Abstract is missing.
- Detecting clustering in binary sequencesMichael Picollelli, Charles G. Boncelet Jr., Lisa M. Marvel. 1-4 [doi]
- Iterative soft-decision feedback zigzag algorithm using joint extrinsic information for two-dimensional intersymbol interferenceYiming Chen, Benjamin Belzer, Krishnamoorthy Sivakumar. 1-6 [doi]
- Stochastic modeling of short-term power consumption for smart grid: A state space approach and real measurement demonstrationXiao Ma, Husheng Li, Seddik M. Djouadi. 1-5 [doi]
- Fundamental bounds on the interconnect complexity of decoder implementationsPulkit Grover, Anant Sahai. 1-6 [doi]
- Effective perturbation distributions for small samples in simultaneous perturbation stochastic approximationXumeng Cao. 1-5 [doi]
- Link adaptation in LTE-A uplink with Turbo SIC receivers and imperfect channel estimationMeilong Jiang, Guosen Yue, Narayan Prasad, Sampath Rangarajan. 1-6 [doi]
- Soft correction and verification of the messages protected by cryptographic check valuesNatasa Zivic. 1-6 [doi]
- Doubly selective channel estimation in OFDM using discrete prolate spheroidal sequencesIftikharuddin Khan, Milos Doroslovacki. 1-5 [doi]
- A continuum computational model of mitotic matrix formationChangji Shi, Wilbur E. Channels, Yixian Zheng, Pablo A. Iglesias. 1-5 [doi]
- Adaptive transmission policies for energy harvesting wireless nodes in fading channelsOmur Ozel, Kaya Tutuncuoglu, Jing Yang, Sennur Ulukus, Aylin Yener. 1-6 [doi]
- A neuromimetic spiking neural network for simulating cortical circuitsFilippo Grassia, Timothée Levi, Jean Tomas, Sylvie Renaud, Sylvain Saïghi. 1-6 [doi]
- From homogeneous to heterogeneous networks: A 3GPP Long Term Evolution rel 8/9 case studyRalf Bendlin, Vikram Chandrasekhar, Runhua Chen, Anthony E. Ekpenyong, Eko N. Onggosanusi. 1-5 [doi]
- Distributed opinion estimation using iterative majority votingEfecan Poyraz, Rene L. Cruz. 1-6 [doi]
- Compensating for noise and mismatch in speaker verification systems using approximate Bayesian inferenceCiira Wa Maina, John MacLaren Walsh. 1-6 [doi]
- A mechanism for inhibition in visual searchJeff Moher, Howard E. Egeth. 1-5 [doi]
- Consensus clustering: The Filtered Stochastic Best-One-Element-Move AlgorithmHaipeng Zheng, Sanjeev R. Kulkarni, H. Vincent Poor. 1-6 [doi]
- Minimum delay communication in energy harvesting systems over fading channelsMostafa Khoshnevisan, J. Nicholas Laneman. 1-5 [doi]
- Consensus problem under diffusion-based molecular communicationArash Einolghozati, Mohsen Sardari, Ahmad Beirami, Faramarz Fekri. 1-6 [doi]
- Limiting behavior of receive antennae selectionPeyman Hesami, J. Nicholas Laneman. 1-6 [doi]
- A neuromorphic saliency-map based active vision systemDaniel Sonnleithner, Giacomo Indiveri. 1-6 [doi]
- Stability (over time) of Regularized modified CS(noisy) for recursive causal sparse reconstructionFardad Raisali, Namrata Vaswani. 1-6 [doi]
- On the energy efficiency of some cooperative and non-cooperative transmission schemes in WSNsGlauber Gomes de Oliveira Brante, Marcos Tomio Kakitani, Richard Demo Souza. 1-6 [doi]
- Improving aggregated forecasts of probabilityGuanchun Wang, Sanjeev R. Kulkarni, H. Vincent Poor, Daniel N. Osherson. 1-5 [doi]
- Verifiable and computable ℓ∞ performance evaluation of ℓ1 sparse signal recoveryGongguo Tang, Arye Nehorai. 1-6 [doi]
- An outer bound region for the parallel two-way channel with interferenceZhiyu Cheng, Natasha Devroye. 1-6 [doi]
- A comparative study of Quadratic Backoff and Binary Exponential Backoff in IEEE 802.11 DCF networksXinghua Sun, Lin Dai. 1-6 [doi]
