Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Threshold Times for k-Resilient Protocols., , and . ICPP (2), page 24-27. CRC Press, (1992)Redefining passive in backscattering with commodity devices., , , , and . MobiCom, page 3:1-3:13. ACM, (2020)A Robust Distributed Mutual Exclusion Algorithm., and . WDAG, volume 579 of Lecture Notes in Computer Science, page 295-308. Springer, (1991)Fairness in dead-reckoning based distributed multi-player games., , , and . NETGAMES, page 1-10. ACM, (2005)Discovery of BGP MPLS VPNs., , and . DSOM, volume 3775 of Lecture Notes in Computer Science, page 193-205. Springer, (2005)Adaptive beamforming algorithms for wireless link layer multicasting., , , and . PIMRC, page 1994-1998. IEEE, (2011)Novel combinatorial results on downlink MU-MIMO scheduling with applications., , , and . WONS, page 152-159. IEEE, (2017)Orchestrating the Data-Plane of Virtual LTE Core Networks., , , , , and . SECON, page 1-9. IEEE, (2017)Overhead-throughput tradeoff in cooperative cognitive radio networks., , and . WCNC, page 739-744. IEEE, (2009)Exploring the potential for full-duplex in legacy LTE systems., , , , and . SECON, page 10-18. IEEE, (2014)