-
1
-
-
84555205497
-
-
White Paper, Cisco, Feb. [Online]
-
"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast, 2013-2018," White Paper, Cisco, Feb. 2014. [Online]. Available: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ visual-networking-index-vni/white-paper-c11-520862.pdf
-
(2014)
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast, 2013-2018
-
-
-
2
-
-
84896689961
-
Five disruptive technology directions for 5G
-
Feb.
-
F. Boccardi, R. Heath, A. Lozano, T. Marzetta, and P. Popovski, "Five disruptive technology directions for 5G," IEEE Commun. Mag., vol. 52, no. 2, pp. 74-80, Feb. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 74-80
-
-
Boccardi, F.1
Heath, R.2
Lozano, A.3
Marzetta, T.4
Popovski, P.5
-
3
-
-
52749088422
-
Femtocell networks: A survey
-
Sep.
-
V. Chandrasekhar, J. Andrews, and A. Gatherer, "Femtocell networks: A survey," IEEE Commun. Mag., vol. 46, no. 9, pp. 59-67, Sep. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.9
, pp. 59-67
-
-
Chandrasekhar, V.1
Andrews, J.2
Gatherer, A.3
-
4
-
-
84904603004
-
Base station activation and linear transceiver design for optimal resource management in heterogeneous networks
-
Aug.
-
W.-C. Liao, M. Hong, Y.-F. Liu, and Z.-Q. Luo, "Base station activation and linear transceiver design for optimal resource management in heterogeneous networks," IEEE Trans. Signal Process., vol. 62, no. 15, pp. 3939-3952, Aug. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.15
, pp. 3939-3952
-
-
Liao, W.-C.1
Hong, M.2
Liu, Y.-F.3
Luo, Z.-Q.4
-
5
-
-
79959609931
-
A survey on 3GPP heterogeneous networks
-
Jun.
-
A. Damnjanovic et al., "A survey on 3GPP heterogeneous networks," IEEE Wireless Commun., vol. 18, no. 3, pp. 10-21, Jun. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.3
, pp. 10-21
-
-
Damnjanovic, A.1
-
6
-
-
84859196533
-
Heterogeneous cellular networks: From theory to practice
-
Jun.
-
A. Ghosh et al., "Heterogeneous cellular networks: From theory to practice," IEEE Commun. Mag., vol. 50, no. 6, pp. 54-64, Jun. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.6
, pp. 54-64
-
-
Ghosh, A.1
-
7
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
8
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, USA, Jul.
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE ISIT, Seattle, WA, USA, Jul. 2006, pp. 356-360.
-
(2006)
Proc. IEEE ISIT
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
9
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell. Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell. Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
10
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr.
-
Y.-S. Shiu, S.-Y. Chang, H.-C. Wu, S.-H. Huang, and H.-H. Chen, "Physical layer security in wireless networks: A tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.2
, pp. 66-74
-
-
Shiu, Y.-S.1
Chang, S.-Y.2
Wu, H.-C.3
Huang, S.-H.4
Chen, H.-H.5
-
11
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
12
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.1
Lai, L.2
El Gamal, H.3
-
13
-
-
0347337828
-
Secure space-time communication
-
Dec.
-
A. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.1
-
14
-
-
69249208566
-
An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel
-
Mar.
-
R. Bustin, R. Liu, H. V. Poor, and S. Shamai, "An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel," EURASIP J. Wireless Commun. Netw., vol. 2009, pp. 1-8, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, pp. 1-8
-
-
Bustin, R.1
Liu, R.2
Poor, H.V.3
Shamai, S.4
-
15
-
-
70449597938
-
Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels
-
Perugia, Italy, Jun.
-
A. Mukherjee and A. L. Swindlehurst, "Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels," in Proc. 10th IEEE SPAWC, Perugia, Italy, Jun. 2009, pp. 344-348.
-
(2009)
Proc. 10th IEEE SPAWC
, pp. 344-348
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
16
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
17
-
-
77958560746
-
Secure transmission with multiple antennas-part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
18
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
19
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.4
, pp. 1678-1690
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.Y.4
Leung, K.5
-
20
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.3
-
21
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
Apr.
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
-
22
-
-
77950269477
-
A vector generalization of Costa's entropy-power inequality with applications
-
Apr.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "A vector generalization of Costa's entropy-power inequality with applications," IEEE Trans. Inf. Theory, vol. 56, no. 4, pp. 1865-1879, Apr. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.4
, pp. 1865-1879
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
23
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
24
-
-
57349093480
-
The Gaussian multiple access wire-tap channel
-
Dec.
-
E. Tekin and A. Yener, "The Gaussian multiple access wire-tap channel," IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5747-5755, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.12
, pp. 5747-5755
-
-
Tekin, E.1
Yener, A.2
-
25
-
-
79961002510
-
Fading cognitive multiple-access channels with confidential messages
-
Aug.
-
R. Liu, Y. Liang, and H. V. Poor, "Fading cognitive multiple-access channels with confidential messages," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4992-5005, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4992-5005
-
-
Liu, R.1
Liang, Y.2
Poor, H.V.3
-
26
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Jun.
