Login / Signup
Secrecy analysis of multiuser downlink wiretap networks with opportunistic scheduling.
Xin Ge
Peiran Wu
Hu Jin
Victor C. M. Leung
Published in:
ICC (2015)
Keyphrases
</>
resource allocation
statistical analysis
multipath
bayesian networks
scheduling problem
round robin
scheduling and resource allocation