-
1
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
DOI 10.1109/JSAC.2004.839380
-
S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol.23, no.2, pp. 201-220, Feb. 2005. (Pubitemid 40245487)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.2
, pp. 201-220
-
-
Haykin, S.1
-
2
-
-
85032751060
-
A survey of dynamic spectrum access
-
DOI 10.1109/MSP.2007.361604
-
Q. Zhao and B. M. Sadler, "A survey of dynamic spectrum access," IEEE Signal Process. Mag., vol.24, no.3, pp. 79-89, May 2007. (Pubitemid 46840190)
-
(2007)
IEEE Signal Processing Magazine
, vol.24
, Issue.3
, pp. 79-89
-
-
Zhao, Q.1
Sadler, B.M.2
-
3
-
-
33847696923
-
Fundamental limits of spectrum-sharing in fading environments
-
DOI 10.1109/TWC.2007.05447
-
A. Ghasemi and E. S. Sousa, "Fundamental limits of spectrum-sharing in fading environments," IEEE Trans. Wireless Commun., vol.6, no.2, pp. 649-658, Feb. 2007. (Pubitemid 46375797)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.2
, pp. 649-657
-
-
Ghasemi, A.1
Sousa, E.S.2
-
4
-
-
61349094185
-
Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity
-
Feb.
-
X. Kang, Y.-C. Liang, A. Nallanathan, H. K. Garg, and R. Zhang, "Optimal power allocation for fading channels in cognitive radio networks: ergodic capacity and outage capacity," IEEE Trans. Wireless Commun., vol.8, no.2, pp. 940-950, Feb. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.2
, pp. 940-950
-
-
Kang, X.1
Liang, Y.-C.2
Nallanathan, A.3
Garg, H.K.4
Zhang, R.5
-
5
-
-
40849136148
-
Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks
-
DOI 10.1109/JSTSP.2007.914894
-
R. Zhang and Y.-C. Liang, "Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks," IEEE J. Sel. Topics Signal Process., vol.2, no.1, pp. 88-102, Feb. 2008. (Pubitemid 351392290)
-
(2008)
IEEE Journal on Selected Topics in Signal Processing
, vol.2
, Issue.1
, pp. 88-102
-
-
Zhang, R.1
Liang, Y.-C.2
-
6
-
-
70350406515
-
Cognitive multiple access channels: Optimal power allocation for weighted sum rate maximization
-
Sept.
-
L. Zhang, Y. Xin, Y.-C. Liang, and H. V. Poor, "Cognitive multiple access channels: optimal power allocation for weighted sum rate maximization," IEEE Trans. Commun., vol.57, no.9, pp. 2754-2762, Sept. 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.9
, pp. 2754-2762
-
-
Zhang, L.1
Xin, Y.2
Liang, Y.-C.3
Poor, H.V.4
-
7
-
-
67651177710
-
Weighted sum rate optimization for cognitive radio MIMO broadcast channels
-
June
-
L. Zhang, Y. Xin, and Y.-C. Liang, "Weighted sum rate optimization for cognitive radio MIMO broadcast channels," IEEE Trans. Wireless Commun., vol.8, no.6, pp. 2950-2959, June 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.6
, pp. 2950-2959
-
-
Zhang, L.1
Xin, Y.2
Liang, Y.-C.3
-
8
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. Wyner, "The wire-tap channel," Bell Systems Technical J., vol.54, no.8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Systems Technical J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
9
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
June
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory (ISIT'07), June 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT'07)
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
12
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
June
-
T. Liu and S. Shamai(Shitz), "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol.55, no.6, pp. 2547-2553, June 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
13
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai(Shitz), "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wirelss Commun. Netw., 2009.
-
(2009)
EURASIP J. Wirelss Commun. Netw.
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
14
-
-
0017973511
-
Broadcast channels with condifential messages
-
May
-
I. Csisźar and J. K̈orner, "Broadcast channels with condifential messages," IEEE Trans. Inf. Theory, vol.24, no.3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csisźar, I.1
K̈orner, J.2
-
15
-
-
62749109096
-
Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages
-
Mar.
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multiple-antenna Gaussian broadcast channel with confidential messages," IEEE Trans. Inf. Theory, vol.55, no.3, pp. 1235-1249, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.3
, pp. 1235-1249
-
-
Liu, R.1
Poor, H.V.2
-
16
-
-
70449514916
-
Optimal design of learning based MIMO cognitive radio systems
-
June
-
F. Gao, R. Zhang, Y.-C. Liang, and X. Wang, "Optimal design of learning based MIMO cognitive radio systems," in Proc. IEEE Int. Symp. Inf. Theory (ISIT'09), June 2009.
-
(2009)
Proc. IEEE Int. Symp. Inf. Theory (ISIT'09)
-
-
Gao, F.1
Zhang, R.2
Liang, Y.-C.3
Wang, X.4
-
18
-
-
33748578624
-
The capacity region of the Gaussian multiple-input multiple-output broadcast channel
-
DOI 10.1109/TIT.2006.880064
-
H. Wiengarten, Y. Steinberg, and S. Shamai(Shitz), "The capacity region of the Gaussian multiple-input multiple-output broadcast channel," IEEE Trans. Inf. Theory, vol.52, no.9, pp. 3936-3964, Sept. 2006. (Pubitemid 44363826)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.9
, pp. 3936-3964
-
-
Weingarten, H.1
Steinberg, Y.2
Shamai, S.3
-
19
-
-
77952860702
-
Achieving cognitive and secure transmissions using multiple antennas
-
conjunction with Int. Symp. Personal, Indoor Mobile Radio Commun. (PIMRC'09), Sept.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Achieving cognitive and secure transmissions using multiple antennas," in Proc. IEEE 1st Int. Workshop Cognitive Wireless Cloud Netw., in conjunction with Int. Symp. Personal, Indoor Mobile Radio Commun. (PIMRC'09), Sept. 2009.
-
(2009)
Proc. IEEE 1st Int. Workshop Cognitive Wireless Cloud Netw
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
21
-
-
0033296299
-
Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
-
J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones," Optimizaton Methods and Softw., pp. 625-653, 1999.
-
(1999)
Optimizaton Methods and Softw
, pp. 625-653
-
-
Sturm, J.F.1
-
22
-
-
77951542370
-
Robust beamforming design: From cognitive radio MISO channels to secrecy MISO channels
-
Dec.
-
L. Zhang, Y.-C. Liang, Y. Pei, and R. Zhang, "Robust beamforming design: from cognitive radio MISO channels to secrecy MISO channels," in Proc. IEEE Global TeleCommun. Conf. (GLOBECOM'09), Dec. 2009.
-
(2009)
Proc. IEEE Global TeleCommun. Conf. (GLOBECOM'09)
-
-
Zhang, L.1
Liang, Y.-C.2
Pei, Y.3
Zhang, R.4
-
24
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol.54, no.10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
|