-
R. Liu, I. Maric, P. Spasojevic, and R. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.4
-
27
-
-
70449482740
-
On the secrecy rate of interference networks using structured codes
-
Seoul, Korea, Jun.
-
S. Agrawal and S. Vishwanath, "On the secrecy rate of interference networks using structured codes," in Proc. IEEE ISIT, Seoul, Korea, Jun. 2009, pp. 2091-2095.
-
(2009)
Proc. IEEE ISIT
, pp. 2091-2095
-
-
Agrawal, S.1
Vishwanath, S.2
-
28
-
-
80051719720
-
MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design
-
Sep.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "MIMO interference channel with confidential messages: Achievable secrecy rates and precoder design," IEEE Trans. Inf. Forens. Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forens. Security
, vol.6
, Issue.3
, pp. 640-649
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
29
-
-
84883278751
-
Robust coordinated beamforming for secure miso interference channels with bounded ellipsoidal uncertainties
-
Aug.
-
J. Ni et al., "Robust coordinated beamforming for secure miso interference channels with bounded ellipsoidal uncertainties," IEEE Wireless Commun. Lett., vol. 2, no. 2, pp. 407-410, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.2
, pp. 407-410
-
-
Ni, J.1
-
30
-
-
79959612009
-
Enhanced intercell interference coordination challenges in heterogeneous networks
-
Jun.
-
D. Lopez-Perez et al., "Enhanced intercell interference coordination challenges in heterogeneous networks," IEEE Wireless Commun., vol. 18, no. 3, pp. 22-30, Jun. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.3
, pp. 22-30
-
-
Lopez-Perez, D.1
-
31
-
-
38149139603
-
Competitive pricing for spectrum sharing in cognitive radio networks: Dynamic game, inefficiency of nash equilibrium, and collusion
-
Jan.
-
D. Niyato and E. Hossain, "Competitive pricing for spectrum sharing in cognitive radio networks: Dynamic game, inefficiency of nash equilibrium, and collusion," IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 192-202, Jan. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 192-202
-
-
Niyato, D.1
Hossain, E.2
-
32
-
-
84862853925
-
Coordination mechanisms for self-organizing femtocells in two-tier coexistence scenarios
-
Jun.
-
C. H. M. De Lima, M. Bennis, and M. Latva-aho, "Coordination mechanisms for self-organizing femtocells in two-tier coexistence scenarios," IEEE Trans. Wireless Commun., vol. 11, no. 6, pp. 2212-2223, Jun. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.6
, pp. 2212-2223
-
-
De Lima, C.H.M.1
Bennis, M.2
Latva-aho, M.3
-
33
-
-
84882598991
-
On distributed and coordinated resource allocation for interference mitigation in selforganizing LTE networks
-
Aug.
-
D. Lopez-Perez, X. Chu, A. Vasilakos, and H. Claussen, "On distributed and coordinated resource allocation for interference mitigation in selforganizing LTE networks," IEEE/ACM Trans. Netw., vol. 21, no. 4, pp. 1145-1158, Aug. 2013.
-
(2013)
IEEE/ACM Trans. Netw.
, vol.21
, Issue.4
, pp. 1145-1158
-
-
Lopez-Perez, D.1
Chu, X.2
Vasilakos, A.3
Claussen, H.4
-
34
-
-
84895057562
-
Power minimization based resource allocation for interference mitigation in OFDMA femtocell networks
-
Feb.
-
D. Lopez-Perez, X. Chu, A. Vasilakos, and H. Claussen, "Power minimization based resource allocation for interference mitigation in OFDMA femtocell networks," IEEE J. Sel. Areas Commun., vol. 32, no. 2, pp. 333-344, Feb. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.2
, pp. 333-344
-
-
Lopez-Perez, D.1
Chu, X.2
Vasilakos, A.3
Claussen, H.4
-
35
-
-
84896390388
-
Improving macrocell-small cell coexistence through adaptive interference draining
-
Feb.
-
F. Pantisano, M. Bennis, W. Saad, M. Debbah, and M. Latva-Aho, "Improving macrocell-small cell coexistence through adaptive interference draining," IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 942-955, Feb. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.2
, pp. 942-955
-
-
Pantisano, F.1
Bennis, M.2
Saad, W.3
Debbah, M.4
Latva-Aho, M.5
-
36
-
-
84880831887
-
Modeling heterogeneous network interference using Poisson point processes
-
Aug.
