Author of the publication

CSI-unaware scheduling for coexistence of MIMO-OFDMA device-to-device links and cellular mobile terminals.

, , and . MILCOM, page 677-682. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative EM channel estimation for turbo-coded DS-CDMA receiver under time-varying interference., , , and . WSA, page 174-179. IEEE, (2008)Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems.. IEEE Communications Letters, 20 (7): 1361-1364 (2016)Prescient Beamforming by Primary Transmitters in Interweave Cognitive Radio Networks with a Single Primary Receiver, and . CoRR, (2011)Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper, and . CoRR, (2010)Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI, and . CoRR, (2010)Interference self-mitigating beamforming for the K-user MIMO IC., , and . ICASSP, page 3352-3355. IEEE, (2011)Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach., and . ICC, page 1-5. IEEE, (2010)Sum-Rate Distortion in MIMO Broadcast Channels with Irregular Limited Feedback., and . GLOBECOM, page 3205-3209. IEEE, (2007)Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints.. Proc. IEEE, 103 (10): 1747-1761 (2015)Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey., , , and . IEEE Commun. Surv. Tutorials, 16 (3): 1550-1573 (2014)