Author of the publication

Cognitive Medium Access: Exploration, Exploitation, and Competition.

, , , and . IEEE Trans. Mob. Comput., 10 (2): 239-253 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random noise SAR based on compressed sensing., , , , , and . IGARSS, page 4624-4627. IEEE, (2010)Performance Analysis of Wireless Powered Incremental Relaying Networks With an Adaptive Harvest-Store-Use Strategy., and . IEEE Access, (2018)Two-Way Relay Selection for Millimeter Wave Networks., , and . IEEE Communications Letters, 22 (1): 201-204 (2018)Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 772-779. IEEE, (2018)Intelligent Interference Engineering for Secure Non-Orthogonal Multiple Access., , , , , and . CoRR, (2020)Parallel implementations of Dynamic Traffic Assignment models., , , and . SMC, page 1246-1252. IEEE, (2003)On Improving Thread Migration: Safety and Performance., and . HiPC, volume 2552 of Lecture Notes in Computer Science, page 474-484. Springer, (2002)Adaptation Strategies for Application-Level Computation Migration/Checkpointing., , and . PDPTA, page 1156-1169. CSREA Press, (2005)CSPA: An Adder Faster Than Carry-Lookahead., and . CDES, page 17-22. CSREA Press, (2008)On Load Balancing Distributed Simulation of Relativistic Particle Transport., , , , and . PDPTA, page 261-269. CSREA Press, (2008)