-
1
-
-
80052145930
-
Anonymity analysis on social-spot-based pseudonym changing for location privacy in VANETs
-
Kyoto, Japan, Jun.
-
R. Lu, X. Lin, T. H. Luan, X. Liang, and X. Shen, "Anonymity analysis on social-spot-based pseudonym changing for location privacy in VANETs," in Proc. IEEE ICC, Kyoto, Japan, Jun. 2011.
-
(2011)
Proc. IEEE ICC
-
-
Lu, R.1
Lin, X.2
Luan, T.H.3
Liang, X.4
Shen, X.5
-
2
-
-
42649121690
-
Security in vehicular ad hoc networks
-
Apr.
-
X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, "Security in vehicular ad hoc networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 88-95, Apr. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.-H.5
Shen, X.6
-
3
-
-
57349124799
-
The pothole patrol: Using a mobile sensor network for road surface monitoring
-
Appl., Serv.
-
J. Eriksson, L. Girod, B. Hull, R. Newton, S. Madden, and H. Balakrishnan, "The pothole patrol: Using a mobile sensor network for road surface monitoring," in Proc. 6th Int. Conf. Mobile Syst., Appl., Serv., 2008, pp. 29-39.
-
(2008)
Proc. 6th Int. Conf. Mobile Syst
, pp. 29-39
-
-
Eriksson, J.1
Girod, L.2
Hull, B.3
Newton, R.4
Madden, S.5
Balakrishnan, H.6
-
4
-
-
33645997737
-
Quality of Privacy (QoP) for the design of ubiquitous healthcare applications
-
M. Tentori, J. Favela, and V. M. González, "Quality of privacy (QoP) for the design of ubiquitous healthcare applications," J. Universal Comput. Sci., vol. 12, no. 3, pp. 252-269, 2006. (Pubitemid 43593005)
-
(2006)
Journal of Universal Computer Science
, vol.12
, Issue.3
, pp. 252-269
-
-
Tentori, M.1
Favela, J.2
Gonzalez, V.M.3
-
5
-
-
84856175842
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, AZ Apr.
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. 27th Conf. Comput. Commun., Phoenix, AZ, Apr. 2008, pp. 1229-1237.
-
(2008)
Proc. 27th Conf. Comput. Commun
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
6
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J.-P. Hubaux, "Securing vehicular ad hoc networks," J. Comput. Security-Special Issue Security Ad Hoc Sensor Netw., vol. 15, no. 1, pp. 39-68, Jan. 2007. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
7
-
-
33845564340
-
Securing vehicular communications
-
DOI 10.1109/WC-M.2006.250352
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux, "Securing vehicular communications," IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 8-15, Oct. 2006. (Pubitemid 44934142)
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
8
-
-
57049129831
-
An efficient message authentication scheme for vehicular communications
-
Nov.
-
C. Zhang, X. Lin, R. Lu, P. Ho, and X. Shen, "An efficient message authentication scheme for vehicular communications," IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3357-3368, Nov. 2008.
-
(2008)
IEEE Trans. Veh. Technol.
, vol.57
, Issue.6
, pp. 3357-3368
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.4
Shen, X.5
-
9
-
-
38149010558
-
On the effectiveness of changing pseudonyms to provide location privacy in VANETs
-
L. Buttyan, T. Holczer, and I. Vajda, "On the effectiveness of changing pseudonyms to provide location privacy in VANETs," in Proc. ESAS, 2007, vol. 4572, pp. 129-141.
-
(2007)
Proc. ESAS
, vol.4572
, pp. 129-141
-
-
Buttyan, L.1
Holczer, T.2
Vajda, I.3
-
11
-
-
33746099349
-
Towards modeling wireless location privacy
-
L. Huang, H. Yamane, K. Matsuura, and K. Sezaki, "Towards modeling wireless location privacy," in Proc. PET, 2005, vol. 3856, pp. 59-77.
