Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput Maximization in Multi-Hop Wireless Networks under Secrecy Constraint., , , and . CoRR, (2015)Contention-based Geographic Forwarding Strategies for Wireless Sensors Networks., , , and . CoRR, (2015)Clusterization for Robust Geographic Routing in Wireless Sensor Networks., and . WCNC, page 2385-2390. IEEE, (2008)On the Secrecy of Interference-Limited Networks under Composite Fading Channels., , , , and . IEEE Signal Process. Lett., 22 (9): 1306-1310 (2015)Effects of Relay Selection Strategies on the Spectral Efficiency of Wireless Systems With Half- and Full-Duplex Nodes., , , and . IEEE Trans. Veh. Technol., 66 (8): 7578-7583 (2017)A Functional Architecture for 6G Special-Purpose Industrial IoT Networks., , , , , and . IEEE Trans. Ind. Informatics, 19 (3): 2530-2540 (March 2023)Modeling and analysis of handover failure probability in small cell networks., , and . INFOCOM Workshops, page 736-741. IEEE, (2014)Hybrid Half- and Full-Duplex Communications under Correlated Lognormal Shadowing., , , and . VTC Spring, page 1-5. IEEE, (2015)Full-duplex communications in interference networks under composite fading channel., , , and . EuCNC, page 1-5. IEEE, (2014)Throughput maximization in multi-hop wireless networks under a secrecy constraint., , , and . Comput. Networks, (2016)