Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

p2-Cycles: p-Cycles with parasitic protection links., and . Opt. Switch. Netw., 10 (4): 312-326 (2013)Reinforcement Learning Architectures: SAC, TAC, and ESAC., , and . CoRR, (2020)Request Prediction in Cloud with a Cyclic Window Learning Algorithm., , and . CoRR, (2015)A Measurement Study of TVWS Wireless Channels in Crop Farms., , , , , , , and . MASS, page 344-354. IEEE, (2021)Algorithms for multicast traffic grooming in WDM mesh networks.. IEEE Commun. Mag., 44 (11): 96-105 (2006)The Continuation-Bit Approach and the pi-Persistent Protocol for Scheduling Variable-Length Messages on Slotted, High-Speed, Fiber Optic LANs/MANs., and . Comput. Networks ISDN Syst., 26 (6-8): 721-744 (1994)Joint Bandwidth and Power Allocation for MIMO Two-Way Relays-Assisted Overlay Cognitive Radio Systems., , , , and . IEEE Trans. Cogn. Commun. Netw., 1 (4): 383-393 (2015)Adding Active Elements to Reconfigurable Intelligent Surfaces to Enhance Energy Harvesting for IoT Devices., , and . MILCOM, page 297-302. IEEE, (2021)Post-Disaster 4G/5G Network Rehabilitation Using Drones: Solving Battery and Backhaul Issues., and . GLOBECOM Workshops, page 1-6. IEEE, (2018)CSMA/CD with Two Persistence Factors: A Unified Performance Model for CSMA/CD.. INFOCOM, page 152-162. IEEE Computer Society, (1989)