-
(2005)
Proc. PET
, vol.3856
, pp. 59-77
-
-
Huang, L.1
Yamane, H.2
Matsuura, K.3
Sezaki, K.4
-
12
-
-
33745840780
-
Silent cascade: Enhancing location privacy without communication QoS degradation
-
Security in Pervasive Computing - Third International Conference, SPC 2006, Proceedings
-
L. Huang, H. Yamane, K. Matsuura, and K. Sezaki, "Silent cascade: Enhancing location privacy without communication QoS degradation," in Proc. SPC, 2006, vol. 3934, pp. 165-180. (Pubitemid 44029565)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3934
, pp. 165-180
-
-
Huang, L.1
Yamane, H.2
Matsuura, K.3
Sezaki, K.4
-
13
-
-
84885223558
-
Swing & swap: User-centric approaches towards maximizing location privacy
-
M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, "Swing & swap: User-centric approaches towards maximizing location privacy," in Proc. WPES, 2006, pp. 19-28.
-
(2006)
Proc. WPES
, pp. 19-28
-
-
Li, M.1
Sampigethaya, K.2
Huang, L.3
Poovendran, R.4
-
14
-
-
57049149967
-
CARAVAN: Providing location privacy for VANET
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "CARAVAN: Providing location privacy for VANET," in Proc. ESCAR, 2005.
-
(2005)
Proc. ESCAR
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
15
-
-
74949136373
-
Mix zones for location privacy in vehicular networks
-
Transp. Syst., Vancouver, BC, Canada Aug. LCA-CONF-2007-016
-
J. Freudiger, M. Raya, and M. Feleghhazi, "Mix zones for location privacy in vehicular networks," presented at the Workshop on Wireless Networking for Intell. Transp. Syst., Vancouver, BC, Canada, Aug. 2007, LCA-CONF-2007-016.
-
(2007)
Presented at the Workshop on Wireless Networking for Intell
-
-
Freudiger, J.1
Raya, M.2
Feleghhazi, M.3
-
16
-
-
84937564790
-
Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
-
Designing Privacy Enhancing Technologies
-
A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudonymity-A proposal for terminology," in Proc. Workshop Des. Issues Anonymity Unobservability, 2000, vol. 2009, pp. 1-9. (Pubitemid 33241784)
-
(2001)
Lecture Notes in Computer Science
, Issue.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
17
-
-
63749123999
-
Privacy and identity management for vehicular communication systems: A position paper
-
Zurich, Switzerland LCA-CONF-2006-020
-
P. Papadimitratos, A. Kung, J. P. Hubaux, and F. Kargl, "Privacy and identity management for vehicular communication systems: A position paper," presented at the Workshop on Standards for Privacy in User-Centric Identity Management, Zurich, Switzerland, 2006, LCA-CONF-2006-020.
-
(2006)
Presented at the Workshop on Standards for Privacy in User-Centric Identity Management
-
-
Papadimitratos, P.1
Kung, A.2
Hubaux, J.P.3
Kargl, F.4
-
18
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
DOI 10.1109/TVT.2007.906878
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacy-preserving protocol for vehicular communication," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007. (Pubitemid 350201103)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
20
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
Montreal, QC, Canada Sep.
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and robust pseudonymous authentication in VANET," in Proc. VANET, Montreal, QC, Canada, Sep. 2007, pp. 19-28.
-
(2007)
Proc. VANET
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
21
-
-
33746210218
-
Pseudonymous PKI for ubiquitous computing
-
Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings
-
K. Zeng, "Pseudonymous PKI for ubiquitous computing," in Proc. EuroPKI, Turin, Italy, Jun. 2006, pp. 207-222. (Pubitemid 44097514)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4043
, pp. 207-222
-
-
Zeng, K.1
-
22
-
-
70349655467
-
SPARK: A new VANET-based smart parking scheme for large parking lots
-
Rio de Janeiro, Brazil Apr.
-
R. Lu, X. Lin, H. Zhu, and X. Shen, "SPARK: A new VANET-based smart parking scheme for large parking lots," in Proc. 28th Conf. INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 1413-1421.
