-
1
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
3
-
-
68349116049
-
Information theoretic security
-
Hanover, MA: Now Publishers, Shitz
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security", in Foundations and Trends in Communications and Information Theory. Hanover, MA: Now Publishers, 2008, vol. 5, nos. 4-5, pp. 355-580.
-
(2008)
Foundations and Trends in Communications and Information Theory.
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
4
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems", Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
5
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
C. E. Shannon, "A mathematical theory of communication", Bell Syst. Tech. J., vol. 27, pp. 379-423 and 623-656, 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
6
-
-
0030706705
-
Optimal power allocation over parallel Gaussian broadcast channels
-
Ulm, Germany, Jun
-
D. N. Tse, "Optimal power allocation over parallel Gaussian broadcast channels", in Proc. IEEE Int. Symp. Information Theory (ISIT), Ulm, Germany, Jun. 1997, pp. 27-27.
-
(1997)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 27-27
-
-
Tse, D.N.1
-
7
-
-
0035270116
-
Capacity and optimal resource allocation for fading broadcast channels-Part I: Ergodic capacity
-
DOI 10.1109/18.915665, PII S0018944801013530
-
L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels-Part I: Ergodic capacity", IEEE Trans. Inform. Theory, vol. 47, no. 3, pp. 1083-1102, Mar. 2001. (Pubitemid 32425438)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1083-1102
-
-
Li, L.1
Goldsmith, A.J.2
-
8
-
-
0035271101
-
Capacity and optimal resource allocation for fading broadcast channels-Part II: Outage capacity
-
DOI 10.1109/18.915667, PII S0018944801013529
-
L. Li and A. J. Goldsmith, "Capacity and optimal resource allocation for fading broadcast channels-Part II: Outage capacity", IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1103-1127, Mar. 2001. (Pubitemid 32425439)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.3
, pp. 1103-1127
-
-
Li, L.1
Goldsmith, A.J.2
-
9
-
-
84930890020
-
Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks
-
Dec
-
L. Tassiulas and A. Ephremides, "Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks", IEEE Trans. Automat. Contr., vol. 37, no. 12, pp. 1936-1948, Dec. 1992.
-
(1992)
IEEE Trans. Automat. Contr.
, vol.37
, Issue.12
, pp. 1936-1948
-
-
Tassiulas, L.1
Ephremides, A.2
-
10
-
-
5044249451
-
Throughput optimal power and rate control for multiaccess and broadcast communications
-
Chicago, IL, Jun./Jul
-
E. M. Yeh and A. S. Cohen, "Throughput optimal power and rate control for multiaccess and broadcast communications", in Proc. IEEE Int. Symp. Information Theory (ISIT), Chicago, IL, Jun./Jul. 2004, pp. 112-112.
