-
1
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
2
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
3
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
4
-
-
84885820885
-
Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks
-
Darmstadt, Germany, Jun.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and M. Lin, "Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks," in Proc. SPAWC, Darmstadt, Germany, Jun. 2013, pp. 360-364.
-
(2013)
Proc. SPAWC
, pp. 360-364
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Lin, M.5
-
5
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
6
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
Sep.
-
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints.," IET. Commun., vol. 4, no. 15, pp. 1787-1791, Sep. 2010.
-
(2010)
IET. Commun.
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krikidis, I.1
-
7
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. L. Zou, X. B. Wang, and W. M. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.L.1
Wang, X.B.2
Shen, W.M.3
-
8
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
9
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4885, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4885
-
-
Huang, J.1
Swindlehurst, A.L.2
-
10
-
-
68349116049
-
Information theoretic security
-
Apr.
-
Y. Liang, H. Poor, and S. Shamai, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4/5, pp. 355-580, Apr. 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
11
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
12
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
13
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. C. Chen, R. Q. Zhang, L. Y. Song, Z. Han, and B. L. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.C.1
Zhang, R.Q.2
Song, L.Y.3
Han, Z.4
Jiao, B.L.5
-
14
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
15
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
16
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical layer security
-
Apr.
-
Y. Liu, J. Li, and A. Petropulu, "Destination assisted cooperative jamming for wireless physical layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.3
-
17
-
-
84886662535
-
Cooperative spectrum access towards secure information transfer for CRNs
-
Nov.
-
N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, "Cooperative spectrum access towards secure information transfer for CRNs," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 2453-2464, Nov. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 2453-2464
-
-
Zhang, N.1
Lu, N.2
Cheng, N.3
Mark, J.W.4
Shen, X.5
-
18
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
D. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.1
Lo, E.S.2
Schober, R.3
-
19
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. Relay chatting
-
Jun.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
20
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
Jul.
-
Z. Ding, M. Xu, J. H. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Tech., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Tech.
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.H.3
Liu, F.4
-
21
-
-
67651149765
-
Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis
-
Jun.
-
J. L. Vicario, A. Bel, J. A. Lopez-Salcedo, and G. Seco, "Opportunistic relay selection with outdated CSI: Outage probability and diversity analysis," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2872-2876, Jun. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.6
, pp. 2872-2876
-
-
Vicario, J.L.1
Bel, A.2
Lopez-Salcedo, J.A.3
Seco, G.4
-
22
-
-
84861172109
-
Amplify-and-forward relay selection with outdated channel estimates
-
May
-
D. S. Michalopoulos, H. A. Suraweera, G. K. Karagiannidis, and R. Schober, "Amplify-and-forward relay selection with outdated channel estimates," IEEE Trans.Wireless Commun., vol. 60, no. 5, pp. 1278-1289, May 2012.
-
(2012)
IEEE Trans.Wireless Commun.
, vol.60
, Issue.5
, pp. 1278-1289
-
-
Michalopoulos, D.S.1
Suraweera, H.A.2
Karagiannidis, G.K.3
Schober, R.4
-
23
-
-
80052939367
-
On the design of relay selection strategies in regenerative cooperative networks with outdated CSI
-
Sep.
-
Y. Li, Q. Yin, W. Xu, and H.-M. Wang, "On the design of relay selection strategies in regenerative cooperative networks with outdated CSI," IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3086-3097, Sep. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.9
, pp. 3086-3097
-
-
Li, Y.1
Yin, Q.2
Xu, W.3
Wang, H.-M.4
-
24
-
-
84874946763
-
The diversity potential of relay selection with practical channel estimation
-
Feb.
