Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A derivation of the steady-state random-access results without the poisson assumption.. Inf. Sci., 17 (1): 15-21 (1979)MAC games for distributed wireless network security with incomplete information of selfish and malicious user types., , and . GAMENETS, page 130-139. IEEE, (2009)An iterative framework for optimizing multicast throughput in wireless networks., , and . ISIT, page 196-200. IEEE, (2008)Comparison of Two Low Complexity Multiple Access Schemes., and . ISIT, page 2578-2582. IEEE, (2006)Age of Information With Prioritized Streams: When to Buffer Preempted Packets?, , and . ISIT, page 325-329. IEEE, (2019)Power control based admission algorithms for maximizing throughput in DS-CDMA networks with multimedia traffic., and . WCNC, page 631-635. IEEE, (1999)Random access for multiple destinations with physical layer considerations., , and . PIMRC, page 1264-1268. IEEE, (2005)Optimal scheduling for energy harvesting sources on time varying wireless channels., and . Allerton, page 712-718. IEEE, (2011)Age of information performance of multiaccess strategies with packet management., , , and . J. Commun. Networks, 21 (3): 244-255 (2019)Stability of N interacting queues in random-access systems., and . IEEE Trans. Inf. Theory, 45 (5): 1579-1587 (1999)