- Event-related simulation of neural processing in complex visual scenesStefan Mihalas, Yi Dong, Rüdiger von der Heydt, Ernst Niebur. 1-6 [doi]
- TC-CSBP: Compressive sensing for time-correlated data based on belief propagationBehzad Shahrasbi, Ali Talari, Nazanin Rahnavard. 1-6 [doi]
- Acceleration of distributed minimax flow optimization in networksSina Z. Anaraki, Mehdi Kalantari. 1-5 [doi]
- On the capacity region of multiple-access relay channelsRavi Tandon, H. Vincent Poor. 1-5 [doi]
- A class of adaptive algorithms based on ML for non-Gaussian linear filteringHualiang Li, Tülay Adali. 1-5 [doi]
- Robust principal component analysis based on low-rank and block-sparse matrix decompositionGongguo Tang, Arye Nehorai. 1-5 [doi]
- Constellation shaping for communication channels with quantized outputsChandana Nannapaneni, Matthew C. Valenti, Xingyu Xiang. 1-6 [doi]
- Channel order estimation via sample sortingSimon G. Wood, Bernd-Peter Paris, Jill K. Nelson. 1-5 [doi]
- Adaptive synchronization of time-delayed chaotic systems and its application to secure communicationWenying Mu, Baotong Cui, Xuyang Lou, Huibin Zhu. 1-5 [doi]
- HORNS: A homomorphic encryption scheme for Cloud Computing using Residue Number SystemMahadevan Gomathisankaran, Akhilesh Tyagi, Kamesh Namuduri. 1-5 [doi]
- Learning visual saliencyQi Zhao, Christof Koch. 1-6 [doi]
- Exploiting temporal coherence in speech for data-driven feature extractionMichael A. Carlin, Mounya Elhilali. 1-5 [doi]
- Optimal eigenbeamforming for suppressing self-interference in full-duplex MIMO relaysTaneli Riihonen, Arun Balakrishnan, Katsuyuki Haneda, Shurjeel Wyne, Stefan Werner, Risto Wichman. 1-6 [doi]
- Energy-efficient noncoherent signal detection for networked sensors using ordered transmissionsZiad N. Rawas, Qian He, Rick S. Blum. 1-5 [doi]
- Turbo coded BICM scheme with iterative detection for MIMO block-fading channelsYueqian Li, Masoud Salehi. 1-5 [doi]
- A multimodal-corpus data collection system for cognitive acoustic scene analysisJulius Georgiou, Philippe O. Pouliquen, Andrew Cassidy, Guillaume Garreau, Charalambos M. Andreou, Guillermo Stuarts, Cyrille d Urbal, Andreas G. Andreou, Susan L. Denham, Thomas Wennekers, Robert Mill, István Winkler, Tamás Bohm, Orsolya Szalardy, Georg M. Klump, Simon Jones, Alexandra Bendixen. 1-6 [doi]
- Design of bilayer lengthened LDPC codes for Rayleigh fading relay channelsOsso Vahabzadeh, Masoud Salehi. 1-5 [doi]
- An efficient feature selection method for distributed cyber attack detection and classificationHoa Dinh Nguyen, Qi Cheng. 1-6 [doi]
- Random complex field code design for security over wiretap channelsJiaxi Xiao, Xiaoli Ma, Steven W. McLaughlin. 1-6 [doi]
- Multi-Bernoulli filtering with unknown clutter intensity and sensor field-of-viewBa-Tuong Vo, Ba-Ngu Vo, Reza Hoseinnezhad, Ronald P. S. Mahler. 1-6 [doi]
- Joint clock offset and skew estimation for inactive nodes in Wireless Sensor NetworksAitzaz Ahmad, Amina Noor, Erchin Serpedin. 1-6 [doi]
- A note on Fanos inequalityXue-Bin Liang. 1-3 [doi]
- On the CRLB scaling law for Received Signal Strength (RSS) geolocationLaurence Mailaender. 1-6 [doi]
- Joint transmitter adaptation and power control for downlink wireless systems with target SIR requirementsShiny Abraham, Dimitrie C. Popescu. 1-5 [doi]
- Noisy network coding approach to the relay channel with a random stateMajid Nasiri Khormuji, Mikael Skoglund. 1-5 [doi]
- Delay-Doppler span estimation in OFDM radarWenshu Zhang, Huilin Xu, Liuqing Yang. 1-6 [doi]
- Generalized code-multiplexing transmissions for UWB systemsQi Zhou, Xiaoli Ma, Vincenzo Lottici. 1-6 [doi]
