Author of the publication

Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols.

, , and . IEEE Trans. Wirel. Commun., 6 (10): 3529-3533 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols., , and . IEEE Trans. Wirel. Commun., 6 (10): 3529-3533 (2007)PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT., , , , , and . IEEE Internet Things J., 10 (10): 8547-8559 (May 2023)Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges., , and . IEEE Trans. Ind. Informatics, 19 (1): 867-869 (2023)Analytic models for the latency and steady-state throughput of TCP tahoe, Reno, and SACK., , and . IEEE/ACM Trans. Netw., 11 (6): 959-971 (2003)Unified Detection of Attacks Involving Injection of False Control Commands and Measurements in Transmission Systems of Smart Grids., and . IEEE Trans. Smart Grid, 13 (2): 1598-1610 (2022)Classification and Detection of PMU Data Manipulation Attacks Using Transmission Line Parameters., , and . IEEE Trans. Smart Grid, 9 (5): 5057-5066 (2018)Throughput Guarantee for Maximal Schedulers in Sensor Networks with Cooperative Relays., and . IEEE Trans. Commun., 59 (12): 3265-3271 (2011)A Blockchain and Machine Learning based Framework for Efficient Health Insurance Management., , , and . SenSys, page 511-515. ACM, (2021)Fault Resilient Authentication Architecture for Drone Networks., and . ICC Workshops, page 866-871. IEEE, (2022)PREVENT: A Mechanism for Preventing Message Tampering Attacks in Electric Vehicle Networks., , and . VTC2023-Spring, page 1-5. IEEE, (2023)