-
D. S. Michalopoulos, N. D. Chatzidiamantis, R. Schober, and G. K. Karagiannidis, "The diversity potential of relay selection with practical channel estimation," IEEE Trans. Wireless Commun., vol. 12, no. 2, pp. 481-493, Feb. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.2
, pp. 481-493
-
-
Michalopoulos, D.S.1
Chatzidiamantis, N.D.2
Schober, R.3
Karagiannidis, G.K.4
-
25
-
-
84878730663
-
Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection
-
May
-
N. S. Ferdinand, D. B. da Costa, and M. Latva-aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Commun. Lett., vol. 17, no. 5, pp. 864-867, May 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.5
, pp. 864-867
-
-
Ferdinand, N.S.1
Da Costa, D.B.2
Latva-Aho, M.3
-
26
-
-
35448931484
-
Cooperative communications with outage-optimal opportunistic relaying
-
Sep.
-
A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying," IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
27
-
-
84924515029
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
H. C. Yang and M. S. Alouini, Order Statistics in Wireless Communications, Diversity, Adaptation, Scheduling in MIMO and OFDM Systems. Cambridge, U.K.: Cambridge Univ. Press, 2011.
-
(2011)
Order Statistics in Wireless Communications, Diversity, Adaptation, Scheduling in MIMO and OFDM Systems
-
-
Yang, H.C.1
Alouini, M.S.2
-
28
-
-
77954761580
-
A sequential parametric convex approximation method with applications to nonconvex truss topology design problems
-
May
-
A. Beck, A. Ben-Tal, and L. Tetruashvili, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems," J. Global Optim., vol. 47, no. 1, pp. 29-51, May 2010.
-
(2010)
J. Global Optim.
, vol.47
, Issue.1
, pp. 29-51
-
-
Beck, A.1
Ben-Tal, A.2
Tetruashvili, L.3
-
29
-
-
27744504251
-
Collaborative beamforming for distributed wireless Ad Hoc sensor networks
-
Nov.
-
H. Ochiai, P. Mitran, H. V. Poor, and V. Tarokh, "Collaborative beamforming for distributed wireless Ad Hoc sensor networks," IEEE Trans. Signal Process., vol. 53, no. 11, pp. 4110-4124, Nov. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.11
, pp. 4110-4124
-
-
Ochiai, H.1
Mitran, P.2
Poor, H.V.3
Tarokh, V.4
-
30
-
-
78249266282
-
Optimal distributed beamforming for two-way relay networks
-
Mar.
-
V. Havary-Nassab, S. Shahbazpanahi, and A. Grami, "Optimal distributed beamforming for two-way relay networks," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1238-1250, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1238-1250
-
-
Havary-Nassab, V.1
Shahbazpanahi, S.2
Grami, A.3
-
31
-
-
84883277406
-
On power allocation and relay selection for a two-way amplify-and-forward relaying system
-
Aug.
-
C.-L. Wang, T.-N. Cho, and K.-J. Yang, "On power allocation and relay selection for a two-way amplify-and-forward relaying system," IEEE Trans. Commun., vol. 61, no. 8, pp. 3146-3155, Aug. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.8
, pp. 3146-3155
-
-
Wang, C.-L.1
Cho, T.-N.2
Yang, K.-J.3
-
32
-
-
84870514074
-
Achievable rate region under joint distributed beamforming and power allocation for two-way relay networks
-
Nov.
-
S. ShahbazPanahi and M. Dong, "Achievable rate region under joint distributed beamforming and power allocation for two-way relay networks," IEEE Trans. Wireless Commun., vol. 11, no. 11, pp. 4026-4037, Nov. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.11
, pp. 4026-4037
-
-
Shahbazpanahi, S.1
Dong, M.2
-
33
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Q. Zhang, L. Y. Song, Z. Han, and B. L. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3740, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3740
-
-
Zhang, R.Q.1
Song, L.Y.2
Han, Z.3
Jiao, B.L.4
-
34
-
-
84893431203
-
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
-
Feb.
-
M. Pei, A. L. Swindlehurst, D.Ma, and J.Wei, "Adaptive limited feedback for MISO wiretap channels with cooperative jamming," IEEE Trans. Signal Process., vol. 62, no. 4, pp. 993-1004, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.4
, pp. 993-1004
-
-
Pei, M.1
Swindlehurst, A.L.2
Ma, D.3
Wei, J.4
-
35
-
-
0003498504
-
-
7th ed. New York, NY, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
36
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou andM. R.McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
37
-
-
0032074954
-
Theoretical reliability of MMSE linear diversity combining in Rayleigh-fading additive interference channels
-
May
-
H. Gao, P. J. Smith, and M. V. Clark, "Theoretical reliability of MMSE linear diversity combining in Rayleigh-fading additive interference channels," IEEE Trans. Commun., vol. 46, no. 5, pp. 666-672, May 1998.