-
(2004)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 112-112
-
-
Yeh, E.M.1
Cohen, A.S.2
-
11
-
-
18844461997
-
Stable scheduling policies for fading wireless channels
-
DOI 10.1109/TNET.2004.842226
-
A. Eryilmaz, R. Srikant, and J. Perkins, "Stable scheduling policies for fading wireless channels", IEEE/ACM Trans. Netw., vol. 13, no. 2, pp. 411-424, Apr. 2005. (Pubitemid 40690835)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.2
, pp. 411-424
-
-
Eryilmaz, A.1
Srikant, R.2
Perkins, J.R.3
-
12
-
-
25844526594
-
Fair resource allocation in wireless networks using queue-length-based scheduling and congestion control
-
Miami, FL, Mar
-
A. Eryilmaz and R. Srikant, "Fair resource allocation in wireless networks using queue-length-based scheduling and congestion control", in Proc. IEEE INFOCOM, Miami, FL, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Eryilmaz, A.1
Srikant, R.2
-
13
-
-
25844437987
-
Fairness and optimal stochastic control for heterogeneous networks
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
M. Neely, E. Modiano, and C. Li, "Fairness and optimal stochastic control for heterogeneous networks", in Proc. IEEE INFOCOM, Miami, FL, Mar. 2005, vol. 3, pp. 1723-1734. (Pubitemid 41390687)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.3
, pp. 1723-1734
-
-
Neely, M.J.1
Modiano, E.2
Li, C.-P.3
-
14
-
-
24944508677
-
Maximizing queueing network utility subject to stability: Greedy primal-dual algorithm
-
DOI 10.1007/s11134-005-1450-0
-
A. Stolyar, "Maximizing queueing network utility subject to stability: Greedy primal-dual algorithm", Queueing Syst., vol. 50, no. 4, pp. 401-457, Aug. 2005. (Pubitemid 41312621)
-
(2005)
Queueing Systems
, vol.50
, Issue.4
, pp. 401-457
-
-
Stolyar, A.L.1
-
15
-
-
33747303799
-
Joint congestion control, routing and MAC for stability and fairness in wireless networks
-
Aug
-
A. Eryilmaz and R. Srikant, "Joint congestion control, routing and MAC for stability and fairness in wireless networks", IEEE J. Sel. Areas Commun., vol. 24, no. 8, pp. 1514-1524, Aug. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.8
, pp. 1514-1524
-
-
Eryilmaz, A.1
Srikant, R.2
-
16
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security", IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
17
-
-
77952739833
-
Degraded compound multi-receiver wiretap channels
-
submitted for publication
-
E. Ekrem and S. Ulukus, "Degraded compound multi-receiver wiretap channels", IEEE Trans. Inf. Theory, 2009, submitted for publication.
-
(2009)
IEEE Trans. Inf. Theory
-
-
Ekrem, E.1
Ulukus, S.2
-
18
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
Apr
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel", IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
-
19
-
-
70349925047
-
Secrecy capacity of a class of broadcast channels with an eavesdropper
-
Article ID 824235
-
E. Ekrem and S. Ulukus, "Secrecy capacity of a class of broadcast channels with an eavesdropper", Special Issue on Wireless Physical Layer Security, EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 29-29, 2009, Article ID 824235.
-
(2009)
Special Issue on Wireless Physical Layer Security, EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 29-29
-
-
Ekrem, E.1
Ulukus, S.2
-
20
-
-
70449505045
-
Ergodic secrecy capacity region of the fading broadcast channel
-
Dresden, Germany
-
E. Ekrem and S. Ulukus, "Ergodic secrecy capacity region of the fading broadcast channel", in Proc. IEEE Int. Conf. Commun. (ICC), Dresden, Germany, 2009.
-
(2009)
Proc. IEEE Int. Conf. Commun. (ICC)
-
-
Ekrem, E.1
Ulukus, S.2
-
21
-
-
77955676680
-
Capacity region of Gaussian MIMO broadcast channels with common and confidential messages
-
submitted for publication
-
E. Ekrem and S. Ulukus, "Capacity region of Gaussian MIMO broadcast channels with common and confidential messages", IEEE Trans. Inf. Theory, 2010, submitted for publication.
-
(2010)
IEEE Trans. Inf. Theory
-
-
Ekrem, E.1
Ulukus, S.2
-
22
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels", IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
Gamal, H.E.3
-
23
-
-
45249092485
-
Secure broadcasting
-
Jun
-
A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting", Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.3
-
24
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Baltimore, MD, Mar
-
Z. Li, W. Trappe, and R. D. Yates, "Secret communication via multi-antenna transmission", in Proc. Conf. Information Sciences and Systems (CISS), Baltimore, MD, Mar. 2007.
-
(2007)
Proc. Conf. Information Sciences and Systems (CISS)
-
-
Li, Z.1
Trappe, W.2
Yates, R.D.3
-
25
-
-
77958520866
-
Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages
-
Nov
-
H. D. Ly, T. Liu, and Y. Liang, "Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages", IEEE Trans. Inf.. Theory, vol. 56, no. 11, pp. 5477-5487, Nov. 2010.
