Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart office lighting control using occupancy sensors., , and . ICNSC, page 453-458. IEEE, (2017)Joint illumination and visible-Light Communication systems: Data rates and extra power consumption., , , , and . ICC Workshops, page 1380-1386. IEEE, (2015)Editorial introduction., and . Wireless Personal Communications, 2 (1-2): 1-7 (1995)Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes., , , and . IACR Cryptology ePrint Archive, (2012)Peak restoration in ofdm receiver with clipping a/d converter., and . IEEE Trans. Wirel. Commun., 7 (12-2): 5177-5181 (2008)Full MIMO Spatial Filtering Approach for Dynamic Range Reduction in Wideband Cognitive Radios., , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 59-I (11): 2761-2773 (2012)Virtual cellular network: a new wireless communications architecture with multiple access ports., and . VTC, page 1055-1059. IEEE, (1994)Personalized Circadian Light: A Digital Siblings Approach., and . Intelligent Environments (Workshops), volume 29 of Ambient Intelligence and Smart Environments, page 61-70. IOS Press, (2021)Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication., , , and . SECRYPT, page 506-511. SciTePress, (2013)Dynamic Performance Analysis of IEEE 802.15.4 Networks under Intermittent Wi-Fi Interference., , and . PIMRC, page 1-7. IEEE, (2018)