Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsourced Multiple Access with Common Alarm Messages: Network Slicing for Massive and Critical IoT., , , , , and . CoRR, (2023)Goal-Oriented Scheduling in Sensor Networks With Application Timing Awareness., , , , , and . IEEE Trans. Commun., 71 (8): 4513-4527 (August 2023)Delivering Ultra-Reliable Low-Latency Communications via Statistical Radio Maps., , , , and . CoRR, (2022)Massive Random Access with Common Alarm Messages., , , and . ISIT, page 1-5. IEEE, (2019)Common Message Acknowledgments: Massive ARQ Protocols for Wireless Access., , and . IEEE Trans. Commun., 70 (8): 5258-5270 (2022)Freshness on Demand: Optimizing Age of Information for the Query Process., , , , , , and . ICC, page 1-6. IEEE, (2021)Remote Anomaly Detection in Industry 4.0 Using Resource-Constrained Devices., , , , and . SPAWC, page 251-255. IEEE, (2021)Unsourced Multiple Access for Heterogeneous Traffic Requirements., , , , , and . IEEECONF, page 687-691. IEEE, (2022)Repeat-Authenticate Scheme for Multicasting of Blockchain Information in IoT Systems., , , and . GLOBECOM Workshops, page 1-7. IEEE, (2019)A Decentralized Policy for Minimization of Age of Incorrect Information in Slotted ALOHA Systems., , , and . ICC, page 1688-1693. IEEE, (2023)