Author of the publication

Optimal Power Allocation and Scheduling Under Jamming Attacks.

, , and . IEEE/ACM Trans. Netw., 25 (3): 1310-1323 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Layer-Independent Architecture for a Testing System of Protocol Implementations., , and . Protocol Specification, Testing, and Verification, page 393-406. North-Holland, (1983)Performance evaluation of a tree-based rerouting architecture in a wireless local access network., , , and . ICC, page 359-363. IEEE, (1999)An Adaptive Policing Mechanism for a DQDB MAN., , , , and . Comput. Networks ISDN Syst., 25 (10): 1119-1126 (1993)On the efficiency and trustworthiness of DHT-based P2P search algorithms in mobile wireless networks., , and . ICUMT, page 1-8. IEEE, (2009)A MOS-Based Routing Approach for Wireless Mesh Networks., , , and . ICC, page 1-6. IEEE, (2011)Congestion control for ABR traffic in satellite networks., and . Comput. Networks, 37 (3/4): 237-249 (2001)SD-WISE: A Software-Defined WIreless SEnsor network., , , , and . Comput. Networks, (2019)The programmatic interface - access to OSI., and . Comput. Commun., 7 (2): 79-84 (1984)A timing channel-based MAC protocol for energy-efficient nanonetworks., , , and . Nano Commun. Networks, 6 (2): 39-50 (2015)Timely and energy-efficient communications in rural infostation systems., , , and . IEEE Wirel. Commun., 15 (3): 48-53 (2008)