Anna Kacewicz, Stephen B. Wicker. Application of Reed-Muller Codes for Localization of Malicious Nodes. In Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010. pages 1-7, IEEE, 2010. [doi]
@inproceedings{KacewiczW10, title = {Application of Reed-Muller Codes for Localization of Malicious Nodes}, author = {Anna Kacewicz and Stephen B. Wicker}, year = {2010}, doi = {10.1109/ICC.2010.5501749}, url = {http://dx.doi.org/10.1109/ICC.2010.5501749}, researchr = {https://researchr.org/publication/KacewiczW10}, cites = {0}, citedby = {0}, pages = {1-7}, booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010}, publisher = {IEEE}, isbn = {978-1-4244-6402-9}, }