-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Commun. Mag
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
4143104126
-
Sensor networks: An overview
-
Apr/May
-
M. Tubaishat and S. Madria, "Sensor networks: an overview," IEEE Potentials, vol. 22, no. 2, pp. 20-23, Apr./May 2003.
-
(2003)
IEEE Potentials
, vol.22
, Issue.2
, pp. 20-23
-
-
Tubaishat, M.1
Madria, S.2
-
3
-
-
0034842559
-
Instrumenting the world with wireless sensor networks
-
Salt Lake City, UT May
-
D. Estrin, L. Girod, G. Pottie, and M. Srivastava, "Instrumenting the world with wireless sensor networks," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 4, Salt Lake City, UT, May 2001, pp. 2033-2036.
-
(2001)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, vol.4
, pp. 2033-2036
-
-
Estrin, D.1
Girod, L.2
Pottie, G.3
Srivastava, M.4
-
4
-
-
21144443883
-
Distributed environmental monitoring using random sensor networks
-
Springer, Paolo Alto, CA Apr
-
S. Simic and S. Sastry, "Distributed environmental monitoring using random sensor networks," in Proc. Workshop Information Processing in Sensor Networks. Springer, Paolo Alto, CA, Apr. 2003, pp. 582-592.
-
(2003)
Proc. Workshop Information Processing in Sensor Networks
, pp. 582-592
-
-
Simic, S.1
Sastry, S.2
-
5
-
-
34249704132
-
Mathematical evaluation of environmental monitoring estimation error through energyefficient wireless sensor networks
-
Jul
-
D. Dardari, A. Conti, C. Buratti, and R. Verdone, "Mathematical evaluation of environmental monitoring estimation error through energyefficient wireless sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 7, pp. 790-802, Jul. 2007.
-
(2007)
IEEE Trans. Mobile Comput
, vol.6
, Issue.7
, pp. 790-802
-
-
Dardari, D.1
Conti, A.2
Buratti, C.3
Verdone, R.4
-
6
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell System Technical J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell System Technical J
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
7
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The Wire-Tap Channel," Bell System Technical J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell System Technical J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
8
-
-
0017495724
-
A note on Wyner's wiretap channel
-
May
-
A. B. Carleial and M. E. Hellman, "A note on Wyner's wiretap channel," IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 387-390, May 1977.
-
(1977)
IEEE Trans. Inf. Theory
, vol.23
, Issue.3
, pp. 387-390
-
-
Carleial, A.B.1
Hellman, M.E.2
-
9
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
11
-
-
45249119255
-
Secure communication over fading channels
-
Jun
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
12
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
13
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjørungnes, A.4
-
14
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
15
-
-
80053983111
-
Secrecy throughput of MANETs under passive and active attacks
-
Oct
-
Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs under passive and active attacks," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6692-6702, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6692-6702
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
16
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
Dec
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
17
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb
-
Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.V.3
Shamai, S.4
Verdu, S.5
-
18
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
-
Jan
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: interaction between source, eavesdropper, and friendly jammer," EURASIP Journal on Wireless Communications and Networking, vol. 2009, p. 1-10, Jan. 2010.
-
(2010)
EURASIP Journal on Wireless Communications and Networking
, vol.2009
, pp. 1-10
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
19
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
20
-
-
33847353721
-
Secret communication in presence of colluding eavesdroppers
-
Atlantic City, NJ Oct
-
"Secret communication in presence of colluding eavesdroppers," in Proc. Military Commun. Conf., Atlantic City, NJ, Oct. 2005, pp. 1501-1506.
-
(2005)
Proc. Military Commun. Conf
, pp. 1501-1506
-
-
-
21
-
-
84855911932
-
Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
-
Feb
-
P. C. Pinto, J. O. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forens.Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forens.Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.C.1
Barros, J.O.2
Win, M.Z.3
-
22
-
-
84860255627
-
On secrecy capacity scaling in wireless networks
-
May
-
O. Koyluoglu, C. Koksal, and H. El Gamal, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.1
Koksal, C.2
El Gamal, H.3
-
23
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
24
-
-
52349090496
-
The secrecy capacity of the MIMO wiretap channel
-
Toronto, Canada Jul
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, Canada, Jul. 2008, pp. 524-528.
