23 results in Wireless Device-to-Device Communications and Networks
Part V - Standardization of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 369-370
-
- Chapter
- Export citation
Dedication
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp v-vi
-
- Chapter
- Export citation
Part II - Techniques for modeling and analysis of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 17-18
-
- Chapter
- Export citation
1 - Basics of D2D communications
- from Part I - Introduction
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 3-16
-
- Chapter
- Export citation
3 - Game theory
- from Part II - Techniques for modeling and analysis of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 67-126
-
- Chapter
- Export citation
6 - Subchannel allocation and time-domain scheduling for D2D communications
- from Part III - Resource management, cross-layer design, and security for D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 173-204
-
- Chapter
- Export citation
Part I - Introduction
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 1-2
-
- Chapter
- Export citation
Preface
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp xv-xviii
-
- Chapter
- Export citation
Part III - Resource management, cross-layer design, and security for D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 127-128
-
- Chapter
- Export citation
8 - Security for D2D communications
- from Part III - Resource management, cross-layer design, and security for D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 237-252
-
- Chapter
- Export citation
4 - Mode selection and resource allocation for D2D communications underlaying cellular networks
- from Part III - Resource management, cross-layer design, and security for D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 129-159
-
- Chapter
- Export citation
Contents
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp vii-xiv
-
- Chapter
- Export citation
12 - Network-controlled D2D over LTE/LTE-A
- from Part V - Standardization of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 371-389
-
- Chapter
- Export citation
10 - Mobile social networks
- from Part IV - Applications of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 294-337
-
- Chapter
- Export citation
11 - Machine-to-machine (M2M) communications
- from Part IV - Applications of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 338-368
-
- Chapter
- Export citation
References
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 390-411
-
- Chapter
- Export citation
2 - Optimization
- from Part II - Techniques for modeling and analysis of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 19-66
-
- Chapter
- Export citation
Part IV - Applications of D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 253-254
-
- Chapter
- Export citation
Index
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 412-418
-
- Chapter
- Export citation
7 - Cross-layer design for device-to-device communication
- from Part III - Resource management, cross-layer design, and security for D2D communications
-
- Book:
- Wireless Device-to-Device Communications and Networks
- Published online:
- 05 March 2015
- Print publication:
- 12 March 2015, pp 205-236
-
- Chapter
- Export citation