-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Sys. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
77953802876
-
Secure transmission with multiple antennasłI: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennasłI: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
3
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
4
-
-
84887058800
-
Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, and M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
5
-
-
85032751776
-
Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W. Hong, P. Lan, P.-C. Kuo, and C.-C. Jay, "Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.1
Lan, P.2
Kuo, P.-C.3
Jay, C.-C.4
-
7
-
-
84874906565
-
Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
-
Mar.
-
R. Bassily and S. Ulukus, "Deaf cooperation and relay selection strategies for secure communication in multiple relay networks," IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1544-1554, Mar. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.6
, pp. 1544-1554
-
-
Bassily, R.1
Ulukus, S.2
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
9
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
10
-
-
84891354137
-
Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI
-
Budapest, Hungary
-
S. Vishwakarma and A. Chockalingam, "Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI," in Proc. IEEE ICC, Budapest, Hungary, 2013, pp. 3047-3052.
-
(2013)
Proc. IEEE ICC
, pp. 3047-3052
-
-
Vishwakarma, S.1
Chockalingam, A.2
-
11
-
-
84946240351
-
Robust joint beamforming and jamming for secure AF networks: Low complexity design
-
May, to be published
-
C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low complexity design," IEEE Trans. Veh. Technol., vol. 64, no. 5, May 2015, to be published.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
-
-
Wang, C.1
Wang, H.-M.2
-
12
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
13
-
-
84904282993
-
Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks
-
Aug.
-
H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.8
, pp. 1240-1250
-
-
Wang, H.-M.1
Liu, F.2
Xia, X.-G.3
-
14
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. Relay chatting
-
Jun.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
15
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
16
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
17
-
-
84871984718
-
Cooperative jamming for secrecy in decentralized wireless networks
-
Ottawa, ON, Canada, Jun.
-
X. Zhou, M. Tao, and R. A. Kennedy, "Cooperative jamming for secrecy in decentralized wireless networks," in Proc. IEEE Int. Conf. Commun., Ottawa, ON, Canada, Jun. 2012, pp. 2339-2344.
-
(2012)
Proc. IEEE Int. Conf. Commun.
, pp. 2339-2344
-
-
Zhou, X.1
Tao, M.2
Kennedy, R.A.3
-
18
-
-
84878400311
-
Uncoordinated cooperative jamming for secret communication
-
Jul.
-
S. Y. Luo, J. Y. Li, and A. P. Petropulu, "Uncoordinated cooperative jamming for secret communication," IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1081-1090, Jul. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.7
, pp. 1081-1090
-
-
Luo, S.Y.1
Li, J.Y.2
Petropulu, A.P.3
-
19
-
-
84893471921
-
Multiuser diversity for secrecy communication using opportunistic jammer selection: Secure DOF and jammer scaling law
-
Feb.
-
J. H. Lee and W. Choi, "Multiuser diversity for secrecy communication using opportunistic jammer selection: Secure DOF and jammer scaling law," IEEE Trans. Signal Process., vol. 62, no. 4, pp. 828-839, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.4
, pp. 828-839
-
-
Lee, J.H.1
Choi, W.2
-
20
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
Jun.
-
J. P. Vilela, M. Bloch, J. Barros, and S.W. McLaughlin, "Wireless secrecy regions with friendly jamming," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 256-266, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 256-266
-
-
Vilela, J.P.1
Bloch, M.2
Barros, J.3
McLaughlin, S.W.4
-
21
-
-
80051757223
-
Position-based jamming for enhanced wireless secrecy
-
Sep.
-
J. P. Vilela, P. C. Pinto, and J. Barros, "Position-based jamming for enhanced wireless secrecy," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 616-627, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 616-627
-
-
Vilela, J.P.1
Pinto, P.C.2
Barros, J.3
-
22
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
23
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjørungnes, A.4
-
24
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
25
-
-
84879203277
-
On the design of artificial noiseaided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial noiseaided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
26
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjørungnes, A.4
-
27
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
Aug.
