(a) An example of attached information in hJam
(b) An example of Back2F
(c) The feature of cycle prefix exploited by CPRecycle
Figure 14: Three interference management schemes through exploiting the OFDM features.