- Total optimisation of a media-streaming wireless terminal: Energy-efficient link adaptation under higher-layer criteriaVirgilio Rodriguez. 1-6 [doi]
- Cyclic seesaw optimization with applications to state-space model identificationJames C. Spall. 1-6 [doi]
- New hypothesis testing-based methods for fault detection for smart grid systemsQian He, Rick S. Blum. 1-6 [doi]
- Stable manifold embeddings with operators satisfying the Restricted Isometry PropertyHan Lun Yap, Michael B. Wakin, Christopher J. Rozell. 1-6 [doi]
- Image transmission over the underwater acoustic channel via compressive sensingInaki Iglesias, Aijun Song, Javier Garcia-Frias, Mohsen Badiey, Gonzalo R. Arce. 1-6 [doi]
- Anomaly detection for random graphs using distributions of vertex invariantsNash M. Borges, Glen A. Coppersmith, Gerard G. L. Meyer, Carey E. Priebe. 1-6 [doi]
- Computationally efficient classification of human transport mode using micro-doppler signaturesGuillaume Garreau, Nicoletta Nicolaou, Charalambos M. Andreou, Cyrille d Urbal, Guillermo Stuarts, Julius Georgiou. 1-4 [doi]
- Characterizing multiplexing and diversity in visual MIMOAshwin Ashok, Marco Gruteser, Narayan B. Mandayam, Kristin J. Dana. 1-6 [doi]
- A PCI based high-fanout AER mapper with 2 GiB RAM look-up table, 0.8 µs latency and 66MHz output event-rateDaniel Bernhard Fasnacht, Giacomo Indiveri. 1-6 [doi]
- Exclusion regions via handshaking protocol for inter-cell interference managementMichal Cierny, Pekka Jänis, Risto Wichman, Cássio B. Ribeiro. 1-6 [doi]
- Wyners common information for continuous random variables - A lossy source coding interpretationGe Xu, Wei Liu, Biao Chen. 1-6 [doi]
- Detection and channel estimation for optical communication over atmospheric turbulent channelsArash Komaee. 1-6 [doi]
- Complex-valued Gaussian signal processing: Optimality of MSE, incorporation of full statistics, and a unified viewXi-Lin Li, Tülay Adali. 1-5 [doi]
- Noncoherent compressive sensing with application to distributed radarChristian R. Berger, Josee M. F. Moura. 1-6 [doi]
- Passive sonar source tracking using a model-based Bayesian approachR. Lee Culver, Colin W. Jemmott, Brett E. Bissinger, Alexander W. Sell, Andrew T. Pyzdek. 1-6 [doi]
- Covert channel detection in VoIP streamsGonzalo J. Garateguy, Gonzalo R. Arce, Juan Pelaez. 1-6 [doi]
- Power conservation in Wireless Sensor Networks: A graph-theoretic approachArnab Das, Santanu Das. 1-6 [doi]
- Design criteria for lattice network codingChen Feng, Danilo Silva, Frank R. Kschischang. 1-6 [doi]
- Further results on cooperative localization via semidefinite programmingNing Wang, Liuqing Yang. 1-6 [doi]
- A denial-of-service jamming game for remote state monitoring in smart gridHusheng Li, Lifeng Lai, Robert C. Qiu. 1-6 [doi]
- Deterministic compressed sensing matrices from multiplicative character sequencesNam Yul Yu. 1-5 [doi]
- Outage probability for multimodal cooperative networksRicky Hussmann, Daryl Reynolds. 1-6 [doi]
- Video object trajectory perturbation based data hiding satisfying statistical and perceptual invisibilityAbdullah Cay, Zia-ur Rahman, Dimitrie C. Popescu. 1-6 [doi]
- An analysis of efficient formulas for elliptic curve point addition over binary extension fieldsLawrence Leinweber, Christos A. Papachristou, Francis G. Wolff. 1-5 [doi]
- On flow-aware CSMA in multi-channel wireless networksThomas Bonald, Mathieu Feuillet. 1-6 [doi]
- A novel 3D display using multi-hyperstereo image stitchingCorey Ashby, Ralph Etienne-Cummings. 1-6 [doi]
- Stochastic approximation for discrete optimization of noisy loss measurementsQi Wang. 1-4 [doi]
