Author of the publication

Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection - Secure DoF and Jammer Scaling Law.

, and . CoRR, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NAND flash memory system based on the Harvard buffer architecture for multimedia applications., , and . Multimedia Tools Appl., 74 (16): 6287-6302 (2015)Beamforming games with quantized CSI in two-user interference channels., and . ICTC, page 1303-1306. IEEE, (2015)Highly robust position control of BLDDSM using an improved integral variable structure systems.. Autom., 42 (6): 929-935 (2006)The influence of knowledge source and ambidexterity in the thin film transistor and liquid crystal display industry: evidence from Japan, Korea, and Taiwan., , , and . Scientometrics, 99 (2): 233-260 (2014)A banked-promotion translation lookaside buffer system., , , and . J. Syst. Archit., 47 (14-15): 1065-1078 (2002)Interference Alignment by Opportunistic User Selection in 3-User MIMO Interference Channels., and . ICC, page 1-5. IEEE, (2011)Feedback bit allocation in a gateway channel., , and . ACSCC, page 1841-1845. IEEE, (2012)Simulation Study on Dependence of Channel Potential Self-Boosting on Device Scale and Doping Concentration in 2-D and 3-D NAND-Type Flash Memory Devices., , , , , and . IEICE Trans. Electron., 93-C (5): 596-601 (2010)Characterization of 2-bit Recessed Channel Memory with Lifted-Charge Trapping Node (L-CTN) Scheme., , , , , , , , and . IEICE Trans. Electron., 91-C (5): 742-746 (2008)Having Second Thoughts? Let's hear it., and . CoRR, (2023)