default search action
IWCIT 2014: Tehran, Iran
- Iran Workshop on Communication and Information Theory, IWCIT 2014, Tehran, Iran, May 7-8, 2014. IEEE 2014, ISBN 978-1-4799-4878-9
- Navid Bani Hassan, Mehdi D. Matinfar:
On the implemetation aspects of adaptive power control algorithms in free-space optical communications. 1-5 - Atena Ebrahim Khani, Babak Seyfe:
A game-theoretic approach based on pricing scheme on the two-user Gaussian interference channel. 1-6 - Ali R. Haqiqatnejad, Kamal Shahtalebi, Amir R. Forouzan:
Spectrum leasing with disjoint secondary user selection in cognitive radio networks. 1-6 - Reza Mosayebi, Hamidreza Arjmandi, Amin Gohari, Masoumeh Nasiri-Kenari, Urbashi Mitra:
Diffusion based molecular communication: A simple near optimal receiver. 1-4 - Mohammad Javad Emadi, Majid Nasiri Khormuji, Mikael Skoglund, Mohammad Reza Aref:
The generalized MAC with partial state and message cooperation. 1-5 - Ali A. Zaidi, Tobias J. Oechtering, Mikael Skoglund:
Stabilization of noisy plants over a Gaussian interference channel. 1-6 - Ali Karimi, Maryam Sabbaghian:
Improving the capacity of cooperative SC-FDMA systems with frequency domain equalization. 1-6 - Mohsen Shabanian Borujeni, Farzad Parvaresh:
Phase retrieval of sparse L-ary signals from magnitudes of their Fourier transform. 1-5 - Ali Kuhestani, Abbas Mohammadi:
Finite-SNR diversity-multiplexing tradeoff of linear dispersion coded MISO systems. 1-4 - Fatemeh Arbabjolfaei, Bernd Bandemer, Young-Han Kim:
Index coding via random coding. 1-7 - Amir Sonee, Ghosheh Abed Hodtani:
Wiretap channel with strictly causal side information at encoder. 1-6 - Tara Javidi:
Information acquisition, controlled sensing, and active hypothesis testing. 1-2 - Salman Beigi:
Maximal entanglement - A new measure of entanglement. 1-6 - Narges Monemizadeh, Mostafa Monemizadeh, Ghosheh Abed Hodtani:
Two-way writing on dirty paper in the presence of noise-dependent interference. 1-4 - Shahab Ghasemi-Goojani, Hamid Behroozi:
Nested lattice codes for the state-dependent Gaussian interference channel with a common message. 1-6 - Sayed Jalal Zahabi, Mohammadali Khosravifard:
A note on the redundancy of reversible variable length codes. 1-6 - Kamran Keykhosravi, Majid Mahzoon, Amin Gohari, Mohammad Reza Aref:
From source model to quantum key distillation: An improved upper bound. 1-6 - Shirin Saeedi Bidokhti, Gerhard Kramer:
An application of a wringing lemma to the multiple access channel with cooperative encoders. 1-4 - Ahmet Zahid Yalçin, Melda Yuksel, Furuzan Atay Onat, Defne Aktas, Tolga Numanoglu, Ahmet Ertugrul Kolagasioglu:
Maximum-weight scheduling with hierarchical modulation. 1-5 - Inaki Estella Aguerri, Morteza Varasteh, Deniz Gündüz:
Zero-delay joint source-channel coding. 1-6 - Farhad Akhoondi, Omid Poursaeed, Jawad A. Salehi:
Resource allocation using fragmented-spectrum synchronous OFDM-CDMA in cognitive radio networks. 1-4 - Javad Haghighat, Fabrice Labeau, David V. Plant:
Reduction of encoding delay in compression of binary sources using turbo codes: A two-stage algorithm. 1-6 - Nasrin Afshar, Bahareh Akhbari, Mohammad Reza Aref:
Random coding bound for E-capacity region of the relay channel with confidential messages. 1-6 - Ehsan Ebrahimi Khaleghi, Jean-Claude Belfiore:
Compute-and-forward for the interference channel: Diversity precoding. 1-6 - Ashkan Esmaeili, Saeed Mashhadi:
Optimizing sensing duration for multiple secondary users in cognitive radio networks. 1-6 - Sadaf Salehkalaibar, Mohammad Reza Aref:
An achievable scheme for the one-receiver, two-eavesdropper broadcast channel. 1-6 - Mahdi Boloursaz, Seyed Amir Reza Kazemi, Babak Barazandeh, Fereidoon Behnia:
Bounds on compressed voice channel capacity. 1-6 - Mahtab Mirmohseni, Panagiotis Papadimitratos:
Colluding eavesdroppers in large cooperative wireless networks. 1-6 - Meysam Mirzaee, Soroush Akhlaghi:
Maximizing the minimum achievable secrecy rate in a two-user Gaussian interference channel. 1-5 - Zolfa Zeinalpour-Yazdi, Shirin Jalali:
Outage analysis of uplink open access two-tier networks. 1-6 - Fan Cheng, Yanlin Geng:
Convexity of Fisher information with respect to Gaussian perturbation. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.