-
1
-
-
84959219264
-
Using cognitive radio for interference-resistant industrial wireless sensor networks: An overview
-
Dec.
-
T. M. Chiwewe, C. F. Mbuya, and G. P. Hancke, "Using cognitive radio for interference-resistant industrial wireless sensor networks: An overview, " IEEE Trans. Ind. Informat., vol. 11, no. 6, pp. 1466-1481, Dec. 2015.
-
(2015)
IEEE Trans. Ind. Informat.
, vol.11
, Issue.6
, pp. 1466-1481
-
-
Chiwewe, T.M.1
Mbuya, C.F.2
Hancke, G.P.3
-
2
-
-
84929335760
-
Assignment of segmented slots enabling reliable realtime transmission in industrial wireless sensor networks
-
Jun.
-
D. Yang et al., "Assignment of segmented slots enabling reliable realtime transmission in industrial wireless sensor networks, " IEEE Trans. Ind. Electron., vol. 62, no. 6, pp. 3966-3977, Jun. 2015.
-
(2015)
IEEE Trans. Ind. Electron.
, vol.62
, Issue.6
, pp. 3966-3977
-
-
Yang, D.1
-
3
-
-
0345258506
-
User cooperation diversity-Part I: System description
-
Nov.
-
A. Sendonaris, E. Erkip, and B. Aazhang, "User cooperation diversity-Part I: System description, " IEEE Trans. Commun., vol. 51, no. 11, pp. 1927-1938, Nov. 2003.
-
(2003)
IEEE Trans. Commun.
, vol.51
, Issue.11
, pp. 1927-1938
-
-
Sendonaris, A.1
Erkip, E.2
Aazhang, B.3
-
4
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behavior
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G. W. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior, " IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
5
-
-
84933060443
-
Cloud compute-and-forward with relay cooperation
-
Jun.
-
K. N. Pappi, P. D. Diamantoulakis, H. Otrok, and G. K. Karagiannidis, "Cloud compute-and-forward with relay cooperation, " IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3415-3428, Jun. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.6
, pp. 3415-3428
-
-
Pappi, K.N.1
Diamantoulakis, P.D.2
Otrok, H.3
Karagiannidis, G.K.4
-
6
-
-
84858300925
-
Opportunistic distributed space-time coding for decode-and-forward cooperative systems
-
Apr.
-
Y. Zou, Y.-D. Yao, and B. Zheng, "Opportunistic distributed space-time coding for decode-and-forward cooperative systems, " IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1766-1781, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1766-1781
-
-
Zou, Y.1
Yao, Y.-D.2
Zheng, B.3
-
7
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Feb.
-
A. Mukherjee, S. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, " IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Feb., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.2
Huang, J.3
Swindlehurst, A.L.4
-
8
-
-
29144503977
-
Fountain codes
-
Dec.
-
D. J. C. MacKay, "Fountain codes, " IEE Proc. Commun., vol. 152, no. 6, pp. 1062-1068, Dec. 2005.
-
(2005)
IEE Proc. Commun.
, vol.152
, Issue.6
, pp. 1062-1068
-
-
MacKay, D.J.C.1
-
9
-
-
47749092821
-
Joint design of relay and packet combining schemes for wireless industrial networks
-
Singapore, May
-
E. Uhlemann and A. Willig, "Joint design of relay and packet combining schemes for wireless industrial networks, " in Proc. IEEE Veh. Technol. Conf. (VTC-Spring), Singapore, May 2008, pp. 2441-2445.
-
(2008)
Proc. IEEE Veh. Technol. Conf. (VTC-Spring)
, pp. 2441-2445
-
-
Uhlemann, E.1
Willig, A.2
-
10
-
-
84923036885
-
Opportunistic routing algorithm for relay node selection in wireless sensor networks
-
Feb.
-
J. Luo, J. Hu, D. Wu, and R. Li, "Opportunistic routing algorithm for relay node selection in wireless sensor networks, " IEEE Trans. Ind. Informat., vol. 11, no. 1, pp. 112-121, Feb. 2015.
-
(2015)
IEEE Trans. Ind. Informat.
, vol.11
, Issue.1
, pp. 112-121
-
-
Luo, J.1
Hu, J.2
Wu, D.3
Li, R.4
-
11
-
-
84926477337
-
An experimental study of selective cooperative relaying in industrial wireless sensor networks
-
Aug.
