Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keynote Speaker.. WiOpt, page 1. IEEE, (2007)Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos., , , , and . CoRR, (2018)Aperator: Making Tweets Enable Actionable Commands on Third Party Web Applications., , and . WebApps, page 101-106. USENIX Association, (2012)Virtualized Control Over Fog: Interplay Between Reliability and Latency., , and . IEEE Internet of Things Journal, 5 (6): 5030-5045 (2018)On the Efficiency of Online Social Learning Networks., , , , , , , , and . IEEE/ACM Trans. Netw., 26 (5): 2076-2089 (2018)Learner Behavioral Feature Refinement and Augmentation Using GANs., , , , and . AIED (2), volume 10948 of Lecture Notes in Computer Science, page 41-46. Springer, (2018)Personalized augmented reality via fog-based imitation learning., , , and . IoT-Fog@IoTDI, page 11-15. ACM, (2019)Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Cross-Layer Design Approach., , and . ICC, page 3511-3516. IEEE, (2006)Maximizing sum rate and minimizing MSE on multiuser downlink: Optimality, fast algorithms and equivalence via max-min SIR., , and . ISIT, page 2669-2673. IEEE, (2009)Matching air-interface with backbone: end-to-end resource allocation in hybrid networks.. ISIT, page 321. IEEE, (2004)