-
R. Heath, M. Kountouris, and T. Bai, "Modeling heterogeneous network interference using Poisson point processes," IEEE Trans. Signal Process., vol. 61, no. 16, pp. 4114-4126, Aug. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.16
, pp. 4114-4126
-
-
Heath, R.1
Kountouris, M.2
Bai, T.3
-
37
-
-
84903650326
-
On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks
-
May
-
M. Hanif, L. Tran, M. Juntti, and S. Glisic, "On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks," IEEE Trans. Signal Process., vol. 62, no. 14, pp. 3536-3551, May 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.14
, pp. 3536-3551
-
-
Hanif, M.1
Tran, L.2
Juntti, M.3
Glisic, S.4
-
38
-
-
84901335099
-
Secrecy rates in broadcast channels with confidential messages and external eavesdroppers
-
May
-
G. Geraci, S. Singh, J. Andrews, J. Yuan, and I. Collings, "Secrecy rates in broadcast channels with confidential messages and external eavesdroppers," IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 2931-2943, May 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.5
, pp. 2931-2943
-
-
Geraci, G.1
Singh, S.2
Andrews, J.3
Yuan, J.4
Collings, I.5
-
39
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
40
-
-
84937132031
-
Joint power control in wiretap interference channels
-
to be published
-
A. Kalantari, S. Maleki, G. Zheng, S. Chatzinotas, and B. Ottersten, "Joint power control in wiretap interference channels," IEEE Trans. Wireless Commun., to be published. DOI: 10.1109/TWC.2015.2412531.
-
IEEE Trans. Wireless Commun.
-
-
Kalantari, A.1
Maleki, S.2
Zheng, G.3
Chatzinotas, S.4
Ottersten, B.5
-
41
-
-
84862623799
-
Kernel methods for missing variables
-
Barbados, Jan.
-
A. S. Vishwanathan, A. J. Smola, and S. V. N. Vishwanathan, "Kernel methods for missing variables," in Proc. 10th Int. Workshop Artif. Intell. Stat., Barbados, Jan. 2005, pp. 325-332.
-
(2005)
Proc. 10th Int. Workshop Artif. Intell. Stat.
, pp. 325-332
-
-
Vishwanathan, A.S.1
Smola, A.J.2
Vishwanathan, S.V.N.3
-
44
-
-
84861601537
-
Physical layer security from inter-session interference in large wireless networks
-
Orlando, FL, USA, Mar.
-
A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, and D. Towsley, "Physical layer security from inter-session interference in large wireless networks," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 1179-1187.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1179-1187
-
-
Sheikholeslami, A.1
Goeckel, D.2
Pishro-Nik, H.3
Towsley, D.4
-
45
-
-
84877856660
-
Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM
-
May
-
S. Yang, T. Lv, and L. Hanzo, "Semidefinite programming relaxation based virtually antipodal detection for MIMO systems using Gray-coded high-order QAM," IEEE Trans. Veh. Tech., vol. 62, no. 4, pp. 1667-1677, May 2013.
-
(2013)
IEEE Trans. Veh. Tech.
, vol.62
, Issue.4
, pp. 1667-1677
-
-
Yang, S.1
Lv, T.2
Hanzo, L.3
-
46
-
-
84881138680
-
Achieving maximum energyefficiency in multi-relay OFDMA cellular networks: A fractional programming approach
-
Jul.
-
K. Cheung, S. Yang, and L. Hanzo, "Achieving maximum energyefficiency in multi-relay OFDMA cellular networks: A fractional programming approach," IEEE Trans. Commun., vol. 61, no. 7, pp. 2746-2757, Jul. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.7
, pp. 2746-2757
-
-
Cheung, K.1
Yang, S.2
Hanzo, L.3
-
47
-
-
84910654694
-
Spectral and energy spectral efficiency optimization of joint transmit and receive beamforming based multi-relay MIMO-OFDMA cellular networks
-
Nov.
-
K. Cheung, S. Yang, and L. Hanzo, "Spectral and energy spectral efficiency optimization of joint transmit and receive beamforming based multi-relay MIMO-OFDMA cellular networks," IEEE Trans. Wireless Commun., vol. 13, no. 11, pp. 6147-6165, Nov. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.11
, pp. 6147-6165
-
-
Cheung, K.1
Yang, S.2
Hanzo, L.3
-
48
-
-
85032752455
-
Semidefinite relaxation of quadratic optimization problems
-
May
-
Z. Luo, W. K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process Mag., vol. 27, no. 3, pp. 20-34, May 2010.
-
(2010)
IEEE Signal Process Mag.
, vol.27
, Issue.3
, pp. 20-34
-
-
Luo, Z.1
Ma, W.K.2
So, A.M.-C.3
Ye, Y.4
Zhang, S.5
-
49
-
-
0003878614
-
-
Philadelphia, PA, USA: SIAM
-
A. Ben-Tal and A. Nemirovski, Lectures on Modern Convex Optimization: Analysis, Algorithms, and Engineering Applications. ser.MPS-SIAM Series on Optimization, Philadelphia, PA, USA: SIAM, 2001.
-
(2001)
Lectures on Modern Convex Optimization: Analysis, Algorithms, and Engineering Applications. ser.MPS-SIAM Series on Optimization
-
-
Ben-Tal, A.1
Nemirovski, A.2
-
50
-
-
84867497728
-
Opportunistic interference alignment in MIMO femtocell networks
-
Cambridge, MA, USA, Jul.
-
T. M. Nguyen, T. Quek, and H. Shin, "Opportunistic interference alignment in MIMO femtocell networks," in Proc. IEEE ISIT, Cambridge, MA, USA, Jul. 2012, pp. 2631-2635.
-
(2012)
Proc. IEEE ISIT
, pp. 2631-2635
-
-
Nguyen, T.M.1
Quek, T.2
Shin, H.3
|