-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
F. Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-14.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, F.1
-
2
-
-
69549108230
-
Energy efficient virtual MIMO communication for wireless sensor networks
-
S. Hussain, A. Azim, J. H. Park, "Energy efficient virtual MIMO communication for wireless sensor networks," Telecommunication Systems, vol 42, No. 1-2, pp. 139 - 140, 2009.
-
(2009)
Telecommunication Systems
, vol.42
, Issue.1-2
, pp. 139-140
-
-
Hussain, S.1
Azim, A.2
Park, J.H.3
-
3
-
-
63149084135
-
Energy efficient cooperative MIMO in wireless sensor network
-
Dec.
-
M. R. Islam, J. Kim, "Energy efficient cooperative MIMO in wireless sensor network," in Proc. IEEE Intl. Conf. Intelligent Sensors, Sensor Networks and Information Processing, pp. 505-510, Dec. 2008.
-
(2008)
Proc. IEEE Intl. Conf. Intelligent Sensors, Sensor Networks and Information Processing
, pp. 505-510
-
-
Islam, M.R.1
Kim, J.2
-
4
-
-
70350692585
-
Securing wireless sensor networks, a survey
-
Sept.
-
Y. Zhou, Y. Fang, Y. Zhang, "Securing wireless sensor networks, a survey," IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6-28, Sept. 2008.
-
(2008)
IEEE Communications Surveys & Tutorials
, vol.10
, Issue.3
, pp. 6-28
-
-
Zhou, Y.1
Fang, Y.2
Zhang, Y.3
-
6
-
-
51849132358
-
Using antenna array redundancy and channel diversity for secure wireless transmissions
-
X. Li, J. Hwu, "Using antenna array redundancy and channel diversity for secure wireless transmissions," pp. 24-32, vol. 2, no. 3, Journal of Communications, 2007.
-
(2007)
Journal of Communications
, vol.2
, Issue.3
, pp. 24-32
-
-
Li, X.1
Hwu, J.2
-
7
-
-
44849094850
-
Secure MIMO communications in a system with equal numbers of transmit and receive antennas
-
DOI 10.1109/LCOMM.2008.080077
-
H. Kim and J. D. Villasenor, "Secure MIMO communications in a system with equal numbers of transmit and receive antennas," pp. 386-388, vol. 12, no. 5, IEEE Communications Letters, vol. 12, no. 5, pp. 386-388, May 2008. (Pubitemid 351796190)
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.5
, pp. 386-388
-
-
Kim, H.1
Villasenor, J.D.2
-
10
-
-
77954038057
-
Cross layer design of heterogeneous virtual MIMO radio networks with multi-optimization
-
W. Chen, H. Miao, L. Hong, J. Savage, H. Adas, "Cross Layer Design of Heterogeneous Virtual MIMO Radio Networks with Multi-Optimization," Proceedings of IEEE International Parallel & Distributed Processing Symposium on Advances in Parallel and Distributed Computing Models, 2010.
-
(2010)
Proceedings of IEEE International Parallel & Distributed Processing Symposium on Advances in Parallel and Distributed Computing Models
-
-
Chen, W.1
Miao, H.2
Hong, L.3
Savage, J.4
Adas, H.5
-
11
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Leneman, D. N. C. Tse and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Info. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Info. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Leneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
13
-
-
0032183752
-
A simple transmit diversity technique for wireless communications
-
PII S0733871698078858
-
S. M. Alamouti, "A simple transmit diversity technique for wireless communications," IEEE Journal on Selected Areas in Communications, vol. 16, no. 8, Oct. 1998, pp. 1451-1458. (Pubitemid 128566830)
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.8
, pp. 1451-1458
-
-
Alamouti, S.M.1
-
14
-
-
34249313010
-
Tracing malicious relays in cooperative wireless communications
-
DOI 10.1109/TIFS.2007.897242
-
Y. Mao and M. Wu, "Tracing malicious relays in cooperative wireless communications," in IEEE Trans. Information Forensics and Security, vol. 2, no. 2, pp. 198-212, Jun., 2007. (Pubitemid 46808688)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.2
, pp. 198-212
-
-
Mao, Y.1
Wu, M.2
-
15
-
-
62949194452
-
A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks
-
X. Du, M. Guizani, Y. Xiao, H-H Chen, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks," pp. 1223-1229, vol.8, no.3, IEEE Trans. On Wireless Communications, 2009.
-
(2009)
IEEE Trans. on Wireless Communications
, vol.8
, Issue.3
, pp. 1223-1229
-
-
Du, X.1
Guizani, M.2
Xiao, Y.3
Chen, H.-H.4
|