Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G

M Vaezi, A Azari, SR Khosravirad… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The next wave of wireless technologies is proliferating in connecting things among
themselves as well as to humans. In the era of the Internet of Things (IoT), billions of …

An introduction to compressive sampling

EJ Candès, MB Wakin - IEEE signal processing magazine, 2008 - ieeexplore.ieee.org
Conventional approaches to sampling signals or images follow Shannon's theorem: the
sampling rate must be at least twice the maximum frequency present in the signal (Nyquist …

[图书][B] An invitation to compressive sensing

S Foucart, H Rauhut, S Foucart, H Rauhut - 2013 - Springer
This first chapter formulates the objectives of compressive sensing. It introduces the
standard compressive problem studied throughout the book and reveals its ubiquity in many …

[图书][B] Principles and practices of interconnection networks

WJ Dally, BP Towles - 2004 - books.google.com
One of the greatest challenges faced by designers of digital systems is optimizing the
communication and interconnection between system components. Interconnection networks …

Information theoretic security

Y Liang, HV Poor, S Shamai - Foundations and Trends® in …, 2009 - nowpublishers.com
The topic of information theoretic security is introduced and the principal results in this area
are reviewed. The basic wire-tap channel model is considered first, and then several specific …

[图书][B] Handbook of linear algebra

L Hogben - 2006 - books.google.com
The Handbook of Linear Algebra provides comprehensive coverage of linear algebra
concepts, applications, and computational software packages in an easy-to-use handbook …

[图书][B] Wireless information networks

K Pahlavan, AH Levesque - 2005 - books.google.com
Towards location aware mobile ad hoc sensors A Systems Engineering Approach to
Wireless Information Networks The Second Edition of this internationally respected textbook …

Secure smartcardbased fingerprint authentication

TC Clancy, N Kiyavash, DJ Lin - Proceedings of the 2003 ACM SIGMM …, 2003 - dl.acm.org
In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment
of biometric authentication are examined, and a cryptosystem capable of using fingerprint …

Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data storage systems

C Huang, M Chen, J Li - ACM Transactions on Storage (TOS), 2013 - dl.acm.org
We design flexible schemes to explore the tradeoffs between storage space and access
efficiency in reliable data storage systems. Aiming at this goal, two new classes of erasure …

[图书][B] Fundamentals of digital communication

U Madhow - 2008 - books.google.com
This is a concise presentation of the concepts underlying the design of digital
communication systems, without the detail that can overwhelm students. Many examples …