Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of Transmission Opportunity Limit on Transmission Time Modeling in 802.11e., , and . IPOM, volume 4786 of Lecture Notes in Computer Science, page 156-167. Springer, (2007)Trust-based authentication scheme with user rating for low-resource devices in smart environments., , , and . Personal and Ubiquitous Computing, 17 (5): 1013-1023 (2013)WiFi Dimensioning to offload LTE in 5G Networks., , , and . CCWC, page 521-526. IEEE, (2019)Towards a robust privacy and anonymity preserving architecture for ubiquitous computing., , , and . CRiSIS, page 125-132. IEEE, (2008)The Design of Fast Asynchronous Adder Structures and their Implementation Using D.C.V.S. Logic., and . ISCAS, page 291-294. IEEE, (1994)A Fine-Grain Asynchronous VLSI Cellular Array Processor Architecture., , , and . ISCAS, page 1041-1044. IEEE, (1995)A complete and accurate analytical model for 802.11e EDCA under saturation conditions., , and . AICCSA, page 800-807. IEEE Computer Society, (2009)Impact of Playout Buffering on Mobile TV Performance., , , and . IEEE Trans. Mob. Comput., 15 (2): 377-391 (2016)Accurate and Low-Complexity Auto-Fingerprinting for Enhanced Reliability of Indoor Localization Systems., , , , , and . Sensors, 21 (16): 5346 (2021)Stability Analysis of the RC-PLMS Adaptive Beamformer Using a Simple Transfer Function Approximation., , , and . ICASSP, page 4645-4649. IEEE, (2021)