-
A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J.-M. Merolla, "Applications of LDPC codes to the wiretap channel," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
28
-
-
84859196533
-
Heterogeneous cellular networks: From theory to practice
-
Jun.
-
A. Ghosh et al., "Heterogeneous cellular networks: From theory to practice," IEEE Commun. Mag., vol. 50, no. 6, pp. 54-64, Jun. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.6
, pp. 54-64
-
-
Ghosh, A.1
-
29
-
-
84907533750
-
On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels
-
Nov.
-
C. Wang and H.-M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.11
, pp. 1814-1827
-
-
Wang, C.1
Wang, H.-M.2
-
30
-
-
78149463249
-
A primer on spatial modeling and analysis in wireless networks
-
Nov.
-
J. G. Andrews, R. K. Ganti, M. Haenggi, N. Jindal, and S. Weber, "A primer on spatial modeling and analysis in wireless networks," IEEE Commun. Mag., vol. 48, no. 11, pp. 2-9, Nov. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.11
, pp. 2-9
-
-
Andrews, J.G.1
Ganti, R.K.2
Haenggi, M.3
Jindal, N.4
Weber, S.5
-
32
-
-
0003498504
-
-
7th ed. New York, NY, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
33
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
34
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. Poor, and S. Shamai, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4/5, pp. 355-580, 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
35
-
-
79952985755
-
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
-
Mar.
-
S. C. Lin, T. H. Chang, Y. L. Liang, Y. W. Hong, and C. Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.3
, pp. 901-915
-
-
Lin, S.C.1
Chang, T.H.2
Liang, Y.L.3
Hong, Y.W.4
Chi, C.Y.5
-
36
-
-
84893431203
-
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
-
Feb.
-
M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei, "Adaptive limited feedback for MISO wiretap channels with cooperative jamming," IEEE Trans. Signal Process, vol. 62, no. 4, pp. 993-1004, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process
, vol.62
, Issue.4
, pp. 993-1004
-
-
Pei, M.1
Swindlehurst, A.L.2
Ma, D.3
Wei, J.4
-
37
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 61, no. 5, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.61
, Issue.5
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
38
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
39
-
-
84883426878
-
Networkcentric cooperation schemes for uplink interference management in cellular networks
-
Sep.
-
K. Balachandran, J.H. Kang, K.M. Karakayali, and K.M. Rege, "Networkcentric cooperation schemes for uplink interference management in cellular networks," Bell Labs Tech. J., vol. 18, no. 2, pp. 23-36, Sep. 2013.
-
(2013)
Bell Labs Tech. J.
, vol.18
, Issue.2
, pp. 23-36
-
-
Balachandran, K.1
Kang, J.H.2
Karakayali, K.M.3
Rege, K.M.4
-
40
-
-
70350577319
-
-
Ph. D. dissertation, Dept. Elect. Comput. Eng., Texas Univ., Austin, TX, USA
-
V. Chandrasekhar, "Coexistence in femtocell-aided cellular architectures," Ph. D. dissertation, Dept. Elect. Comput. Eng., Texas Univ., Austin, TX, USA, 2009.
-
(2009)
Coexistence in Femtocell-aided Cellular Architectures
-
-
Chandrasekhar, V.1
-
41
-
-
33646065511
-
Transmit beamforming in multiple-antenna systems with finite rate feedback: A VQ-based approach
-
Mar.
-
J. C. Roh and B. D. Rao, "Transmit beamforming in multiple-antenna systems with finite rate feedback: A VQ-based approach," IEEE Trans. Inf. Theory, vol. 52, no. 3, pp. 1101-1112, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.3
, pp. 1101-1112
-
-
Roh, J.C.1
Rao, B.D.2
-
43
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
Sep.
-
M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.G.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
44
-
-
77955711200
-
Performance of optimum combining in a Possion field of interfers and Rayleigh fading channels
-
Aug.