-
(2008)
Proc. IEEE Int. Symp. on Inf. Theory
, pp. 524-528
-
-
Oggier, F.1
Hassibi, B.2
-
25
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: the MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
26
-
-
0027629488
-
Common randomness in information theory and cryptography-Part I: Secret sharing
-
Jul
-
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, Jul. 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.4
, pp. 1121-1132
-
-
Ahlswede, R.1
Csiszar, I.2
-
27
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
May
-
U. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733-742, May 1993.
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.1
-
28
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sep
-
R. Wilson, D. Tse, and R. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forens. Security, vol. 2, no. 3, pp. 364-375, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forens. Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.3
-
29
-
-
84858388451
-
A unified framework for key agreement over wireless fading channels
-
Apr
-
L. Lai, Y. Liang, and H. V. Poor, "A unified framework for key agreement over wireless fading channels," IEEE Trans. Inf. Forens. Security, vol. 7, no. 2, pp. 480-490, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forens. Security
, vol.7
, Issue.2
, pp. 480-490
-
-
Lai, L.1
Liang, Y.2
Poor, H.V.3
-
30
-
-
84883325225
-
Intrinsic information of wideband channels
-
Sep
-
Y. Shen and M. Z. Win, "Intrinsic information of wideband channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
-
-
Shen, Y.1
Win, M.Z.2
-
31
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
32
-
-
79956152661
-
Distributed coalition formation games for secure wireless transmission
-
Apr
-
W. Saad, Z. Han, T. Başar, M. Debbah, and A. Hjørungnes, "Distributed coalition formation games for secure wireless transmission," Mobile Networks and Applications, vol. 16, no. 2, pp. 231-245, Apr. 2011.
-
(2011)
Mobile Networks and Applications
, vol.16
, Issue.2
, pp. 231-245
-
-
Saad, W.1
Han, Z.2
Başar, T.3
Debbah, M.4
Hjørungnes, A.5
-
33
-
-
70350706020
-
The capacity region of the degraded multiple-input multiple-output compound broadcast channel
-
Nov
-
H. Weingarten, T. Liu, S. Shamai, Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 5011-5023
-
-
Weingarten, H.1
Liu, T.2
Shamai, S.3
Steinberg, Y.4
Viswanath, P.5
-
34
-
-
79251641071
-
A mathematical model for network interference
-
Sedona, AZ May
-
M. Z. Win, "A mathematical model for network interference," IEEE Communication Theory Workshop, Sedona, AZ, May 2007.
-
(2007)
IEEE Communication Theory Workshop
-
-
Win, M.Z.1
-
35
-
-
62949241345
-
A mathematical theory of network interference and its applications
-
Feb
-
M. Z. Win, P. C. Pinto, and L. A. Shepp, "A mathematical theory of network interference and its applications," Proc. IEEE, vol. 97, no. 2, pp. 205-230, Feb. 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.2
, pp. 205-230
-
-
Win, M.Z.1
Pinto, P.C.2
Shepp, L.A.3
-
36
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless network
-
Sep
-
M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless network," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.G.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
37
-
-
0038377118
-
Probability distributions for the number of radio transceivers which can communicate with one another
-
Apr
-
J. Orriss and S. K. Barton, "Probability distributions for the number of radio transceivers which can communicate with one another," IEEE Trans. Commun., vol. 51, no. 4, pp. 676-681, Apr. 2003.
-
(2003)
IEEE Trans. Commun
, vol.51
, Issue.4
, pp. 676-681
-
-
Orriss, J.1
Barton, S.K.2
-
38
-
-
66149110043
-
Interference analysis in a Poisson field of nodes of finite area
-
May
-
E. Salbaroli and A. Zanella, "Interference analysis in a Poisson field of nodes of finite area," IEEE Trans. Veh. Technol., vol. 58, no. 4, pp. 1776-1783, May 2009.