-
(2009)
Proc. 28th Conf. INFOCOM
, pp. 1413-1421
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
-
23
-
-
23044435711
-
Short signatures from the weil pairing
-
DOI 10.1007/s00145-004-0314-9
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptology, vol. 17, no. 4, pp. 297-319, Sep. 2004. (Pubitemid 41201461)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
24
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
DOI 10.1007/s00145-007-9005-7
-
D. Boneh and X. Boyen, "Short signatures without random oracles and the SDH assumption in bilinear groups," J. Cryptology, vol. 21, no. 2, pp. 149-177, Feb. 2008. (Pubitemid 351653334)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
25
-
-
77953313061
-
SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
San Diego, CA, Mar.
-
R. Lu, X. Lin, and X. Shen, "SPRING: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks," in Proc. 29th IEEE INFOCOM, San Diego, CA, Mar. 2010, pp. 1229-1237.
-
(2010)
Proc. 29th IEEE INFOCOM
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
27
-
-
52349095836
-
Key management for UMTS MBMS
-
Sep.
-
S.-M. Cheng, W.-R. Lai, P. Lin, and K.-C. Chen, "Key management for UMTS MBMS," IEEE Trans. Wireless Commun., vol. 7, no. 9, pp. 3619-3628, Sep. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.9
, pp. 3619-3628
-
-
Cheng, S.-M.1
Lai, W.-R.2
Lin, P.3
Chen, K.-C.4
-
28
-
-
84856167505
-
Assessing and improving privacy in VANETs
-
Nov.
-
M. Gerlach, "Assessing and improving privacy in VANETs," in Proc. 4th Workshop ESCAR, Nov. 2006, pp. 1-9.
-
(2006)
Proc. 4th Workshop ESCAR
, pp. 1-9
-
-
Gerlach, M.1
-
29
-
-
69949127837
-
On the optimal placement of mix zones
-
J. Freudiger, R. Shokri, and J.-P. Hubaux, "On the optimal placement of mix zones," in Proc. Privacy Enhancing Technol., 2009, pp. 216-234.
-
(2009)
Proc. Privacy Enhancing Technol.
, pp. 216-234
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.-P.3
-
30
-
-
77955303955
-
Measuring long-term location privacy in vehicular communication systems
-
Jul
-
Z. Ma, F. Kargl, and M. Weber, "Measuring long-term location privacy in vehicular communication systems," Comput. Commun., vol. 33, no. 12, pp. 1414-1427, Jul. 2010.
-
(2010)
Comput. Commun.
, vol.33
, Issue.12
, pp. 1414-1427
-
-
Ma, Z.1
Kargl, F.2
Weber, M.3
-
31
-
-
74049097109
-
On non-cooperative location privacy: A game-theoretic analysis
-
J. Freudiger, M. H. Manshaei, J.-P. Hubaux, and D. C. Parkes, "On non-cooperative location privacy: A game-theoretic analysis," in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 324-337.
-
(2009)
Proc. ACM Conf. Comput. Commun. Security
, pp. 324-337
-
-
Freudiger, J.1
Manshaei, M.H.2
Hubaux, J.-P.3
Parkes, D.C.4
-
32
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
33
-
-
0345258506
-
User cooperation diversity-Part I: System description
-
Nov.
-
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity-Part I: System description," IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, Issue.11
, pp. 1927-1938
-
-
Sendonaris, A.1
Erkip, E.2
Aazhang, B.3
-
34
-
-
0042610451
-
End-to-end performance of transmission systems with relays over Rayleigh-fading channels
-
Nov.
-
M. O. Hasna and M.-S. Alouini, "End-to-end performance of transmission systems with relays over Rayleigh-fading channels," IEEE Trans. Wireless Commmun., vol. 2, no. 6, pp. 1126-1131, Nov. 2003.
-
(2003)
IEEE Trans. Wireless Commmun.
, vol.2
, Issue.6
, pp. 1126-1131
-
-
Hasna, M.O.1
Alouini, M.-S.2
-
35
-
-
1342286787
-
Harmonic mean and end-to-end performance of transmission systems with relays
-
Jan.
