Showing 1 - 5 results of 5 for search 'Mérouane Debbah' Skip to content
VuFind
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
Advanced
  • Author
  • Mérouane Debbah
Showing 1 - 5 results of 5 for search 'Mérouane Debbah', query time: 0.03s Refine Results
  1. 1
    Outage Performance of Flexible OFDM Schemes in Packet-Switched Transmissions

    Outage Performance of Flexible OFDM Schemes in Packet-Switched Transmissions by Romain Couillet, Mérouane Debbah

    Published 2009-01-01
    Get full text
    Article
  2. 2
    A Bayesian Game-Theoretic Approach for Distributed Resource Allocation in Fading Multiple Access Channels

    A Bayesian Game-Theoretic Approach for Distributed Resource Allocation in Fading Multiple Access Channels by Gaoning He, Mérouane Debbah, Eitan Altman

    Published 2010-01-01
    Get full text
    Article
  3. 3
    The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow

    The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow by Gaoning He, Laura Cottatellucci, Mérouane Debbah

    Published 2010-01-01
    Get full text
    Article
  4. 4
    Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding

    Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding by Mari Kobayashi, Mérouane Debbah, Shlomo Shamai (Shitz)

    Published 2009-01-01
    Get full text
    Article
  5. 5
    Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer

    Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer by Zhu Han, Ninoslav Marina, Mérouane Debbah, Are Hjørungnes

    Published 2009-01-01
    Get full text
    Article

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs