Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some Cryptographic Aspects of Womcodes., and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 458-467. Springer, (1985)Power allocation and control for the downlink in cellular CDMA networks., , and . PIMRC, page C29-C33. IEEE, (2002)Scheduling algorithms for soft handoff in cellular packet CDMA., , , and . PIMRC, page 671-675. IEEE, (2000)Inter-operator spectrum sharing for cellular networks using game theory., , and . PIMRC, page 425-429. IEEE, (2009)Effects of circuit switched transmissions over GPRS performance., and . MSWiM, page 20-26. ACM, (2000)Replication decoding., , and . IEEE Trans. Inf. Theory, 25 (3): 332-345 (1979)Optimal Relay Placement in Cellular Networks., , , , , and . IEEE Trans. Wirel. Commun., 13 (2): 998-1009 (2014)SIR distribution analysis in cellular networks considering the joint impact of path-loss, shadowing and fast fading., , , and . EURASIP J. Wirel. Commun. Netw., (2011)Key Minimal Authentication Systems for Unconditional Secrecy., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 497-501. Springer, (1989)Dynamic Subcarrier Reuse With Rate Guaranty in a Downlink Multicell OFDMA System., , and . PIMRC, page 1-5. IEEE, (2006)