Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Investment Strategies for Competing Camps in a Social Network: A Broad Framework., , , and . IEEE Trans. Network Science and Engineering, 6 (4): 628-645 (2019)Acquisition Games with Partial-Asymmetric Information., , and . Allerton, page 639-646. IEEE, (2019)The Distribution of Delays of Dispersed Messages in an M/M/1 Queue., and . INFOCOM, page 338-344. IEEE Computer Society, (1995)A game theory framework for a distributed and energy efficient bandwidth expansion process., , , and . INFOCOM Workshops, page 712-717. IEEE, (2014)The Case for Non-Cooperative Multihoming of Users to Access Points in IEEE 802.11 WLANs., , and . INFOCOM, IEEE, (2006)Maximum Damage Malware Attack in Mobile Wireless Networks., , and . INFOCOM, page 749-757. IEEE, (2010)Optimal Activation and Transmission Control in Delay Tolerant Networks., , , and . INFOCOM, page 106-110. IEEE, (2010)New insights from a fixed point analysis of single cell IEEE 802.11 WLANs., , , and . INFOCOM, page 1550-1561. IEEE, (2005)Risk sensitive optimal control framework applied to delay tolerant networks., , , , and . INFOCOM, page 3146-3154. IEEE, (2011)A dynamic game solution to malware attack., , and . INFOCOM, page 2138-2146. IEEE, (2011)