Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput of random access without message passing., , and . CISS, page 509-514. IEEE, (2008)Virtualized Control Over Fog: Interplay Between Reliability and Latency., , and . IEEE Internet of Things Journal, 5 (6): 5030-5045 (2018)Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos., , , , and . CoRR, (2018)On the Efficiency of Online Social Learning Networks., , , , , , , , and . IEEE/ACM Trans. Netw., 26 (5): 2076-2089 (2018)Personalized augmented reality via fog-based imitation learning., , , and . IoT-Fog@IoTDI, page 11-15. ACM, (2019)Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing., , , and . INFOCOM, page 28-36. IEEE, (2015)Distributed Uplink Power Control for Optimal SIR Assignment in Cellular Data Networks., , and . INFOCOM, IEEE, (2006)Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management., , , and . INFOCOM, page 938-946. IEEE, (2010)A non-cooperative power control game for multi-carrier CDMA systems., , , , and . WCNC, page 606-611. IEEE, (2005)RAT selection games in HetNets., , , and . INFOCOM, page 998-1006. IEEE, (2013)