Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Learning in a Contract Selection Problem, and . CoRR, (2013)Sufficient Conditions on the Optimality of Myopic Sensing in Opportunistic Channel Access: A Unifying Framework., , and . CoRR, (2013)On the Many-to-One Transport Capacity of a Dense Wireless Sensor Network and the Compressibility of Its Data., , , and . IPSN, volume 2634 of Lecture Notes in Computer Science, page 1-16. Springer, (2003)Ripple-2: a non-collaborative, asynchronous, and open architecture for highly-scalable and low duty-cycle WSNs., , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 17 (1): 55-60 (2013)Optimal Stochastic Routing in Low Duty-Cycled Wireless Sensor Networks., and . Internet Math., 9 (2-3): 161-198 (2013)Embracing and controlling risk dependency in cyber-insurance policy underwriting., , and . J. Cybersecur., 5 (1): tyz010 (2019)Optimal relay selection with non-negligible probing time., , and . ICC, page 2227-2232. IEEE, (2015)Opting Out of Incentive Mechanisms: A Study of Security as a Non-Excludable Public Good., and . IEEE Trans. Inf. Forensics Secur., 11 (12): 2790-2803 (2016)Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries., , and . J. Comput. Networks Commun., (2012)Adversarial Objects Against LiDAR-Based Autonomous Driving Systems., , , , , , and . CoRR, (2019)