From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting reflector attacks by sharing beliefs., , и . GLOBECOM, стр. 1358-1362. IEEE, (2003)Region Division Based Spectrum Access of D2D Communication under Heterogeneous Networks., , , и . VTC Spring, стр. 1-5. IEEE, (2014)Robust Transceiver Optimization for MISO SWIPT Interference Channel: A Decentralized Approach., , , и . VTC Spring, стр. 1-5. IEEE, (2016)Interference Constrained D2D Communication with Relay Underlaying Cellular Networks., , , и . VTC Fall, стр. 1-5. IEEE, (2013)A resource allocation scheme for D2D multicast with QoS protection in OFDMA-based systems., , , , и . PIMRC, стр. 2383-2387. IEEE, (2013)Optimal Power Control Under Interference Temperature Constraints in Cognitive Radio Network., , и . WCNC, стр. 116-120. IEEE, (2007)System-level simulation platform with interference avoidance for Device-to-Device communication underlaying cellular system., , , , и . ICCT, стр. 131-135. IEEE, (2013)An efficient design of FPGA-based sample rate converting filter in Software Defined Radio., , и . ICCT, стр. 634-638. IEEE, (2013)An improved channel estimation method for LTE PUSCH., , , и . ChinaCom, стр. 52-57. IEEE, (2014)An improved preamble detection method for LTE PRACH in high-speed railway scenario., , и . ChinaCom, стр. 544-549. IEEE Computer Society, (2015)