Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making 802.11 DCF near-optimal: Design, implementation, and evaluation., , , , , and . SECON, page 86-94. IEEE, (2013)Power of Bonus in Pricing for Crowdsourcing., , , and . SIGMETRICS (Abstracts), page 43-44. ACM, (2022)Implementing utility-optimal CSMA., , , , , and . Allerton, page 102-111. IEEE, (2009)Disentangling Sources of Risk for Distributional Multi-Agent Reinforcement Learning., , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 20347-20368. PMLR, (2022)Estimating the rumor source with anti-rumor in social networks., , , and . ICNP, page 1-6. IEEE Computer Society, (2016)Fast Coper for Broadband Access: An Overview., , , , , and . ICASSP (4), page 1345-1348. IEEE, (2007)Throughput of random access without message passing., , and . CISS, page 509-514. IEEE, (2008)On the stability of ISPs' coalition structure: Shapley value based revenue sharing., , , and . CISS, page 1-6. IEEE, (2012)Iterative Bayesian Learning for Crowdsourced Regression., , , , and . AISTATS, volume 89 of Proceedings of Machine Learning Research, page 1486-1495. PMLR, (2019)REFIM: A Practical Interference Management in Heterogeneous Wireless Access Networks., , , and . IEEE J. Sel. Areas Commun., 29 (6): 1260-1272 (2011)