Author Archive

A follow-up to Dr. Ahn’s Post on Self-Plagiarism

Reference 1 Comment »

Dr. Ahn has circulated an email in our group recently regarding the IEEE’s policy on reusing material from prior publications. I found that the material in this document by Douglas Verret was important enough that it shall be highlighted here. A few of the key points:

  1. The Publications Products and Services Board (PSPB) operations manual is available here.
  2. “Authors should only submit original work that has neither appeared elsewhere for publication, nor which was under review for another refereed publication.”
  3. “Two specific features have been identified that distinguish regular papers in the TRANSACTIONS from conference papers. First, regular papers undergo a rigorous review process that marks them as having met or exceeded accepted standards of scholarship.” “Second, regular papers by definition are less cryptic and condensed and therefore offer better clarity, more complete justification of findings and more detail overall.”
  4. “There is no value to the readers in republishing verbatim an extended abstract that has appeared or will appear in a public archive in either paper or electronic form.”
  5. “Of particular importance are a few guidelines that are mandatory. They are: 1) the conference paper must be cited in the enhanced version; 2) the author(s) must explain in the introduction specifically how the conference paper has been enhanced; 3) if the conference paper is not available in Xplore®, the authors must provide an electronic or paper copy of the conference paper; 4) if IEEE does not own the copyright for the paper and figures, the author(s) must obtain the appropriate permission for IEEE to republish them.”
  6. “It is anticipated that at least a third of the enhanced manuscripts contain relevant material that was not in the conference paper.”
  7. For journal papers, a more complete reference list and extended introduction compared to conference papers is suggested.
  8. If information in a paper is not unique, refer to work that explains the relevant topic such that space is not wasted.
  9. Use the questions asked in conference talks to better approach the journal version of a topic.

Personally, I think much of this is obvious, but we’ve all read journal and conference papers that are virtually indistinguishable in terms of content. I think this is something that all reviewers need to take to heart. It’s not a given that if a topic is good then the paper should be published. We all have to keep in the back of our minds: “What is valuable in this paper?” If a figure, discussion, or analysis in a paper doesn’t lend insight, it is our responsibility as the reviewer to cut it out. Perhaps this will cut out journal papers that are just “conference papers with extra simulations.”  What are your thoughts?

A New Year’s Post

WSIL News & Views 1 Comment »

I want to wish everyone and their families a happy (and safe) new year.  Let’s make 2007 an even more productive year for the WSIL!  The year 2006 was very kind to our leader (the fearless Robert W. Heath, Jr.) and his students.  2006 saw an awe inspiring three best paper awards at VTC, WPMC, and Globecomm, respectively.  In the Spring, four PhD students graduated (Bishwarup, Antonio, Farooq, and Taiwen) to embark on new careers and spread the wisdom and passion for wireless communications acquired under the mentoring of Professor Heath.  In the Fall, three new students entered (Kien, Tae Hyun, and Rahul) and will no doubt use their creative minds to replenish the grist necessary for advancing the knowledge of wireless communication systems in the WSIL mill.  Let’s keep the wheel turning by continued creative investigation and collaboration with our peers.

WNCG website gets a new face

WSIL News & Views 5 Comments »

For those of you who have yet to see this, check it out.  I must say, it’s much, much better than the hunter orange site of the past.

A Relevant YouTube Video

Miscellaneous 2 Comments »

My girlfriend thinks Weird Al’s spoof of Chamillionaire’s Ridin’ Dirty reminds her of me. I don’t know, I’d say about only 1/3 of the song applies to me. What do you think?

Your Mathematics Genealogy

WSIL News & Views No Comments »

