Author of the publication

A discrete-time model for multichannel opportunistic spectrum access based on preempted queuing.

, , and . WCSP, page 1-6. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint spectral-temporal spectrum prediction from incomplete historical observations., , , , , and . GlobalSIP, page 1325-1329. IEEE, (2014)Small cell deployment in licensed/unlicensed band: A local interaction game framework., and . WCSP, page 1-5. IEEE, (2015)Interference-throughput tradeoff in dynamic spectrum access: Analysis based on discrete-time queuing subjected to bursty preemption., , and . CrownCom, page 1-6. IEEE, (2009)Optimal Action Point for Dynamic Spectrum Utilization Under Rayleigh Fading., , , , , , and . Ad Hoc Sens. Wirel. Networks, 17 (1-2): 1-32 (2012)Opportunistic Utilization of Dynamic Multi-UAV in Device-to-Device Communication Networks., , , , , , , and . IEEE Trans. Cogn. Commun. Netw., 6 (3): 1069-1083 (2020)Enterprise Economic Forecasting Method Based on ARIMA-LSTM Model., , , and . INTETAIN, volume 429 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 36-57. Springer, (2021)A robust cooperative spectrum sensing scheme based on Dempster-Shafer theory and trustworthiness degree calculation in cognitive radio networks., , , , , and . EURASIP J. Adv. Signal Process., (2014)Speech Emotion Recognition with MPCA and Kernel Partial Least Squares Regression., , and . J. Comput., 9 (4): 998-1004 (2014)An Improved EMASK Algorithm for Privacy-Preserving Frequent Pattern Mining., , , and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 752-757. Springer, (2005)An Efficient Incremental Algorithm for Frequent Itemsets Mining in Distorted Databases with Granular Computing., and . Web Intelligence, page 913-918. IEEE Computer Society, (2006)