-
(2010)
IEEE Trans. Inf.. Theory
, vol.56
, Issue.11
, pp. 5477-5487
-
-
Ly, H.D.1
Liu, T.2
Liang, Y.3
-
26
-
-
67949100557
-
Physical layer security in broadcast networks
-
May/Jun, Shitz
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Physical layer security in broadcast networks", Security Commun. Netw., vol. 2, no. 3, pp. 227-238, May/Jun. 2009.
-
(2009)
Security Commun. Netw.
, vol.2
, Issue.3
, pp. 227-238
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
27
-
-
45249119255
-
Secure communication over fading channels
-
Jun, Shitz
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels", Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
28
-
-
70449513409
-
On the compound MIMO broadcast channels with confidential messages
-
Seoul, Korea, Jun./Jul, Shitz
-
M. Kobayashi, Y. Liang, S. Shamai (Shitz), and M. Debbah, "On the compound MIMO broadcast channels with confidential messages", in Proc. IEEE Int. Symp. Information Theory (ISIT), Seoul, Korea, Jun./Jul. 2009.
-
(2009)
Proc. IEEE Int. Symp. Information Theory (ISIT)
-
-
Kobayashi, M.1
Liang, Y.2
Shamai, S.3
Debbah, M.4
-
29
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Jun
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions", Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
30
-
-
62749109096
-
Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages
-
Mar
-
R. Liu and H. V. Poor, "Secrecy capacity region of a multi-antenna Gaussian broadcast channel with confidential messages", IEEE Trans. Inf. Theory, vol. 55, no. 3, pp. 1235-1249, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.3
, pp. 1235-1249
-
-
Liu, R.1
Poor, H.V.2
-
31
-
-
77955683763
-
MIMO Gaussian broadcast channels with confidential and common messages
-
Austin, TX, Jun, Shitz
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "MIMO Gaussian broadcast channels with confidential and common messages", in Proc. IEEE Int. Symp. Information Theory (ISIT), Austin, TX, Jun. 2010.
-
(2010)
Proc. IEEE Int. Symp. Information Theory (ISIT)
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
32
-
-
77955721830
-
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
-
Sep, Shitz
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai (Shitz), "Multiple-input multiple-output Gaussian broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
33
-
-
70349616112
-
Capacity bounds for broadcast channels with confidential messages
-
Oct
-
J. Xu, Y. Cao, and B. Chen, "Capacity bounds for broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 55, no. 10, pp. 4529-4542, Oct. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.10
, pp. 4529-4542
-
-
Xu, J.1
Cao, Y.2
Chen, B.3
-
34
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
Dec
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel", IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
35
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming", Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
Special Issue on Information Theoretic Security, IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
36
-
-
0032404969
-
Fair end-to-end window-based congestion control
-
Boston, MA
-
J. Mo and J. Walrand, "Fair end-to-end window-based congestion control", in Proc. SPIE Int. Symp., Boston, MA, 1998.
-
(1998)
Proc. SPIE Int. Symp.
-
-
Mo, J.1
Walrand, J.2
-
37
-
-
77953802876
-
Secure transmission with multiple antennas-I: The MISOME wiretap channel
-
Jul
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-I: The MISOME wiretap channel", IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
38
-
-
77958560746
-
Secure transmission with multiple antennas-II: The MIMOME wiretap channel
-
Nov
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-II: The MIMOME wiretap channel", IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
39
-
-
84940667036
-
The secrecy capacity of the MIMO wire-tap channel
-
Monticello, IL, Sep
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wire-tap channel", in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007.