-
(2009)
IEEE Trans. Veh. Technol
, vol.58
, Issue.4
, pp. 1776-1783
-
-
Salbaroli, E.1
Zanella, A.2
-
39
-
-
79251614552
-
Cognitive network interference
-
Feb
-
A. Rabbachin, T. Q. Quek, H. Shin, and M. Z. Win, "Cognitive network interference," IEEE J. Sel. Areas Commun., vol. 29, no. 2, pp. 480-493, Feb. 2011.
-
(2011)
IEEE J. Sel. Areas Commun
, vol.29
, Issue.2
, pp. 480-493
-
-
Rabbachin, A.1
Quek, T.Q.2
Shin, H.3
Win, M.Z.4
-
40
-
-
0026953456
-
Performance of a spread spectrum packet radio network link in a Poisson field of interferers
-
Nov
-
E. S. Sousa, "Performance of a spread spectrum packet radio network link in a Poisson field of interferers," IEEE Trans. Inf. Theory, vol. 38, no. 6, pp. 1743-1754, Nov. 1992.
-
(1992)
IEEE Trans. Inf. Theory
, vol.38
, Issue.6
, pp. 1743-1754
-
-
Sousa, E.S.1
-
41
-
-
40849111506
-
Interference aggregation in spectrumsensing cognitive wireless networks
-
Feb
-
A. Ghasemi and E. S. Sousa, "Interference aggregation in spectrumsensing cognitive wireless networks," IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 41-56, Feb. 2008.
-
(2008)
IEEE J. Sel. Topics Signal Process
, vol.2
, Issue.1
, pp. 41-56
-
-
Ghasemi, A.1
Sousa, E.S.2
-
42
-
-
77954747921
-
Communication in a Poisson field of interferers-Part I: Interference distribution and error probability
-
Jul
-
P. C. Pinto and M. Z. Win, "Communication in a Poisson field of interferers-Part I: Interference distribution and error probability," IEEE Trans. Wireless Commun., vol. 9, no. 7, pp. 2176-2186, Jul. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.7
, pp. 2176-2186
-
-
Pinto, P.C.1
Win, M.Z.2
-
43
-
-
77954705153
-
Communication in a Poisson field of interferers-Part II: Channel capacity and interference spectrum
-
Jul
-
"Communication in a Poisson field of interferers-Part II: Channel capacity and interference spectrum," IEEE Trans. Wireless Commun., vol. 9, no. 7, pp. 2187-2195, Jul. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.7
, pp. 2187-2195
-
-
-
44
-
-
0032046668
-
Performance of FH SS radio networks with interference modeled as a mixture of Gaussian and alpha-stable noise
-
Apr
-
J. Ilow, D. Hatzinakos, and A. N. Venetsanopoulos, "Performance of FH SS radio networks with interference modeled as a mixture of Gaussian and alpha-stable noise," IEEE Trans. Commun., vol. 46, no. 4, pp. 509-520, Apr. 1998.
-
(1998)
IEEE Trans. Commun
, vol.46
, Issue.4
, pp. 509-520
-
-
Ilow, J.1
Hatzinakos, D.2
Venetsanopoulos, A.N.3
-
45
-
-
0037235245
-
Co-channel interference modeling and analysis in a Poisson field of interferers in wireless communications
-
Jan
-
X. Yang and A. P. Petropulu, "Co-channel interference modeling and analysis in a Poisson field of interferers in wireless communications," IEEE Trans. Signal Process., vol. 51, no. 1, pp. 64-76, Jan. 2003.
-
(2003)
IEEE Trans. Signal Process
, vol.51
, Issue.1
, pp. 64-76
-
-
Yang, X.1
Petropulu, A.P.2
-
46
-
-
34548564526
-
Spectral efficiency in single-hop ad-hoc wireless networks with interference using adaptive antenna arrays
-
Sep
-
S. Govindasamy, D. W. Bliss, and D. H. Staelin, "Spectral efficiency in single-hop ad-hoc wireless networks with interference using adaptive antenna arrays," IEEE J. Sel. Areas Commun., vol. 25, no. 7, pp. 1358-1369, Sep. 2007.