-
M. O. Hasna and M.-S. Alouini, "Harmonic mean and end-to-end performance of transmission systems with relays," IEEE Trans. Commun., vol. 52, no. 1, pp. 130-135, Jan. 2004.
-
(2004)
IEEE Trans. Commun.
, vol.52
, Issue.1
, pp. 130-135
-
-
Hasna, M.O.1
Alouini, M.-S.2
-
36
-
-
35448931484
-
Cooperative communications with outage-optimal opportunistic relaying
-
DOI 10.1109/TWC.2007.06020050
-
A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007. (Pubitemid 47625224)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
37
-
-
34548074211
-
Improving amplify-and-forward relay networks: Optimal power allocation versus selection
-
DOI 10.1109/TWC.2007.06026
-
Y. Zhao, R. Adve, and T. J. Lim, "Improving amplify-and-forward relay networks: Optimal power allocation versus selection," IEEE Trans. Wireless Commun., vol. 6, no. 8, pp. 3114-3123, Aug. 2007. (Pubitemid 47295201)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.8
, pp. 3114-3123
-
-
Yi, Z.1
Adve, R.2
Teng, J.L.3
-
38
-
-
61449087336
-
Multiuser diversity in multiuser twohop cooperative relay wireless networks: System model and performance analysis
-
Feb.
-
X. Zhang, W. Wang, and X. Ji, "Multiuser diversity in multiuser twohop cooperative relay wireless networks: System model and performance analysis," IEEE Trans. Veh. Technol., vol. 58, no. 2, pp. 1031-1036, Feb. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.2
, pp. 1031-1036
-
-
Zhang, X.1
Wang, W.2
Ji, X.3
-
39
-
-
77953037343
-
Performance analysis of multiuser diversity in cooperative multi-relay networks under Rayleigh-fading channels
-
Jul.
-
S. Chen, W. Wang, and X. Zhang, "Performance analysis of multiuser diversity in cooperative multi-relay networks under Rayleigh-fading channels," IEEE Trans. Wireless Commun., vol. 8, no. 7, pp. 3415-3419, Jul. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.7
, pp. 3415-3419
-
-
Chen, S.1
Wang, W.2
Zhang, X.3
-
40
-
-
77958583367
-
On the combination of cooperative diversity and multiuser diversity in multi-source multi-relay wireless networks
-
Jun.
-
L. Sun, T. Zhang, L. Lu, and H. Niu, "On the combination of cooperative diversity and multiuser diversity in multi-source multi-relay wireless networks," IEEE Signal Process. Lett., vol. 17, no. 6, pp. 535-538, Jun. 2010.
-
(2010)
IEEE Signal Process. Lett.
, vol.17
, Issue.6
, pp. 535-538
-
-
Sun, L.1
Zhang, T.2
Lu, L.3
Niu, H.4
-
41
-
-
79951868527
-
A new efficient low-complexity scheme for multi-source multi-relay cooperative networks
-
Feb
-
H. Ding, J. Ge, D. B. da Costa, and Z. Jiang, "A new efficient low-complexity scheme for multi-source multi-relay cooperative networks," IEEE Trans. Veh. Technol., vol. 60, no. 2, pp. 716-722, Feb. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.2
, pp. 716-722
-
-
Ding, H.1
Ge, J.2
Da Costa, D.B.3
Jiang, Z.4
-
42
-
-
78650000539
-
Diversity exploitation in multi-source cooperations with multiple antennas at the destination
-
Dec
-
Y. Li, Q. Yin, J. Wang, and H. Wang, "Diversity exploitation in multi-source cooperations with multiple antennas at the destination," IEEE Commun. Lett., vol. 14, no. 12, pp. 1152-1154, Dec. 2010.
-
(2010)
IEEE Commun. Lett.