-
(1998)
IEEE Trans. Commun.
, vol.46
, Issue.5
, pp. 666-672
-
-
Gao, H.1
Smith, P.J.2
Clark, M.V.3
-
38
-
-
84872861125
-
Hermitian precoding for distributed MIMO systems with individual channel state information
-
Sep.
-
J. Zhang, X. Yuan, and L. Ping, "Hermitian precoding for distributed MIMO systems with individual channel state information," IEEE J. Sel. Areas Commun., vol. 31, no. 2, pp. 241-250, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.2
, pp. 241-250
-
-
Zhang, J.1
Yuan, X.2
Ping, L.3
-
40
-
-
77949561781
-
Opportunism in multiuser relay channels: Scheduling, routing and spectrum reuse
-
Mar.
-
Ö. Oyman, "Opportunism in multiuser relay channels: Scheduling, routing and spectrum reuse," IEEE Trans. Wireless Commun., vol. 9, no. 3, pp. 1074-1085, Mar. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.3
, pp. 1074-1085
-
-
Oyman, O.1
-
42
-
-
79952826201
-
Asymptotic analysis of amplify and forward relaying in a parallel MIMO relay network
-
Apr.
-
S. O. Gharan, A. Bayesteh, and A. K. Khandani, "Asymptotic analysis of amplify and forward relaying in a parallel MIMO relay network," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2070-2082, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2070-2082
-
-
Gharan, S.O.1
Bayesteh, A.2
Khandani, A.K.3
-
43
-
-
84891556729
-
Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers
-
Dec.
-
V. N. Q. Bao, N. L. Trung, and M. Debbah, "Relay selection schemes for dual-hop networks under security constraints with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6076-6085, Dec. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.12
, pp. 6076-6085
-
-
Bao, V.N.Q.1
Trung, N.L.2
Debbah, M.3
-
44
-
-
84883380753
-
On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
-
Sep.
-
K.-H. Park, T. Wang, and M.-S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Park, K.-H.1
Wang, T.2
Alouini, M.-S.3
-
45
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
Dec.
-
D. Goeckel et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J. Sel. Areas Commun., vol. 29, no. 10, pp. 2067-2076, Dec. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Goeckel, D.1
-
46
-
-
77954499023
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
F. W. J. Olver, D. W. Lozier, R. F. Boisvert, and C. W. Clark, NIST Handbook of Mathematical Functions. Cambridge, U.K.: Cambridge Univ. Press, 2010.
-
(2010)
NIST Handbook of Mathematical Functions
-
-
Olver, F.W.J.1
Lozier, D.W.2
Boisvert, R.F.3
Clark, C.W.4
-
47
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE ISIT, 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE ISIT
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
48
-
-
0003910552
-
-
New York, NY, USA: Springer-Verlag
-
M. R. Leadbetter, G. Lindgren, and H. Rootzen, Extremes and Related Properties of Random Sequences and Processes. New York, NY, USA: Springer-Verlag, 1983.
-
(1983)
Extremes and Related Properties of Random Sequences and Processes
-
-
Leadbetter, M.R.1
Lindgren, G.2
Rootzen, H.3
-
49
-
-
34548842009
-
Cardano and the solution of the cubic
-
Hoboken, NJ, USA: Wiley, ch. 6
-
W. Dunham, "Cardano and the solution of the cubic," in Journey Through Genius: The Great Theorems of Mathematics. Hoboken, NJ, USA: Wiley, 1990, ch. 6, pp. 133-154.
-
(1990)
Journey Through Genius: The Great Theorems of Mathematics
, pp. 133-154
-
-
Dunham, W.1
|