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.7
, pp. 1358-1369
-
-
Govindasamy, S.1
Bliss, D.W.2
Staelin, D.H.3
-
47
-
-
80052940675
-
Spectrum-sharing transmission capacity
-
Sep
-
J. Lee, J. G. Andrews, and D. Hong, "Spectrum-sharing transmission capacity," IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3053-3063, Sep. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.9
, pp. 3053-3063
-
-
Lee, J.1
Andrews, J.G.2
Hong, D.3
-
48
-
-
84857724638
-
Percolation and connectivity in the intrinsically secure communications graph
-
Mar
-
P. C. Pinto and M. Z. Win, "Percolation and connectivity in the intrinsically secure communications graph," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1716-1730, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1716-1730
-
-
Pinto, P.C.1
Win, M.Z.2
-
49
-
-
52349086199
-
The secrecy graph and some of its properties
-
Jul
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. on Inf. Theory, Toronto, Canada, Jul. 2008, pp. 539-543.
-
(2008)
Proc. IEEE Int. Symp. on Inf. Theory, Toronto, Canada
, pp. 539-543
-
-
Haenggi, M.1
-
50
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
51
-
-
84871964981
-
The role of aggregate interference on intrinsic network secrecy
-
A. Rabbachin, A. Conti, and M. Z. Win, "The role of aggregate interference on intrinsic network secrecy," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, Jun. 2012, pp. 3548-3553.
-
(2012)
Proc. IEEE Int. Conf. Commun., Ottawa, Canada, Jun
, pp. 3548-3553
-
-
Rabbachin, A.1
Conti, A.2
Win, M.Z.3
-
52
-
-
84871945106
-
Secure node packing of large-scale wireless networks
-
Ottawa, Canada, Jun
-
J. Lee, H. Shin, and M. Z. Win, "Secure node packing of large-scale wireless networks," in Proc. IEEE Int. Conf. Commun., Ottawa, Canada, Jun. 2012, pp. 815-819.
-
(2012)
Proc. IEEE Int. Conf. Commun
, pp. 815-819
-
-
Lee, J.1
Shin, H.2
Win, M.Z.3
-
55
-
-
33846209414
-
Note on the inversion theorem
-
Dec
-
J. Gil-Pelaez, "Note on the inversion theorem," Biometrika, vol. 38, no. 3/4, pp. 481-482, Dec. 1951.
-
(1951)
Biometrika
, vol.38
, Issue.3-4
, pp. 481-482
-
-
Gil-Pelaez, J.1
-
56
-
-
85013707627
-
-
Analysis and Design. Elsevier
-
R. Verdone, D. Dardari, G. Mazzini, and A. Conti, Wireless Sensor and Actuator Networks: Technologies, Analysis and Design. Elsevier, 2008.
-
(2008)
Wireless Sensor and Actuator Networks: Technologies
-
-
Verdone, R.1
Dardari, D.2
Mazzini, G.3
Conti, A.4
-
57
-
-
3042514350
-
Collaborative signal and information processing: An information-directed approach
-
Aug
-
F. Zhao, J. Liu, J. Liu, L. Guibas, and J. Reich, "Collaborative signal and information processing: an information-directed approach," Proc. IEEE, vol. 91, no. 8, pp. 1199-1209, Aug. 2003.
-
(2003)
Proc. IEEE
, vol.91
, Issue.8
, pp. 1199-1209
-
-
Zhao, F.1
Liu, J.2
Liu, J.3
Guibas, L.4
Reich, J.5
-
58
-
-
70350430748
-
Optimized simple bounds for diversity systems
-
Sep
-
A. Conti, W. M. Gifford, M. Z. Win, and M. Chiani, "Optimized simple bounds for diversity systems," IEEE Trans. Commun., vol. 57, no. 9, pp. 2674-2685, Sep. 2009.
-
(2009)
IEEE Trans. Commun
, vol.57
, Issue.9
, pp. 2674-2685
-
-
Conti, A.1
Gifford, W.M.2
Win, M.Z.3
Chiani, M.4
|