Akyildiz I, Lee W, Vuran M, and Mohanty S. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey [J].Computer Networks.2006, 50(13):2127-2159[3]Krikidis I, Sun Z, Laneman J N, and Thompson J. Cognitive legacy networks via cooperative diversity [J].IEEE Communication Letters.2009, 13(2):106-108[5]Simeone O, Bar-Ness Y, and Spagnolini U. Stable throughput of cognitive radios with and without relaying capability [J].IEEE Transactions on Communications.2007, 55(12):2351-2360[6]Gambini J, Simeone O, and Spagnolini U. Cognitive relaying and opportunistic spectrum sensing in unlicensed multiple access channels [C]. IEEE ISSSTA Proceedings, Bologna, Italy, Aug. 2008: 371-375.[10]Jovicic A and Viswanath P. Cognitive radio: an information-theoretic perspective[C]. IEEE ISIT, Seattle, USA, Jul. 2006: 2413-2417.[11]Sridharan S and Vishwanath S. On the capacity of a class of MIMO cognitive radios [J].IEEE Journal of Selected Topics in Signal Processing.2008, 2(1):103-117[12]Ahlswede R, Cai N, and Li S R, et al.. Network information flow [J].IEEE Transactions on Information Theory.2000, 46(4):1204-1216[13]Li S R, Yueng R W, and Cai N. Linear network coding [J].IEEE Transactions on Information Theory.2003, 49(2):371-381[14]Ho T, Koetter R, Medard M, Karger D, and Effros M. The benefits of coding over routing in a randomized setting [C]. ISIT, Yokohama, Japan, Jun. 2003: 442-447.[16]Chachulski S, Jennings M, Katti S, and Katabi D. Trading structure for randomness in wireless opportunistic routing [C]. ACM SIGCOMM, Kyoto, Japan, Aug. 2007: 169-180.[17]Chen W, Yu L, Wang W, and Xiong F. Trusted network coding in wireless Ad hoc networks [C]. IEEE Globecom, Miami, USA, Dec. 2010.[18]Umehara D, Hirano T, Denno S, Morikura M, and Sugiyama T. Wireless network coding in slotted ALOHA with two-hop unbalanced traffic[J].IEEE Journal of Select Areas in Communications.2009, 27(5):647-661
|