Author of the publication

On Non-Cooperative Block-Faded Orthogonal Multiple Access Schemes with Correlated Sources.

, , and . IEEE Trans. Commun., 59 (7): 1916-1926 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Orthogonal dirty paper coding for informed data hiding., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 274-285. SPIE, (2004)A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines., , , and . CoRR, (2015)Performance bounds and codes design criteria for channel decoding with a-priori information. CoRR, (2007)Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks., and . CoRR, (2016)A Quasi-Optimal Clustering Algorithm for MIMO-NOMA Downlink Systems., , and . IEEE Wirel. Commun. Lett., 9 (2): 152-156 (2020)Optimum Channel Allocation in OFDMA Multi-cell Systems., , , , and . NET-COOP, volume 5425 of Lecture Notes in Computer Science, page 103-111. Springer, (2008)A VHE-Oriented Service Broking for Personalized Service Provisioning., , , , and . ICWI, page 1264. IADIS, (2003)Outage statistics in CDMA mobile radio systems., and . IEEE Communications Letters, 4 (3): 83-85 (2000)Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach., , , and . APSIPA, page 1160-1167. IEEE, (2018)Trellis-Coded Rational Dither Modulation for Digital Watermarking., , , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 351-360. Springer, (2005)