, vol.14
, Issue.12
, pp. 1152-1154
-
-
Li, Y.1
Yin, Q.2
Wang, J.3
Wang, H.4
-
43
-
-
79952908932
-
Impact of opportunistic scheduling on cooperative dual-hop relay networks
-
Mar
-
N. Yang, M. Elkashlan, and J. Yuan, "Impact of opportunistic scheduling on cooperative dual-hop relay networks," IEEE Trans. Commun., vol. 59, no. 3, pp. 689-694, Mar. 2011.
-
(2011)
IEEE Trans. Commun.
, vol.59
, Issue.3
, pp. 689-694
-
-
Yang, N.1
Elkashlan, M.2
Yuan, J.3
-
44
-
-
77953731107
-
Outage probability of multiuser relay networks in Nakagami-m fading channels
-
Jun
-
N. Yang, M. Elkashlan, and J. Yuan, "Outage probability of multiuser relay networks in Nakagami-m fading channels," IEEE Trans. Veh. Tech-nol., vol. 59, no. 5, pp. 2120-2132, Jun. 2010.
-
(2010)
IEEE Trans. Veh. Tech-nol.
, vol.59
, Issue.5
, pp. 2120-2132
-
-
Yang, N.1
Elkashlan, M.2
Yuan, J.3
-
45
-
-
79960556261
-
Diversity analysis of multiuser multi-relay networks
-
Jul
-
J. Kim, D. S. Michalopoulos, and R. Schober, "Diversity analysis of multiuser multi-relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 7, pp. 2380-2389, Jul. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.7
, pp. 2380-2389
-
-
Kim, J.1
Michalopoulos, D.S.2
Schober, R.3
-
46
-
-
33846794247
-
-
[Online]. Available
-
P. Kyösti, J. Meinilä, L. Hentilä, X. Zhao, T. Jämsä, C. Schneider, M. Narandzi, M. Milojevi, A. Hong, J. Ylitalo, V.-M. Holappa, M. Alatossava, R. Bultitude, Y. deJong, and T. Rautiainen, WINNER II Interim Channel Models (IST-4-027756 WINNER II D1.1.1 V1.1). [Online]. Available: http://www.istwinner.org/WINNER2-Deliverables/D1.1.1.pdf
-
WINNER II Interim Channel Models (IST-4-027756 WINNER II D1.1.1 V1.1)
-
-
Kyösti, P.1
Meinilä, J.2
Hentilä, L.3
Zhao, X.4
Jämsä, T.5
Schneider, C.6
Narandzi, M.7
Milojevi, M.8
Hong, A.9
Ylitalo, J.10
Holappa, V.-M.11
Alatossava, M.12
Bultitude, R.13
Dejong, Y.14
Rautiainen, T.15
-
49
-
-
37849186584
-
Performance analysis of multiuser selection diversity
-
DOI 10.1109/TVT.2006.878612
-
L. Yang and M.-S. Alouini, "Performance analysis of multiuser selection diversity," IEEE Trans. Veh. Technol., vol. 55, no. 6, pp. 1848-1861, Nov. 2006. (Pubitemid 44823999)
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.6
, pp. 1848-1861
-
-
Yang, L.1
Alouini, M.-S.2
-
50
-
-
73149109521
-
Asymptotic analysis of opportunistic relaying protocols
-
Aug.
-
Q. F. Zhou, C. M. Lau, and S. F. Hau, "Asymptotic analysis of opportunistic relaying protocols," IEEE Trans. Wireless Commun., vol. 8, no. 8, pp. 3915-3920, Aug. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.8
, pp. 3915-3920
-
-
Zhou, Q.F.1
Lau, C.M.2
Hau, S.F.3
-
51
-
-
0003663467
-
-
New York: McGraw-Hill
-
A. Papoulis, Probability, Random Variables, and Stochastic Processes, 4th ed. New York: McGraw-Hill, 2002.
-
(2002)
Probability, Random, Variables, and Stochastic Processes, 4th Ed
-
-
Papoulis, A.1
-
52
-
-
0003498504
-
-
San Diego, CA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. San Diego, CA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products, 7th Ed
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|