- Power controlled multirate multimedia transmission in self-encoded spread spectrum over dynamic fading channelsLiang Chi, Poomathi Duraisamy, Won Mee Jang, Lim Nguyen. 1-5 [doi]
- Dynamic spectrum allocation for power load prediction via wireless metering in smart gridShuping Gong, Husheng Li. 1-6 [doi]
- The Restricted Isometry Property for block diagonal matricesHan Lun Yap, Armin Eftekhari, Michael B. Wakin, Christopher J. Rozell. 1-6 [doi]
- Overcoming data limitations to identify a static nonlinearity in a biological signaling cascadeJoshua R. Porter, Pablo A. Iglesias, John S. Burg, Peter J. Espenshade. 1-6 [doi]
- A bio-inspired event-driven digital readout architecture with pixel-level A/D conversion and non-uniformity correctionJoseph H. Lin, Philippe O. Pouliquen, Andreas G. Andreou, Arnold C. Goldberg, Charbel G. Rizk. 1-6 [doi]
- A mobile world of security - The modelChristine Neuberg, Panos Papadimitratos, Christina Fragouli, Rüdiger L. Urbanke. 1-6 [doi]
- MSE uplink-downlink duality of MIMO systems with arbitrary noise covariance matricesTadilo Endeshaw Bogale, Luc Vandendorpe. 1-6 [doi]
- Anti-jamming performance of cognitive radio networksXiaohua Li, Wednel Cadeau. 1-6 [doi]
- Goodput maximization in cooperative networks with ARQQing Chen, Mustafa Cenk Gursoy. 1-6 [doi]
- On linear processing for dual-hop multi-channel relayingMin Dong, Mahdi Hajiaghayi, Ben Liang. 1-6 [doi]
- Joint transceiver design and user grouping in a MIMO interfering broadcast channelMeisam Razaviyayn, Hadi Baligh, Aaron Callard, Zhi-Quan Luo. 1-6 [doi]
- Broadcast consensus based phase synchronization for coherent MIMO radarYang Yang, Rick S. Blum. 1-6 [doi]
- On the scaling law for compressive sensing and its applicationsWeiyu Xu, Ao Tang. 1-6 [doi]
- Delay bounds for random linear coding in multihop relay networksRandy Cogill, Brooke Shrader. 1-6 [doi]
- On the capacity of Gaussian broadcast channels that receive interferenceXiaohu Shang, H. Vincent Poor. 1-5 [doi]
- Extremal edges: Evidence in natural imagesSudarshan Ramenahalli, Stefan Mihalas, Ernst Niebur. 1-5 [doi]
- Suffix trees for universal source modeling with applicationsJay Gibble, Bernd-Peter Paris. 1-6 [doi]
- Joint association and power adaption in WiFi community networksChin-Ya Huang, Parameswaran Ramanathan. 1-6 [doi]
- A wireless architecture for distributed sensing/actuation and pre-processing with microsecond synchronizationPhilippe O. Pouliquen, Andrew Cassidy, Andreas G. Andreou, Guillaume Garreau, Julius Georgiou. 1-6 [doi]
- Time difference of arrival based source localization within a sparse representation frameworkCiprian R. Comsa, Alexander M. Haimovich, Stuart C. Schwartz, York H. Dobyns, Jason A. Dabin. 1-6 [doi]
- Designing low-complexity detectors for generalized SC-FDMA systemsQi Zhou, Xiaoli Ma. 1-6 [doi]
- On the optimality of M-group decentralized STBC for cooperative networksHao Feng, Hongzheng Wang, Leonard J. Cimini Jr.. 1-6 [doi]
- A blind symbol synchronization algorithm using adaptive equalizersFarzad Moazzami, Arlene A. Cole-Rhodes. 1-4 [doi]
- Power controlled coded-sequence self-encoded spread spectrum communicationsPoomathi Duraisamy, Liang Chi, Won Mee Jang, Lim Nguyen. 1-6 [doi]
- Cross-layer design of coded multicast for wireless random access networksKetan Rajawat, Nikolaos Gatsis, Seung-Jun Kim, Georgios B. Giannakis. 1-6 [doi]
- On modeling network congestion using continuous-time bivariate Markov chainsBrian L. Mark, Yariv Ephraim. 1-6 [doi]
- Bridging tree-packing and network coding: An information flow approachDaniel Enrique Lucani, Muriel Médard. 1-6 [doi]
