Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, SR, SRW (Joint) |
2014-03-05 14:00 |
Tokyo |
Waseda Univ. |
A Pilot Contamination Averse Closed-Loop Scheme for TDD-Based Massive MIMO Systems Oussama Souihli, Yasuyuki Hatakawa, Satoshi Konishi (KDDI R&D Labs) RCS2013-384 |
TDD-based Massive MIMO systems rely on channel reciprocity assumption (i.e. that the downlink channel matrix can be infe... [more] |
RCS2013-384 pp.469-474 |
RCS, SIP |
2014-01-23 14:40 |
Fukuoka |
Kyushu Univ. |
A HypothesisTesting Framework For Elevation Beamforming Oussama Souihli, Yasuyuki Hatakawa, Satoshi Konishi (KDDI R&D Labs) SIP2013-96 RCS2013-266 |
3D Beamforming (3D BF) is a new feature of 3GPP LTE-A standard that is likely to increase spectral efficiency by exploit... [more] |
SIP2013-96 RCS2013-266 pp.65-70 |
RCS, AP (Joint) |
2013-11-21 15:10 |
Shimane |
Matsue Terrsa |
[Invited Lecture]
Full-dimensional MIMO (FD-MIMO): Opportunities and Challenges Oussama Souihli, Yasuyuki Hatakawa, Satoshi Konishi (KDDI R&D Labs) AP2013-114 RCS2013-192 |
Full-Dimensional MIMO (FD MIMO), also known as Three-Dimensional MIMO (3D MIMO), is a new beamforming paradigm in cellul... [more] |
AP2013-114 RCS2013-192 p.85(AP), p.109(RCS) |
RCS, AP (Joint) |
2013-11-22 14:55 |
Shimane |
Matsue Terrsa |
Stochastic Resonance and The Secrecy Capacity of Wiretap Channels Oussama Souihli (KDDI R&D Labs), Tomoaki Ohtsuki (Keio Univ.) RCS2013-204 |
Traditionally, physical-layer security is achieved by providing the legitimate receiver a physical-layer advantage over ... [more] |
RCS2013-204 pp.177-182 |
RCS, IN (Joint) |
2013-05-17 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Benefits of Channel Diagonal Dominance to Cooperative MIMO Systems Oussama Souihli, Yasuyuki Hatakawa, Satoshi Konishi (KDDI R&D Labs) RCS2013-31 |
In cooperative multiple-input multiple-output (MIMO) cellular systems, a primary base station (BS), typically serving th... [more] |
RCS2013-31 pp.49-54 |
RCS, SR, SRW (Joint) |
2013-02-27 09:40 |
Tokyo |
Waseda Univ. |
An LQ-Less Implementation of Tomlinson Harashima Precoding (THP) Oussama Souihli, Yasuyuki Hatakawa, Satoshi Konishi (KDDI R&D Labs) RCS2012-286 |
Dirty Paper Coding (DPC) is the best known interference cancellation strategy in wireless channels with additive interfe... [more] |
RCS2012-286 pp.13-18 |
RCS, SR, SRW (Joint) |
2013-02-27 10:30 |
Tokyo |
Waseda Univ. |
Hermitian Splitting Precoding (HSP) for Wireless MIMO Systems
-- All The Channel Capacity, Half The Signaling Cost -- Oussama Souihli, Yasuyuki Hatakawa, Satoshi Konishi (KDDI R&D Labs) RCS2012-288 |
In wireless MIMO systems, capacity-achieving precoding schemes, be they linear (e.g. Singular-Value-Decomposition (SVD) ... [more] |
RCS2012-288 pp.25-30 |
RCS, SR, SRW (Joint) |
2013-02-27 11:10 |
Tokyo |
Waseda Univ. |
Open-Loop Homographic Precoding (OLHP)
-- A Method for Seamless (Interference-Free) Multiuser Transmission in Wireless SISO/MIMO Systems With No Channel State Information At The Transmitter (CSIT) -- Oussama Souihli, Yasuyuki Hatakawa, Satoshi Konishi (KDDI R&D Labs) RCS2012-290 |
In linguistics, homographs are words of like spelling and different meanings. Thus, in English, the word "bear" could me... [more] |
RCS2012-290 pp.37-42 |
RCS, NS, USN (Joint) |
2012-07-20 13:25 |
Iwate |
Iwate Univ. |
Wireless Interference in MIMO Channels: An Adversity Made An Advantage Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2012-88 |
The dirty paper channel [Costa, 1982] is a point-to-point interference-limited channel whereby perfect knowledge about t... [more] |
RCS2012-88 pp.79-84 |
SR, RCS, SRW (Joint) |
2012-03-07 11:15 |
Kanagawa |
YRP |
Multiuser MIMO Modulation Transparency in 3GPP LTE-A: A Capacity Perspective Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.), Bruno Melis, Marco Caretti (Telecom Italia) RCS2011-321 |
In this work, we consider the modulation-transparency issue related to the 3GPP-LTE debate to enhance multi-user multipl... [more] |
RCS2011-321 pp.31-36 |
RCS, AN, MoNA, SR (Joint) |
2010-03-03 09:00 |
Kanagawa |
YRP |
Network MIMO As A Bargaining Game Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-266 |
A mobile station (MS) is on the edge of a network cell, such that it can receive signals from the current Base Station (... [more] |
RCS2009-266 pp.53-58 |
RCS, SAT (Joint) |
2009-12-18 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Network MIMO in The Presence of Transmit Desynchronization Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-205 |
We report the results of our study on the performance of Network MIMO in the presence of transmit desynchronization betw... [more] |
RCS2009-205 pp.225-230 |
RCS, AP (Joint) |
2009-11-26 09:20 |
Tokyo |
Tokyo Inst. of Tech. |
Further Results on The MIMO Degraded Relay Channel Undergoing Keyhole Effects Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-134 |
A MIMO keyhole is a propagation environment such that the channel gain matrix has unit rank (single degree of freedom), ... [more] |
RCS2009-134 pp.7-12 |
NS, RCS (Joint) |
2009-07-16 11:00 |
Hokkaido |
Hokkaido University (Hokkaido) |
Cooperative Diversity Can Mitigate Keyhole Effects in Wireless MIMO Systems Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-53 |
A MIMO keyhole is a propagation environment such that the channel gain matrix has unit rank (single degree of freedom), ... [more] |
RCS2009-53 pp.1-6 |
RCS |
2009-06-26 15:10 |
Aichi |
Nagoya University |
Transparent Inband Feedback for Training-Based MIMO Systems Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-51 |
[more] |
RCS2009-51 pp.131-136 |
RCS |
2009-06-26 15:35 |
Aichi |
Nagoya University |
A novel QoS-Aware Joint Feedback and Scheduling Scheme for Multiuser MIMO Systems Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2009-52 |
This report considers the problem of scheduling, in Closed-Loop Multiuser MIMO systems, a large set of users with differ... [more] |
RCS2009-52 pp.137-142 |
RCS, AN, MoNA, SR (Joint) |
2009-03-06 10:35 |
Kanagawa |
YRP |
The Two-Way MIMO Wire-Tap Channel Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2008-273 |
We consider the popular security problem of ensuring the communication privacy of two users, Alice and Bob, in the a pri... [more] |
RCS2008-273 pp.361-366 |