[1]
H. J. Liu, S. F. Li, and M. Yi: Coexistence Between Cognitive Radio Network and Digital TV[C]. Proceedings of the 2009 International Conference on Communication Software and Networks, ICCSN 2009: 239-242.
DOI: 10.1109/iccsn.2009.56
Google Scholar
[2]
R. Yu, Y. Zhang, C. J. Huang, R. C. Gao: Joint Admission and Rate Control for Multimedia Sharing in Wireless Home Networks [J]. Computer Communications, 33(14), 2010: 1632-1644.
DOI: 10.1016/j.comcom.2010.04.013
Google Scholar
[3]
S. Michael: System Architecture Challenges in the Home M2M Network[C]. 2010 Long Island Systems, Applications and Technology Conference, LISAT 10, (2010).
DOI: 10.1109/lisat.2010.5478336
Google Scholar
[4]
C. Tomas: Relay-Stabilization and Bifurcations of Unstable SISO Processes with Time Delay [J]. IEEE Transactions on Automatic Control, vol. 55, no. 5, pp.1131-1141, May (2010).
DOI: 10.1109/tac.2010.2045437
Google Scholar
[5]
J. F. Wang, H. Q. Zhai, Y. G. Fang, et al: Opportunistic Media Access Control and Rate Adaptation for Wireless Ad Hoc Networks [C]/Proc of IEEE ICC. Paris, France, 2004, 1: 154 - 158.
DOI: 10.1109/icc.2004.1312471
Google Scholar
[6]
Y. Chen, V. Lau, S. Q. Zhang, P. L. Qiu: Protocol Design and Delay Analysis o Half-Duplex Buffered Cognitive Relay Systems [J]. IEEE Transactions on Wireless Communications, 2010, 9(3): 898-902.
DOI: 10.1109/twc.2010.03.081587
Google Scholar
[7]
D. B. Mohammadi, M. N. Murthi, X. Z. Fan, and P. Kamal: A Distributed Congestion and Power Control Algorithm to Achieve Bounded Average Queuing Delay in Wireless Networks [J]. Telecommunication Systems, 2010, 44(3-4): 307-320.
DOI: 10.1007/s11235-009-9256-8
Google Scholar
[8]
N. B. Mehta, M. Ritesh, A. F. Molisch, J. Y. Zhang: Decentralized and Dynamic Route Selection in Cooperative Relay Networks [J]. Mitsubishi Electric Research Laboratories, Inc. Publication date: 04/27/(2010).
Google Scholar
[9]
B. Wang, C. H. Huang, W. Z. Yang, T. Wang: Trust Opportunistic Routing Protocol in Multi-Hop Wireless Networks [C]. Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010: 563-567.
DOI: 10.1109/wcins.2010.5541842
Google Scholar