Author of the publication

A Novel Low-Complexity Power-Allocation Algorithm for Multi-Tone Signals for Wireless Power Transfer.

, , and . WCNC, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Type Theoretical Databases., , and . LFCS, volume 9537 of Lecture Notes in Computer Science, page 117-129. Springer, (2016)On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance., , , and . GLOBECOM, page 1-6. IEEE, (2017)Topological representation of geometric theories.. Math. Log. Q., 58 (6): 380-393 (2012)Worst-Case Detection Performance of Physical Layer Authentication Under Optimal MIMO Attacks., and . ICC, page 1-6. IEEE, (2021)Aligning Environment Web Data to the ISO 15926 Oil and Gas Ontology., , , and . CISIS, page 1128-1131. IEEE Computer Society, (2009)Topological Representation of Geometric Theories. (2011)cite arxiv:1109.0699Comment: 32 pages. This is the first pre-print version, the final revised version can be found at http://onlinelibrary.wiley.com/doi/10.1002/malq.201100080/abstract (posting of which is not allowed by Wiley). Changes in v2: updated comments.Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis., , , and . IEEE J. Sel. Areas Commun., 37 (4): 795-808 (2019)First-order logical duality., and . Ann. Pure Appl. Log., 164 (3): 319-348 (2013)Constructive reflectivity Principles for Regular Theories., and . J. Symb. Log., 84 (4): 1348-1367 (2019)Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study., , , , and . ICC, page 1-6. IEEE, (2021)