Showing 1 - 7 results of 7 for search 'Debbah Mérouane' Skip to content
VuFind
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
Napredno
  • Avtor
  • Debbah Mérouane
Showing 1 - 7 results of 7 for search 'Debbah Mérouane', čas poizvedbe: 0.04s Refine Results
  1. 1
    Minimum BER Receiver Filters with Block Memory for Uplink DS-CDMA Systems

    Minimum BER Receiver Filters with Block Memory for Uplink DS-CDMA Systems od Debbah Mérouane, Hjørungnes Are

    Izdano 2008-01-01
    Polni tekst
    Article
  2. 2
    The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow

    The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow od Cottatellucci Laura, Debbah Mérouane, He Gaoning

    Izdano 2010-01-01
    Polni tekst
    Article
  3. 3
    A Bayesian Game-Theoretic Approach for Distributed Resource Allocation in Fading Multiple Access Channels

    A Bayesian Game-Theoretic Approach for Distributed Resource Allocation in Fading Multiple Access Channels od Debbah Mérouane, Altman Eitan, He Gaoning

    Izdano 2010-01-01
    Polni tekst
    Article
  4. 4
    Spectral Efficiency of CDMA Downlink Cellular Networks with Matched Filter

    Spectral Efficiency of CDMA Downlink Cellular Networks with Matched Filter od Debbah Mérouane, Bonneau Nicolas, Altman Eitan

    Izdano 2006-01-01
    Polni tekst
    Article
  5. 5
    Space-Time Channel Modeling for Wireless Communications

    Space-Time Channel Modeling for Wireless Communications od Debbah Mérouane, Kennedy Rodney A, Abhayapala Thushara

    Izdano 2007-01-01
    Polni tekst
    Article
  6. 6
    Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer

    Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer od Marina Ninoslav, Hjørungnes Are, Debbah Mérouane, Han Zhu

    Izdano 2009-01-01
    Polni tekst
    Article
  7. 7
    Wireless Physical Layer Security

    Wireless Physical Layer Security od El-Gamal Hesham, Shamai (Shitz) Shlomo, Poor HVincent, Debbah Mérouane

    Izdano 2009-01-01
    Polni tekst
    Article

Iskalna orodja:

  • RSS
  • Pošljite iskanje po emailu

Iskalne možnosti

  • Iskalna zgodovina
  • Napredno iskanje

Poišči več

  • Prelistaj katalog
  • Po abecedi
  • Explore Channels
  • Obvezna literatura
  • Novi knjige/članki

Potrebujete pomoč?

  • Navodila za iskanje
  • Vprašaj knjižničarja
  • Pogosta vprašanja