ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

5GReap 2015 - Recent Advances at Physical Layer for 5G Wireless Networks

Date2015-08-24 - 2015-08-27

Deadline2015-02-15

VenueDubrovnik, Croatia Croatia

Keywords

Websitehttps://iwcmc.org/2015/wp-content/upload...

Topics/Call fo Papers

Symposium Chairs:
Muhammad Ali Imran, University of Surrey, UK, m.imran-AT-surrey.ac.uk
Syed Ali Raza Zaidi, University of Leeds, UK, s.a.zaidi-AT-leeds.ac.uk
Zeeshan Shakir, Texas A&M at Qatar, Qatar, muhammad.shakir-AT-qatar.tamu.edu
Syed Ali Hassan, National University of Sciences and Technology, Pak,
ali.hassan-AT-seecs.edu.pk
Shahid Mumtaz, Aveiro, Portugal, dr.shahid.mumtaz-AT-ieee.org
Steering Committee:
Rahim Tafazolli, University of Surrey, UK,r.tafazolli-AT-surrey.ac.uk
Mounir Ghogho, University of Leeds, UK, m.ghogho-AT-leeds.ac.uk
Octavia Dobre, Memorial University, Canada, odobre-AT-mun.ca
Desmond McLernon, University of Leeds, UK, d.c.mclernon-AT-leeds.ac.uk
Khalid Qaraqe, Texas A&M at Qatar, Qatar, kqaraqe-AT-tamu.edu
Accepted papers will be published in the IEEE IWCMC 2015proceedings and will be submitted to the IEEE digital library(IEEE Xplore). The Workshop will focus on recent advances in communication and information theoretic aspects of 5G wireless networks.
The workshop accepts only novel, previously unpublished regular research, position and industrial papers. Particularly, original papers are invited that advance the state-of the-art.
Topics of interest include, but are not limited to:
? Device-to-Device (D2D) Communication
? Cooperative Communications
? Dynamic Spectrum Management
? Green and Cloud Empowered Radio Access Networks
? Energy Harvesting Communications and Wireless Power Transfer
? Full-duplex Radios
? Heterogeneous Wireless Network Architectures
? Machine Learning for Communications
? Machine-to-machine (M2M) communication techniques
? Massive MIMO Technologies
? mm-wave Communications
? Multi-carrier Systems, including OFDM
? Multiple-Input Multiple-Output Techniques
? Multiuser Techniques
? Security of Communications
. Network Function Virtualization

Last modified: 2015-02-23 21:21:08