-
O. B. S. Ali, C. Cqardinal, and F. Gagnon, "Performance of optimum combining in a Possion field of interfers and Rayleigh fading channels," IEEE Trans. Wireless Commun., vol. 9, no. 8, pp. 2461-2467, Aug. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.8
, pp. 2461-2467
-
-
Ali, O.B.S.1
Cqardinal, C.2
Gagnon, F.3
-
45
-
-
84872861125
-
Hermitian precoding for distributed MIMO systems with individual channel state information
-
Sep.
-
J. Zhang, X. Yuan, and L. Ping, "Hermitian precoding for distributed MIMO systems with individual channel state information," IEEE J. Sel. Areas Commun., vol. 31, no. 2, pp. 241-250, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.2
, pp. 241-250
-
-
Zhang, J.1
Yuan, X.2
Ping, L.3
-
46
-
-
36349017876
-
The effect of fading, channel inversion, threshold scheduling on ad hoc networks
-
Nov.
-
S. Weber, J. G. Andrews, and N. Jindal, "The effect of fading, channel inversion, threshold scheduling on ad hoc networks," IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4127-4149, Nov. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.11
, pp. 4127-4149
-
-
Weber, S.1
Andrews, J.G.2
Jindal, N.3
-
48
-
-
84906553216
-
A stochastic geometry analysis of inter-cell interference coordination and intra-cell diversity
-
Dec.
-
X. Zhang and M. Haenggi, "A stochastic geometry analysis of inter-cell interference coordination and intra-cell diversity," IEEE Trans. Wireless Commun., vol. 13, no. 12, pp. 6655-6669, Dec. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.12
, pp. 6655-6669
-
-
Zhang, X.1
Haenggi, M.2
-
49
-
-
74549217124
-
Stochastic analysis of spatial and opportunistic aloha
-
Sep.
-
F. Baccelli, B. Blaszczyszyn, and P. Mühlethaler, "Stochastic analysis of spatial and opportunistic aloha," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1105-1119, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1105-1119
-
-
Baccelli, F.1
Blaszczyszyn, B.2
Mühlethaler, P.3
-
50
-
-
76949101353
-
A useful lemma for capacity analysis of fading interference channels
-
Feb.
-
K. Hamdi, "A useful lemma for capacity analysis of fading interference channels," IEEE Trans. Commun., vol. 58, no. 2, pp. 411-416, Feb. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.2
, pp. 411-416
-
-
Hamdi, K.1
-
51
-
-
84968521681
-
Gaussian quadratures for the integrals f∞0 e-x2 f (x)dx and fb0e-x2f(x)dx
-
N. M. Steen, G. D. Byrne, and E. M. Gelbard, "Gaussian quadratures for the integrals f∞0 e-x2f(x)dx and fb0e-x2 f (x)dx," Math. Comput., vol. 23, no. 107, pp. 661-671, 1969.
-
(1969)
Math. Comput.
, vol.23
, Issue.107
, pp. 661-671
-
-
Steen, N.M.1
Byrne, G.D.2
Gelbard, E.M.3
-
52
-
-
58149119334
-
Transmission capacity of ad hoc networks with spatial diversity
-
Dec.
-
A. M. Hunter, J. Andrews, and S. Weber, "Transmission capacity of ad hoc networks with spatial diversity," IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5058-5071, Dec. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.12
, pp. 5058-5071
-
-
Hunter, A.M.1
Andrews, J.2
Weber, S.3
-
54
-
-
77954499023
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
F. W. J. Olver, D. W. Lozier, R. F. Boisvert, and C. W. Clark, NIST Handbook of Mathematical Functions. Cambridge, U.K.: Cambridge Univ. Press, 2010.
-
(2010)
NIST Handbook of Mathematical Functions
-
-
Olver, F.W.J.1
Lozier, D.W.2
Boisvert, R.F.3
Clark, C.W.4
|