-
1
-
-
84860393847
-
Resource sharing optimization for device-to-device communication underlaying cellular networks
-
Yu C, Doppler K, Ribeiro CB, Tirkkonen O. Resource sharing optimization for device-to-device communication underlaying cellular networks. IEEE Transactions on Wireless Communications 2011; 10(8): 2752–2763.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.8
, pp. 2752-2763
-
-
Yu, C.1
Doppler, K.2
Ribeiro, C.B.3
Tirkkonen, O.4
-
2
-
-
84858121087
-
Design aspects of network assisted device-to-device communications
-
Fodor G, Dahlman E, Mildh G, Parkvall S. et al. Design aspects of network assisted device-to-device communications. IEEE Communications Magazine 2012; 50(3): 170–177.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.3
, pp. 170-177
-
-
Fodor, G.1
Dahlman, E.2
Mildh, G.3
Parkvall, S.4
-
3
-
-
84907966549
-
Fast pairing of device-to-device link underlay for spectrum sharing with cellular users
-
Wang L, Wu H. Fast pairing of device-to-device link underlay for spectrum sharing with cellular users. IEEE Communication Letters 2014; 18(10): 1803–1806.
-
(2014)
IEEE Communication Letters
, vol.18
, Issue.10
, pp. 1803-1806
-
-
Wang, L.1
Wu, H.2
-
4
-
-
84933053540
-
Single frequency-based device-to-device-enhanced video delivery for evolved multimedia broadcast and multicast services
-
Militano L, Condoluci M, Araniti G, Molinaro A, Iera A, Muntean GM. Single frequency-based device-to-device-enhanced video delivery for evolved multimedia broadcast and multicast services. IEEE Transactions on Broadcasting 2015; 61(2): 263–278.
-
(2015)
IEEE Transactions on Broadcasting
, vol.61
, Issue.2
, pp. 263-278
-
-
Militano, L.1
Condoluci, M.2
Araniti, G.3
Molinaro, A.4
Iera, A.5
Muntean, G.M.6
-
5
-
-
84948434446
-
Exploiting social ties for cooperative D2D communications: a mobile social networking case
-
10.1109/TNET.2014.2329956
-
Chen X, Proulx B, Gong X, Zhang J. Exploiting social ties for cooperative D2D communications: a mobile social networking case. IEEE/ACM Transactions on Networking 2014. 10.1109/TNET.2014.2329956.
-
(2014)
IEEE/ACM Transactions on Networking
-
-
Chen, X.1
Proulx, B.2
Gong, X.3
Zhang, J.4
-
6
-
-
84942279827
-
Device-to-device link admission policy based on social interaction information
-
Wang L, Tang H, Čierny M. Device-to-device link admission policy based on social interaction information. IEEE Transactions on Vehicular Technology 2015; 64(9): 4180–4186.
-
(2015)
IEEE Transactions on Vehicular Technology
, vol.64
, Issue.9
, pp. 4180-4186
-
-
Wang, L.1
Tang, H.2
Čierny, M.3
-
7
-
-
84953708676
-
-
London, UK, June 8–12
-
Wang L, Wu H, Liu L, Song M, Cheng Y. Secrecy-oriented partner selection based on social trust in device-to-device communications: London, UK, June 8–12 2015; 7275–7279.
-
(2015)
Secrecy-oriented partner selection based on social trust in device-to-device communications
, pp. 7275-7279
-
-
Wang, L.1
Wu, H.2
Liu, L.3
Song, M.4
Cheng, Y.5
-
8
-
-
84891351368
-
Cooperative MIMO precoding for D2D underlay in cellular networks
-
In, Hungary, June
-
Tang H, Zhu C, Ding Z. Cooperative MIMO precoding for D2D underlay in cellular networks. In Proceedings IEEE ICC, Budapest: Hungary, June 2013; 5517–5521.
-
(2013)
Proceedings IEEE ICC, Budapest
, pp. 5517-5521
-
-
Tang, H.1
Zhu, C.2
Ding, Z.3
-
9
-
-
84893854826
-
Efficiency resource allocation for device-to-device underlay communication systems: a reverse iterative combinatiorial auction based approach
-
Xu C, Song L, Han Z, Zhao Q, Wang X, Cheng X, Jiao B. Efficiency resource allocation for device-to-device underlay communication systems: a reverse iterative combinatiorial auction based approach. IEEE Journal on Selected Areas in Communications 2013; 31(9): 348–358.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.9
, pp. 348-358
-
-
Xu, C.1
Song, L.2
Han, Z.3
Zhao, Q.4
Wang, X.5
Cheng, X.6
Jiao, B.7
-
10
-
-
84881369407
-
Resource allocation for device-to-device communications overlaying two-way cellular networks
-
Pei Y, Liang Y. Resource allocation for device-to-device communications overlaying two-way cellular networks. IEEE Transactions on Wireless Communications 2013; 12(7): 3611–3621.
-
(2013)
IEEE Transactions on Wireless Communications
, vol.12
, Issue.7
, pp. 3611-3621
-
-
Pei, Y.1
Liang, Y.2
-
11
-
-
84890430700
-
Secrecy-based access control for device-to-device communication underlaying cellular networks
-
Yue J, Ma C, Yu H, Zhou W. Secrecy-based access control for device-to-device communication underlaying cellular networks. IEEE Communication Letters 2013; 17(11): 2068–2071.
-
(2013)
IEEE Communication Letters
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Yue, J.1
Ma, C.2
Yu, H.3
Zhou, W.4
-
12
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Huang J, Swindlehurst AL. Cooperative jamming for secure communications in MIMO relay networks. IEEE Transactions on Signal Processing 2011; 59(10): 4871–4884.
-
(2011)
IEEE Transactions on Signal Processing
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
13
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Zhang R, Song L, Han Z, Jiao B. Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Transactions on Vehicular Technology 2012; 61(8): 3693–3704.
-
(2012)
IEEE Transactions on Vehicular Technology
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
14
-
-
85008538314
-
Combined relay selection and cooperative beamforming for physical layer security
-
Kim J, Ikhlef A, Schober R. Combined relay selection and cooperative beamforming for physical layer security. Journal of Communications and Netorks 2012; 14(4): 364–373.
-
(2012)
Journal of Communications and Netorks
, vol.14
, Issue.4
, pp. 364-373
-
-
Kim, J.1
Ikhlef, A.2
Schober, R.3
-
15
-
-
84886699027
-
Security-oriented transmission based on cooperative relays in cognitive radio
-
Wang L, Ma X, Ma Y, Teng Y, Zhang Y. Security-oriented transmission based on cooperative relays in cognitive radio. China Communications 2013; 10(8): 27–35.
-
(2013)
China Communications
, vol.10
, Issue.8
, pp. 27-35
-
-
Wang, L.1
Ma, X.2
Ma, Y.3
Teng, Y.4
Zhang, Y.5
-
17
-
-
84893284854
-
-
Zhang Y, Pan E, Song L, Saad W, Dawy Z, Han Z. Social network enhance device-to-device communication underlaying cellular networks. 2013; 182–186.
-
(2013)
Social network enhance device-to-device communication underlaying cellular networks
, pp. 182-186
-
-
Zhang, Y.1
Pan, E.2
Song, L.3
Saad, W.4
Dawy, Z.5
Han, Z.6
-
18
-
-
84883029780
-
Social trust and social reciprocity based cooperative D2D communications
-
In, Bangalore, India
-
Chen X, Proulx B, Gong X, Zhang J. Social trust and social reciprocity based cooperative D2D communications. In Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc): Bangalore, India, 2013; 187–196.
-
(2013)
Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 187-196
-
-
Chen, X.1
Proulx, B.2
Gong, X.3
Zhang, J.4
-
19
-
-
84921773816
-
Secure relay and jammer selection for physical layer security
-
Hui H, Swindlehurst AL, Li G, Liang J. Secure relay and jammer selection for physical layer security. IEEE Signal Processing Letters 2015; 22(8): 1147–1151.
-
(2015)
IEEE Signal Processing Letters
, vol.22
, Issue.8
, pp. 1147-1151
-
-
Hui, H.1
Swindlehurst, A.L.2
Li, G.3
Liang, J.4
-
20
-
-
84883300441
-
Effect of feedback delay on secure cooperative networks with joint relay and jammer selection
-
Aug
-
Wu NE, Li HJ. Effect of feedback delay on secure cooperative networks with joint relay and jammer selection. IEEE Wireless Communications Letters Aug. 2013; 2(4): 415–418.
-
(2013)
IEEE Wireless Communications Letters
, vol.2
, Issue.4
, pp. 415-418
-
-
Wu, N.E.1
Li, H.J.2
-
21
-
-
84933181903
-
Secure inter-cluster communications with cooperative jamming against social outcasts
-
Wang L, Cao C, Wu H. Secure inter-cluster communications with cooperative jamming against social outcasts. Computer Communications 2015; 63: 1–10.
-
(2015)
Computer Communications
, vol.63
, pp. 1-10
-
-
Wang, L.1
Cao, C.2
Wu, H.3
-
27
-
-
0003438193
-
-
McGraw Hill, New York
-
Erdélyi A, Magnus W, Oberhettinger F, Tricomi FG. Tables of Integral Transforms, vol. II. McGraw Hill: New York, 1954.
-
(1954)
Tables of Integral Transforms
, vol.II
-
-
Erdélyi, A.1
Magnus, W.2
Oberhettinger, F.3
Tricomi, F.G.4
|