Author of the publication

Cross-layer resource allocation in wireless multi-hop networks with outdated channel state information.

, , , and . Journal of Zhejiang University - Science C, 15 (5): 337-350 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Optimal Algorithm for Virtual Path Bandwidth Allocation., , , , and . AINA, page 487-490. IEEE Computer Society, (2003)Secure Routing in Multihop Wireless Ad-hoc Networks with Decode-and-Forward Relaying., , , and . CoRR, (2015)Exploiting Trust Degree for Multiple-Antenna User Cooperation., , , , and . CoRR, (2017)Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying., , , and . IEEE Trans. Communications, 64 (2): 753-764 (2016)Sparse Beamforming in Multiple Multi-Antenna Amplify-and-Forward Relay Networks., , , and . IEEE Communications Letters, 18 (6): 1023-1026 (2014)Security Analysis and Amendment of 3G Core Network Based on MTPsec., , and . PACIIA (1), page 519-523. IEEE Computer Society, (2008)Cross-layer resource allocation in wireless multi-hop networks with outdated channel state information., , , and . Journal of Zhejiang University - Science C, 15 (5): 337-350 (2014)A Transmission Scheme for Encrypted Speech over GSM Network., , , and . ISCSCT (2), page 805-808. IEEE Computer Society, (2008)Secure Transmission in Linear Multihop Relaying Networks., , , and . CoRR, (2017)Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks., , and . IEEE Communications Letters, 19 (9): 1540-1543 (2015)