Interference analysis of 3G/ad hoc integrated network
暂无分享,去创建一个
[1] Xiang-Yang Li,et al. Coverage in wireless ad-hoc sensor networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[2] Jing Deng,et al. Wireless ad hoc networks , 2003 .
[3] Marwan Krunz,et al. CDMA-based MAC protocol for wireless ad hoc networks , 2003, MobiHoc '03.
[4] Andrew J. Viterbi,et al. On the capacity of a cellular CDMA system , 1991 .
[5] Chunming Qiao,et al. Integrated cellular and ad hoc relaying systems: iCAR , 2001, IEEE J. Sel. Areas Commun..
[6] R. Berezdivin,et al. Next-generation wireless communications concepts and technologies , 2002, IEEE Commun. Mag..
[7] Hamid Aghvami,et al. Understanding UMTS Radio Network Modelling, Planning and Automated Optimisation: Theory and Practice , 2006 .
[8] Miodrag Potkonjak,et al. Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[9] Ahmed M. Safwat. ACA: channel assignment in ad hoc, 4G and beyond wireless networks with directional antennas , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[10] Akhilesh Pokhariyal,et al. Interference management and performance analysis of UMTS/HSPA+ femtocells , 2009, IEEE Communications Magazine.
[11] Haiyun Luo,et al. UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.
[12] Weihua Zhuang,et al. Improving Voice and Data Services in Cellular/WLAN Integrated Networks by Admission Control , 2007, IEEE Transactions on Wireless Communications.
[13] Xiang-Yang Li,et al. Coverage in Wireless Ad Hoc Sensor Networks , 2003, IEEE Trans. Computers.
[14] Mischa Schwartz,et al. Mobile Wireless Communications: Access and scheduling techniques in cellular systems , 2004 .
[15] Dacheng Yang,et al. Interference Analysis of TD-LTE and TD-SCDMA System Coexistence , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.