Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

D2D-Based Grouped Random Access to Mitigate Radio Access Network Congestion in Massive Machine-Type Communications., , , , and . CoRR, (2017)Why to Decouple the Uplink and Downlink in Cellular Networks and How To Do It., , , , , , and . CoRR, (2015)Performance Analysis of Distributed Space-Time Block-Encoded Sensor Networks., , , , , and . IEEE Trans. Vehicular Technology, 55 (6): 1776-1789 (2006)Cost-Effective Resource Allocation for Multitier Mobile Edge Computing in 5G Mobile Networks., , , , and . IEEE Access, (2021)Intelligent Bio-Latticed Cryptography: A Quantum-Proof Efficient Proposal., , and . Symmetry, 14 (11): 2351 (2022)LTE-advanced self-organizing network conflicts and coordination algorithms., , , , and . IEEE Wirel. Commun., 22 (3): 108-117 (2015)Simple wireless sensor networking solutions., , , , , , and . IEEE J. Sel. Areas Commun., 28 (7): 969-972 (2010)5G Multi-RAT LTE-WiFi Ultra-Dense Small Cells: Performance Dynamics, Architecture, and Trends., , , , and . IEEE J. Sel. Areas Commun., 33 (6): 1224-1240 (2015)Task-Oriented Metaverse Design in the 6G Era., , , , , , and . CoRR, (2023)Energy Consumption Optimisation for Duty-Cycled Schemes in Shadowed Environments., , , and . IJDSN, (2014)