-
N. Marchenko, T. Andre, G. Brandner, W. Masood, and C. Bettstetter, "An experimental study of selective cooperative relaying in industrial wireless sensor networks, " IEEE Trans. Ind. Informat., vol. 10, no. 3, pp. 1806-1816, Aug. 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.3
, pp. 1806-1816
-
-
Marchenko, N.1
Andre, T.2
Brandner, G.3
Masood, W.4
Bettstetter, C.5
-
12
-
-
84929330256
-
Artificial-noiseaided secure multi-antenna transmission with limited feedback
-
May
-
X. Zhang, M. R. McKay, X. Zhou, and R. W. Heath, "Artificial-noiseaided secure multi-antenna transmission with limited feedback, " IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2742-2754, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2742-2754
-
-
Zhang, X.1
McKay, M.R.2
Zhou, X.3
Heath, R.W.4
-
13
-
-
84904303963
-
Secure beamforming design for physical layer network coding basedMIMO twoway relaying
-
Jul.
-
K. Jayasinghe, P. Jayasinghe, N. Rajatheva, and M. Latva-Aho, "Secure beamforming design for physical layer network coding basedMIMO twoway relaying, " IEEE Commun. Lett., vol. 18, no. 7, pp. 1270-1273, Jul. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.7
, pp. 1270-1273
-
-
Jayasinghe, K.1
Jayasinghe, P.2
Rajatheva, N.3
Latva-Aho, M.4
-
14
-
-
84878400311
-
Uncoordinated cooperative jamming for secret communications
-
Jul.
-
S. Luo, J. Li, and A. P. Petropulu, "Uncoordinated cooperative jamming for secret communications, " IEEE Trans. Inf. Forensics Secur., vol. 8, no. 7, pp. 1081-1090, Jul. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.7
, pp. 1081-1090
-
-
Luo, S.1
Li, J.2
Petropulu, A.P.3
-
15
-
-
80051775150
-
Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
-
Sep.
-
X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks, " IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 693-702, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, Issue.3
, pp. 693-702
-
-
Wang, X.1
Tao, M.2
Mo, J.3
Xu, Y.4
-
16
-
-
84898039745
-
Secure beamforming for MIMO two-way communications with an untrusted relay
-
May
-
J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay, " IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.9
, pp. 2185-2199
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Wang, R.4
-
17
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying, " IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
18
-
-
84884537599
-
Optimal relay selection for physicallayer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
19
-
-
84924902824
-
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
-
Mar.
-
L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, "Security-aware relaying scheme for cooperative networks with untrusted relay nodes, " IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Mar. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.3
, pp. 463-466
-
-
Sun, L.1
Ren, P.2
Du, Q.3
Wang, Y.4
Gao, Z.5
-
20
-
-
33749359497
-
Adaptive low-complexity erasure-correcting codebased protocols for QoS-driven mobile multicast services over wireless networks
-
Sep.
-
X. Zhang and Q. Du, "Adaptive low-complexity erasure-correcting codebased protocols for QoS-driven mobile multicast services over wireless networks, " IEEE Trans. Veh. Technol., vol. 55, no. 5, pp. 1633-1647, Sep. 2006.
-
(2006)
IEEE Trans. Veh. Technol.
, vol.55
, Issue.5
, pp. 1633-1647
-
-
Zhang, X.1
Du, Q.2
-
21
-
-
83655165188
-
SPARC: Superposition-aided rateless coding in wireless relay systems
-
Nov.
-
X. Wang, W. Chen, and Z. Cao, "SPARC: Superposition-aided rateless coding in wireless relay systems, " IEEE Trans. Veh. Technol., vol. 60, no. 9, pp. 4427-4438, Nov. 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.9
, pp. 4427-4438
-
-
Wang, X.1
Chen, W.2
Cao, Z.3
-
22
-
-
84901499657
-
Exploiting fountain codes for secure wireless delivery
-
May
-
H. Niu, M. Iwai, K. Sezaki, L. Sun, and Q. Du, "Exploiting fountain codes for secure wireless delivery, " IEEE Commun. Lett., vol. 18, no. 5, pp. 777-780, May 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.5
, pp. 777-780
-
-
Niu, H.1
Iwai, M.2
Sezaki, K.3
Sun, L.4
Du, Q.5
-
23
-
-
0032123310
-
Signal space diversity: A power-and bandwidth-efficient diversity technique for the Rayleigh fading channel
-
Jul.
-
J. Boutros and E. Viterbo, "Signal space diversity: A power-and bandwidth-efficient diversity technique for the Rayleigh fading channel, " IEEE Trans. Inf. Theory, vol. 44, no. 4, pp. 1453-1467, Jul. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.4
, pp. 1453-1467
-
-
Boutros, J.1
Viterbo, E.2
-
24
-
-
84902196230
-
Dynamic subcarrier coordinate interleaving for eavesdropping prevention in OFDM systems
-
Jun.
-
H. Li, X. Wang, and Y. Zou, "Dynamic subcarrier coordinate interleaving for eavesdropping prevention in OFDM systems, " IEEE Commun. Lett., vol. 18, no. 6, pp. 1059-1062, Jun. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.6
, pp. 1059-1062
-
-
Li, H.1
Wang, X.2
Zou, Y.3
-
25
-
-
0003498504
-
-
7th ed. New York, NY, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|