.2007.901153 article EN IEEE Transactions on Information Theory 2007-08-01

This paper addresses three issues in the field of <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ad hoc</i> network capacity: impact (i) channel fading, (ii) inversion power control, and (iii) threshold–based scheduling on capacity. Channel threshold may be viewed as simple ways to exploit state information (CSI) without requiring cooperation across transmitters. We use xmlns:xlink="http://www.w3.org/1999/xlink">transmission capacity</i> (TC) our...

10.1109/tit.2007.907482 article EN IEEE Transactions on Information Theory 2007-11-01

Active authentication is the problem of continuously verifying identity a person based on behavioral aspects their interaction with computing device. In this study, we collect and analyze biometrics data from 200subjects, each using personal Android mobile device for period at least 30 days. This dataset novel in context active due to its size, duration, number modalities, absence restrictions tracked activity. The geographical colocation subjects study representative large closed-world...

10.1109/jsyst.2015.2472579 article EN IEEE Systems Journal 2016-03-30

The subject of this article is the long standing open problem developing a general capacity theory for wireless networks, particularly capable describing fundamental performance limits mobile ad hoc networks. A MANET peer-to-peer network with no preexisting infrastructure. MANETs are most single-hop, relay, interference, mesh, and star networks comprising special cases. lack has stunted development commercialization many types including emergency, military, sensor, community mesh Information...

10.1109/mcom.2008.4689214 article EN IEEE Communications Magazine 2008-12-01

The benefit of multi-antenna receivers is investigated in wireless ad hoc networks, and the main finding that network throughput can be made to scale linearly with number receive antennas nR even if each transmitting node uses only a single antenna. This contrast large body prior work single-user, multiuser, networks have shown linear scaling achievable when multiple transmit (i.e., MIMO transmission) are employed, but increases logarithmically or sublinearly antenna SIMO used. gain achieved...

10.1109/tcomm.2010.120710.090793 article EN IEEE Transactions on Communications 2010-12-22

We introduce a model for capturing the effects of beam misdirection on coverage and throughput in directional wireless network using stochastic geometry. In networks employing ideal sector antennas without sidelobes, we find that concavity orientation error distribution is sufficient to prove monotonicity quasi-concavity (both with respect antenna beamwidth) spatial transmission capacity, respectively. Additionally, identify conditions produce opposite extremal choices beamwidth (absolutely...

10.1109/twc.2014.2331055 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2014-06-19

We consider a new approach to power control in decentralized wireless networks, termed fractional (FPC). Transmission is chosen as the current channel quality raised an exponent -s, where s constant between 0 and 1. The choices = 1 correspond familiar cases of inversion transmission, respectively. Choosing (0,1) allows all intermediate policies these two extremes be evaluated, we see that usually neither extreme ideal. derive closed-form approximations for outage probability relative target...

10.1109/t-wc.2008.071439 article EN IEEE Transactions on Wireless Communications 2008-12-01

We develop a new metric for quantifying end-to-end throughput in multihop wireless networks, which we term random access transport capacity, since the interference model presumes uncoordinated transmissions. The quantifies average maximum rate of successful transmissions, multiplied by communication distance, and normalized network area. show that simple upper bound on this quantity is computable closed-form terms key parameters when number retransmissions not restricted hops are assumed to...

10.1109/twc.2010.06.091432 article EN IEEE Transactions on Wireless Communications 2010-06-01

The benefit of multiple antenna communication is investigated in wireless ad hoc networks, and the primary finding that throughput can be made to scale linearly with number receive antennas even if each transmitting node uses only a single antenna. linear gain achieved by (i) using cancel signals nearby interferers as well increase signal power (i.e., for array gain), (ii) maintaining constant per-link rate increasing spatial density simultaneous transmissions at receiver. Numerical results...

10.1109/icc.2009.5199417 article EN IEEE International Conference on Communications 2009-06-01

This paper addresses the following question, which is of interest in design a multiuser decentralized network. Given total system bandwidth W Hz and fixed data rate constraint R bps for each transmission, how many frequency slots N size W/N should band be partitioned into order to maximize number simultaneous links network? Dividing available spectrum results two competing effects. On positive side, larger allows more parallel, noninterfering communications take place same area. negative...

10.1109/t-wc.2008.071220 article EN IEEE Transactions on Wireless Communications 2008-12-01

Anycast is a new "one-to-one-of-many" communication method in IPv6 networks. With this technology, the problem of finding best server to respond request becomes virtual noop. Hindered by unresolved issues and slow deployment IPv6, network-layer anycast still not reality. However, an increase interest research surrounding recently warrants look at state direction ideas area. This article describes some major problems with their possible solutions, as well optimizations applications that have...

10.1109/mcom.2004.1262172 article EN IEEE Communications Magazine 2004-01-01

Spread spectrum communication - often called code-division multiple access has been widely adopted over the years for many types of interference-challenged wireless systems including cellular and cordless telephones, LANs PANs, military applications, global positioning systems. In this article we explore whether CDMA, in either its frequency hopping (FH) or direct sequence (DS) form, is an appropriate design approach ad hoc, mesh, networks. One goal to help provoke a debate by explaining...

10.1109/mcom.2007.4395371 article EN IEEE Communications Magazine 2007-12-01

The transmission capacity of an ad-hoc network is the maximum density active transmitters per unit area, given outage constraint at each receiver for a fixed rate transmission. Most prior work on finding networks has focused only one-way communication where source communicates with destination and no data sent from to source. In practice, however, two-way or bidirectional required support control functions like packet acknowledgements channel feedback. This paper extends concept wireless by...

10.1109/twc.2011.041311.101488 article EN IEEE Transactions on Wireless Communications 2011-04-26

The Internet of Things (IoT) introduced new targets and attack vectors for malicious actors who infect insecure devices with malware in order to form large botnets that can launch distributed denial service (DDoS) attacks. These comprise various infected such as Internet-connected cameras home routers. This paper focuses on the unsolved problem creating robust detection secure research compares effectiveness three different approaches behavioral endpoint routers through observation...

10.1109/malware.2017.8323956 article EN 2017-10-01

10.1561/1300000032 article EN Foundations and Trends® in Networking 2010-01-01

The rate regions of multilevel diversity coding systems (MDCSs), a sub-class the broader family multi-source multi-sink networks with special structure, are investigated in systematic way. We enumerate all non-isomorphic MDCS instances at most three sources and four encoders. Then, exact region every one these more than 7000 is proven via computations showing that Shannon outer bound matches custom constructed linear code-based inner bound. Results gained from summarized key statistics...

10.1109/tit.2016.2628791 article EN publisher-specific-oa IEEE Transactions on Information Theory 2016-11-16

This paper addresses three issues in the field of ad hoc network capacity: impact i)channel fading, ii) channel inversion power control, and iii) threshold-based scheduling on capacity. Channel threshold may be viewed as simple ways to exploit state information (CSI) without requiring cooperation across transmitters. We use transmission capacity (TC) our metric, defined maximum spatial intensity successful simultaneous transmissions subject a constraint outage probability (OP). By assuming...

10.48550/arxiv.0707.3584 preprint EN other-oa arXiv (Cornell University) 2007-01-01
Coming Soon ...