Author of the publication

Distributed Digital and Hybrid Beamforming Schemes With MMSE-SIC Receivers for the MIMO Interference Channel.

, , and . IEEE Trans. Veh. Technol., 68 (7): 6790-6804 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resources and transmission formats allocation in OFDMA networks., , and . CTW, page 19-22. (2011)A Quasi-Optimal Clustering Algorithm for MIMO-NOMA Downlink Systems., , and . IEEE Wirel. Commun. Lett., 9 (2): 152-156 (2020)A VHE-Oriented Service Broking for Personalized Service Provisioning., , , , and . ICWI, page 1264. IADIS, (2003)Orthogonal dirty paper coding for informed data hiding., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 274-285. SPIE, (2004)Performance bounds and codes design criteria for channel decoding with a-priori information. CoRR, (2007)A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines., , , and . CoRR, (2015)Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks., and . CoRR, (2016)Optimum Channel Allocation in OFDMA Multi-cell Systems., , , , and . NET-COOP, volume 5425 of Lecture Notes in Computer Science, page 103-111. Springer, (2008)Trellis-Coded Rational Dither Modulation for Digital Watermarking., , , and . IWDW, volume 3710 of Lecture Notes in Computer Science, page 351-360. Springer, (2005)Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach., , , and . APSIPA, page 1160-1167. IEEE, (2018)