Author of the publication

Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection.

, , , , and . IEEE Commun. Mag., 53 (5): 128-137 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Social-Aware Virtual MAC Protocol for Energy-Efficient D2D Communications Underlying Heterogeneous Cellular Networks., , , and . IEEE Trans. Veh. Technol., 67 (9): 8372-8385 (2018)Process drama in the virtual world - a survey., , and . Int. J. Arts Technol., 1 (1): 13-33 (2008)Aggregated bandwidth allocation: investigation of performance of classical constrained and genetic algorithm based optimisation techniques., , , , and . Comput. Commun., 25 (16): 1443-1453 (2002)Provably secure three-party authenticated key agreement protocol using smart cards., , , , , and . Comput. Networks, (2014)A general effective rate control system based on matching measurement and inter-quantizer., , , , and . Inf. Sci., (2016)Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection., , , , and . IEEE Commun. Mag., 53 (5): 128-137 (2015)A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps., , , and . Appl. Math. Comput., (2017)Alternative relaying for cooperative multiple-access channels in wireless vehicular networks., , , , and . EURASIP J. Wirel. Commun. Netw., (2014)Selective sensing and transmission for multi-channel cognitive radio networks., , , , and . EURASIP J. Wirel. Commun. Netw., (2011)An Evolutionary Multiobjective Sleep-Scheduling Scheme for Differentiated Coverage in Wireless Sensor Networks., , , , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (6): 1093-1102 (2012)