- On the effect of feedback delay in the downlink of multiuser OFDM systemsMario Goldenbaum, Rudi Abi Akl, Stefan Valentin, Slawomir Stanczak. 1-6 [doi]
- Distributed multi-cell power control in transmit beamforming systems using intercell-interference plus noise estimatesShyam Pandula, Bernd-Peter Paris. 1-6 [doi]
- Blind equalization using coarse quantizer BSS nonlinearityYang Zhang, Saleem A. Kassam. 1-6 [doi]
- Adaptive rate transmission for spectrum sharing system with quantized channel state informationMohamed Abdallah, Ahmed Salem, Mohamed-Slim Alouini, Khalid A. Qaraqe. 1-5 [doi]
- Joint power control and resource allocation for interference mitigation in LTE uplink systemsLiying Li, Gang Wu, Hongbing Xu, Geoffrey Ye Li, Xin Feng. 1-5 [doi]
- Clock synchronization without exchanging timestampsHayang Kim, Xiaoli Ma. 1-6 [doi]
- Spectral efficiency of distributed cooperative relayingYao Xiao, Leonard J. Cimini Jr.. 1-6 [doi]
- Implicit network timing synchronization with phase-only updatesSriram Venkateswaran, Upamanyu Madhow. 1-6 [doi]
- Sparsity penalties in dynamical system estimationAdam Charles, Muhammad Salman Asif, Justin K. Romberg, Christopher Rozell. 1-6 [doi]
- Designing privacy preserving router scheduling policiesSachin Kadloor, Xun Gong, Negar Kiyavash, Parv Venkitasubramaniam. 1-6 [doi]
- Performance regimes of uncoded linear communications over AWGN channelsSzymon Jakubczak, John Z. Sun, Dina Katabi, Vivek K. Goyal. 1-6 [doi]
- On hard decision upper bounds for coded M-ary hierarchical modulationSuayb S. Arslan, Pamela C. Cosman, Laurence B. Milstein. 1-6 [doi]
- Energy-efficient multiuser MIMO beamformingChenzi Jiang, Leonard J. Cimini Jr.. 1-5 [doi]
- Implementing continuous flow over dense Wireless Sensor NetworksKamal P. Rezaei, Sina Z. Anaraki, Mehdi Kalantari. 1-6 [doi]
- Design of a one million neuron single FPGA neuromorphic system for real-time multimodal scene analysisAndrew Cassidy, Andreas G. Andreou, Julius Georgiou. 1-6 [doi]
- Cooperative multi-residence demand response schedulingNikolaos Gatsis, Georgios B. Giannakis. 1-6 [doi]
- Coherent OCDMA receivers with robust performanceYi Yang, A. Brinton Cooper, Jacob B. Khurgin, Jin U. Kang. 1-6 [doi]
- Secure relay beamforming over cognitive radio channelsJunwei Zhang, Mustafa Cenk Gursoy. 1-5 [doi]
- Secret key generation through OFDM multipath channelYanpei Liu, Stark C. Draper, Akbar M. Sayeed. 1-6 [doi]
- Multistage MIMO approach to interference cancellationFarzad Moazzami, Arlene A. Cole-Rhodes. 1-4 [doi]
- On gas detection and concentration estimation via mid-IR-based gas detection system analysis modelYi Xin, Joel M. Morris. 1-4 [doi]
- Improved bootstrap decoding scheme for space time codes with imperfect channel estimationAmir Laufer, Yeheskel Bar-Ness. 1-5 [doi]
- Some phase synchronization algorithms for coherent MIMO radarYang Yang, Rick S. Blum. 1-6 [doi]
- Modelling object perception in cortex: Hierarchical Bayesian networks and belief propagationSalvador Dura-Bernal, Thomas Wennekers, Susan L. Denham. 1-6 [doi]
- On the throughput of CSMAYayu Gao, Lin Dai. 1-4 [doi]
- Joint electrical load modeling and forecasting based on sparse Bayesian Learning for the smart gridDepeng Yang, Liang Xu, Shuping Gong, Husheng Li, Gregory D. Peterson, Zhenghao Zhang. 1-6 [doi]
- Defending false data injection attack on smart grid network using adaptive CUSUM testYi Huang, Husheng Li, Kristy A. Campbell, Zhu Han. 1-6 [doi]
- Design and analysis of random access networks with interference alignmentFrancesco Rossetto, Andrea Munari, Michele Zorzi. 1-6 [doi]
- Prediction based resource allocation in OFDMAJorge F. Schmidt, Juan E. Cousseau, Risto Wichman, Stefan Werner. 1-4 [doi]
