Login / Signup

Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection.

Jing HuangAmitav MukherjeeA. Lee Swindlehurst
Published in: ICASSP (2012)
Keyphrases
  • image analysis
  • real time
  • computer vision
  • data analysis
  • image sequences
  • statistical analysis
  • end to end
  • quantitative analysis
  • forward and backward