As it turns out, the mathematics family tree organized by North Dakota State University includes control, system theory, probability, and information theory. This means you (if you get your Ph.D.) can enter your information. Whether you are aware or not, you are a grandstudent of Arogyaswami Paulraj (Prof. Heath’s Ph.D advisor) and Georgios Giannakis (Prof. Heath’s M.S. advisor). I have been entering some of this data. So far, I have submitted Prof. Heath, Prof. Giannakis, and Prof. Jerry Mendel (Prof. Giannakis’ Ph.D. advisor) and all of Prof. Heath’s students. Unfortunately, this is all of the information I could dig up. In particular, if anyone knows information about Prof. Paulraj’s and Prof. Mendel’s advisor that would be great. Jerry Mendel got his Ph.D. from Polytechnic University in Brooklyn in 1963. Professor Paulraj got his degree from IIT New Delhi in 1973. I do know that Prof. Mendel’s thesis was titled “The Identification of Overdamped Processes in the Time-Domain” and that Prof. Paulraj coauthored a paper with A. Mandal “Fast computation of ambiguity functions” in the Journal of IETE in 1973. I don’t know, however if, in fact, this was his advisor. I tried finding the IETE article, but it did not appear to be listed online. IETE appears to be an Indian oranization, so maybe my Indian colleagues have more on this. If anyone can offer any help, it would be great to see if we can dig deeper!

Best Paper Award for the WSIL…Again

WSIL News & Views 1 Comment »

In the words of Yogi Berra, “It’s like deja vu all over again.” A best paper award was recently annouced in favor of the WSIL at the Wireless Personal Multimedia Communications conference in San Diego, CA. This time it’s Taiwen Tang for his work in opportunistic feedback for clustered OFDM. The full reference is:

New Algorithms book…get it while it’s free!

WSIL News & Views No Comments »

Thanks to Johann Chiang for the head up on this free Algorithm text published by McGraw-Hill and authored by some of the CS faculty at UC-San Diego and UC-Berkeley.  It’s at an undergraduate level, so it should be a good basic reference on algorithms.

WSIL folder access in the WNCG

Reference 1 Comment »

I’ve been getting alot of requests from WSIL members regarding access to the WSIL network folder from your desk in the WNCG (the previous post was for VPN remote access). Since you are accessing the network locally, the procedure is somewhat different. Below I show how to map the network drive for both Mac OS X and Win XP.

  • For Win XP: There are two ways that your network can be configured.
    1. Most members are using a PC that was pre-configured by the IT people at UT (i.e. if you were given the PC by Dr. Heath). When you log on to these computers (with your ENGR account) you are automatically connected to the ENGR network. Therefore, the network drive is local and already authenticated to you. To map the network drive go directly to step 5, substep 2 in this post (for some unknown reason, some computers enter \\file\coe\ece\groups\WSIL instead in the Folder box). You won’t be prompted to enter your username and password.
    2. If you are trying to connect your own PC to the network locally (e.g. if you want to plug the network cable into your laptop) you have to manually connect to the network. Follow the same procedure as step 1 above, but this time you will be prompted for a username and password. For the username enter ENGR\[UT EID].
  • For Mac OS X: To my knowledge, UT doesn’t supply Macintosh computers to WNCG students, therefore you are using a non-configured setup and must manually connect to the network drive with the following procedure.  Just follow step 5, substep 1 here to create your network drive on the desktop.

VPN for UT and ENGR access

Reference 3 Comments »

Within the last year, VPN access at UT has changed. Instead of independent ENGR VPN access, UT and ENGR accounts can be accessed under the same VPN. What follows is a step by step account of how to access the ENGR file server and the WSIL folder for both Windows XP and Mac OS X.

  1. Dowload and install the Cisco VPN client (both Mac OS X and WinXP are available) from the Bevoware link on UT Direct.
  2. Using this VPN client, connect to the ITS VPN server at
  3. Enter your username and password as your UT EID and password respectively (note: this is the same way you login to UTDirect).
  4. Visit this page to verify that your VPN is active. If not active, see the troubleshooting guidelines on that page.
  5. Now we map the network drive of the WSIL folder.
    • To map network drives on Mac OS X go to the finder application, click the Go menu and select Connect to Server. The server name of the drive is smb:// entering ENGR as the domain, your UT EID as your username, and the password corresponding to your ENGR account.
    • On Win XP right click on My Computer and select Map Network Drive. Select the drive letter you want to access the network drive as, then type \\\COE\ECE\Groups\ECE_WSIL in the Folder box. For the username enter ENGR\[UT EID] with your ENGR account password as the password.

For additional help on VPNs at UT, see the following: link-1, link-2

Landing an Academic Job

Reference 1 Comment »

For those that are interested in an academic job, I’ve got a great reference (from an insider’s perspective) on how to secure your entrance into the academic community. As an aside, the site where I found this link ( has lots of information for Ph.D. students.