- A distributed algorithm for optimal (optical) bypass of IP routers to improve network performance and efficiencyMark Karol. 1-6 [doi]
- The chief security officer problemKamesh Namuduri, Murali Varanasi. 1-5 [doi]
- Exploiting cross ambiguity function properties for data compression in emitter location systemsMohammad Pourhomayoun, Mark L. Fowler. 1-5 [doi]
- A frequency-hopping based communication infrastructure for wireless metering in smart gridQi Zeng, Husheng Li, Zhenghao Zhang, Daiyuan Peng. 1-6 [doi]
- Multistage blind equalization in time-varying MIMO systemsFarzad Moazzami, Arlene A. Cole-Rhodes. 1-5 [doi]
- Hidden Markov process based dynamic spectrum access for cognitive radioThao Nguyeny, Brian L. Mark, Yariv Ephraim. 1-6 [doi]
- Hardware accelerated visual attention algorithmPolina Akselrod, Faye Zhao, Ifigeneia Derekli, Clément Farabet, Berin Martini, Yann LeCun, Eugenio Culurciello. 1-6 [doi]
- Cooperative jamming to improve the connectivity of the 1-D secrecy graphCagatay Capar, Dennis Goeckel, Benyuan Liu, Donald F. Towsley. 1-6 [doi]
- Robust support recovery using sparse compressive sensing matricesJarvis Haupt, Richard G. Baraniuk. 1-6 [doi]
- CHAINS: Competition and cooperation between fragmentary event predictors in a Model of Auditory Scene AnalysisRobert Mill, Tamás Bohm, Alexandra Bendixen, István Winkler, Susan L. Denham. 1-6 [doi]
- Concatenation of LDPC codes with Golden space-time block codes over the block fading MIMO channels: System design and performance analysisJin-Taek Seong, Heung-No Lee. 1-4 [doi]
- Interference management approaches for MU-MIMO in shadow fading channelsQi Wang, Larry J. Greenstein, Leonard J. Cimini Jr., Douglas S. Chan. 1-6 [doi]
- Successive interference cancellation based turbo equalization for MIMO OFDM systemsVamadevan Namboodiri, Hong Liu, Predrag Spasojevic. 1-6 [doi]
- Resource allocation in MIMO-based ad hoc networksPeng Wang, John D. Matyjas, Michael J. Medley. 1-6 [doi]
- Unequal error protection for noncoherent random linear network codingZhiyuan Yan, Bruce W. Suter. 1-6 [doi]
- A Markov chain model for Edge Memories in stochastic decoding of LDPC codesKuo-Lun Huang, Vincent Gaudet, Masoud Salehi. 1-4 [doi]
- Design of a CMOS A2I data converter: Theory, architecture and implementationThomas Murray, Philippe O. Pouliquen, Andreas G. Andreou, Keir Lauritzen. 1-6 [doi]
- Superposition coding in an adversarial environmentKoorosh Firouzbakht, Guevara Noubir, Masoud Salehi. 1-5 [doi]
- Making cooperation valuable: A delay-centric, pricing-based user cooperation strategyChen Chen, Shalinee Kishore. 1-6 [doi]
- Multistream robust speaker recognition based on speech intelligibilitySridhar Krishna Nemala, Mounya Elhilali. 1-5 [doi]
- On the baseband communication performance of physical layer steganographyPedro N. Safier, Ira S. Moskowitz, Paul Cotae. 1-6 [doi]
- Reduced computational complexity suboptimal gain allocation for proportionate-type NLMS algorithms with colored inputsKevin T. Wagner, Milos Doroslovacki. 1-6 [doi]
- Dynamic compressive spectrum sensing for cognitive radio networksWotao Yin, Zaiwen Wen, Shuyi Li, Jia Meng, Zhu Han. 1-6 [doi]
- On the capacity of molecular communication over the AIGN channelMajid Nasiri Khormuji. 1-4 [doi]
- A deterministic polynomialtime algorithm for constructing a multicast coding scheme for linear deterministic relay networksS. M. Sadegh Tabatabaei Yazdi, Serap A. Savari. 1-6 [doi]
- Networked system state estimation in smart grid over cognitive radio infrastructuresXiao Ma, Husheng Li, Seddik M. Djouadi. 1-5 [doi]