-
1
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. El. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El. Gamal, H.3
-
3
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
4
-
-
77958560746
-
Secure transmission with multiple antennapart II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W.Wornell, "Secure transmission with multiple antennapart II: the MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
5
-
-
77953802876
-
Secure transmission with multiple antennas I: The MIMOME wiretap channel
-
Jul.
-
A. Khisti and G. W.Wornell, "Secure transmission with multiple antennas I: the MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
6
-
-
82155167606
-
Power allocation and achievable secrecy rates in MISOME wiretap channels
-
Nov.
-
T. V. Nguye and H. Shin, "Power allocation and achievable secrecy rates in MISOME wiretap channels," IEEE Commun. Lett., vol. 15, no. 11, pp. 1196-1198, Nov. 2011.
-
(2011)
IEEE Commun. Lett
, vol.15
, Issue.11
, pp. 1196-1198
-
-
Nguye, T.V.1
Shin, H.2
-
7
-
-
79955484022
-
On secrecy of codebook-based transmission beamforming under receiver limited feedback
-
Apr.
-
B. Shafi, Z. Ding, and G. Y. Li, "On secrecy of codebook-based transmission beamforming under receiver limited feedback," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1212-1223, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.4
, pp. 1212-1223
-
-
Shafi, B.1
Ding, Z.2
Li, G.Y.3
-
8
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. Rodrigues, and S. Mclaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
9
-
-
84857368789
-
Adaptive mode selection for multiuser MIMO downlink employing rateless codes with QoS provisioning
-
Feb.
-
X. Chen, Z. Zhang, S. Chen, and C. Wang, "Adaptive mode selection for multiuser MIMO downlink employing rateless codes with QoS provisioning," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 790-799, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun
, vol.11
, Issue.2
, pp. 790-799
-
-
Chen, X.1
Zhang, Z.2
Chen, S.3
Wang, C.4
-
10
-
-
84877576079
-
Efficient resource allocation in rateless coded MU-MIMO cognitive radio network with QoS provisioning and limited feedback
-
Jan.
-
X. Chen and C. Yuen, "Efficient resource allocation in rateless coded MU-MIMO cognitive radio network with QoS provisioning and limited feedback," IEEE Trans. Veh. Tech., vol. 62, no. 1, pp. 395-399, Jan. 2013.
-
(2013)
IEEE Trans. Veh. Tech
, vol.62
, Issue.1
, pp. 395-399
-
-
Chen, X.1
Yuen, C.2
-
11
-
-
85027952173
-
Green resource allocation to minimize receiving energy in OFDMA cellular systems
-
Jan.
-
F. Chu, K. Chen, and G. Fettweis, "Green resource allocation to minimize receiving energy in OFDMA cellular systems," IEEE Commun. Lett., vol. 16, no. 3, pp. 372-374, Jan. 2012.
-
(2012)
IEEE Commun. Lett
, vol.16
, Issue.3
, pp. 372-374
-
-
Chu, F.1
Chen, K.2
Fettweis, G.3
-
12
-
-
84863941590
-
Energy-efficient resource allocation for secure OFDMA systems
-
Jul.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2585, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol
, vol.61
, Issue.6
, pp. 2572-2585
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
13
-
-
34548106007
-
Cross-layer design for OFDMA wireless systems with heterogeneous delay requirements
-
DOI 10.1109/TWC.2007.05716
-
D. S. W. Hui, V. K. N. Lau, and W. H. Lam, "Cross-layer design for OFDMA wireless systems with heterogeneous delay requirement," IEEE Trans. Wireless Commun., vol. 6. no. 8, pp. 2872-2880, Aug. 2007. (Pubitemid 47295178)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.8
, pp. 2872-2880
-
-
Hui, D.S.W.1
Lau, V.K.N.2
Lam, W.H.3
-
14
-
-
0000181889
-
On nonlinear fractional programming
-
Mar
-
W. Dinkelbach, "On nonlinear fractional programming," Manage. Sci., vol. 13, no. 7, pp. 492-498, Mar. 1967. Available: http://www. jstor. org/stable/2627691
-
(1967)
Manage. Sci
, vol.13
, Issue.7
, pp. 492-498
-
-
Dinkelbach, W.1
|