-
(2007)
Proc. 45th Annu. Allerton Conf. Communication, Control and Computing
-
-
Oggier, F.1
Hassibi, B.2
-
40
-
-
66949180834
-
A note on the secrecy capacity of the multi-antenna wire-tap channel
-
Jun, Shitz
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multi-antenna wire-tap channel", IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
41
-
-
51649109883
-
On the secrecy capacity of fading wireless channel with multiple eavesdroppers
-
Nice, France, Jun
-
P. Wang, G. Yu, and Z. Zhang, "On the secrecy capacity of fading wireless channel with multiple eavesdroppers", in Proc. IEEE Int. Symp. Information Theory (ISIT), Nice, France, Jun. 2007.
-
(2007)
Proc. IEEE Int. Symp. Information Theory (ISIT)
-
-
Wang, P.1
Yu, G.2
Zhang, Z.3
-
42
-
-
84940647248
-
Compound wire-tap channels
-
Monticello, IL, Sep, Shitz
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wire-tap channels", in Proc. 45th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2007.
-
(2007)
Proc. 45th Annu. Allerton Conf. Communication, Control and Computing
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
43
-
-
73449104694
-
Compound wire-tap channels
-
Article ID 142374, Shitz
-
Y. Liang, G. Kramer, H. V. Poor, and S. Shamai (Shitz), "Compound wire-tap channels", Special Issue on Wireless Physical Layer Security, EURASIP J. Wireless Commun. Netw., vol. 2009, p. 12, 2009, Article ID 142374.
-
(2009)
Special Issue on Wireless Physical Layer Security, EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 12
-
-
Liang, Y.1
Kramer, G.2
Poor, H.V.3
Shamai, S.4
-
44
-
-
52349104395
-
The secrecy capacity of a class of parallel Gaussian compound wiretap channels
-
Toronto, ON, Canada, Jul
-
T. Liu, V. Prabhakaran, and S. Vishwanath, "The secrecy capacity of a class of parallel Gaussian compound wiretap channels", in Proc. IEEE Int. Symp. Information Theory (ISIT), Toronto, ON, Canada, Jul. 2008.
-
(2008)
Proc. IEEE Int. Symp. Information Theory (ISIT)
-
-
Liu, T.1
Prabhakaran, V.2
Vishwanath, S.3
-
45
-
-
0015601146
-
Random coding theorem for broadcast channels with degraded components
-
Mar
-
P. P. Bergmans, "Random coding theorem for broadcast channels with degraded components", IEEE Trans. Inf. Theory, vol. IT-19, no. 2, pp. 197-207, Mar. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.IT-19
, Issue.2
, pp. 197-207
-
-
Bergmans, P.P.1
-
46
-
-
35148864632
-
Resource allocation for wireless fading relay channels: Max-min solution
-
DOI 10.1109/TIT.2007.904996, Special issue on Models, Theory, and Codes for Relaying and Cooperation in Communication Network
-
Y. Liang, V. V. Veeravalli, and H. V. Poor, "Resource allocation for wireless fading relay channels: Max-min solution", Special Issue on Models, Theory and Codes for Relaying and Cooperation in Communication Networks, IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3432-3453, Oct. 2007. (Pubitemid 47534507)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.10
, pp. 3432-3453
-
-
Liang, Y.1
Veeravalli, V.V.2
Poor, H.V.3
-
47
-
-
84940654702
-
Secrecy capacity of independent parallel channels
-
Monticello, IL, Sep
-
Z. Li, R. Yates, and W. Trappe, "Secrecy capacity of independent parallel channels", in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006.
-
(2006)
Proc. 44th Annu. Allerton Conf. Communication, Control and Computing
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
48
-
-
77954445239
-
Secure communication over fading channels
-
Monticello, IL, Sep
-
Y. Liang and H. V. Poor, "Secure communication over fading channels", in Proc. 44th Annu. Allerton Conf. Communication, Control and Computing, Monticello, IL, Sep. 2006.
-
(2006)
Proc. 44th Annu. Allerton Conf. Communication, Control and Computing
-
-
Liang, Y.1
Poor, H.V.2
|