Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing Threshold Times for k-Resilient Protocols., , and . ICPP (2), page 24-27. CRC Press, (1992)Adaptive beamforming algorithms for wireless link layer multicasting., , , and . PIMRC, page 1994-1998. IEEE, (2011)Probabilistic Diagnosis Algorithms Tailored to System Topology., and . FTCS, page 230-239. IEEE Computer Society, (1991)Orchestrating the Data-Plane of Virtual LTE Core Networks., , , , , and . SECON, page 1-9. IEEE, (2017)Exploring the potential for full-duplex in legacy LTE systems., , , , and . SECON, page 10-18. IEEE, (2014)Discovery of BGP MPLS VPNs., , and . DSOM, volume 3775 of Lecture Notes in Computer Science, page 193-205. Springer, (2005)PG-Sensing: Progressive Out-of-Band Spectrum Sensing for Cognitive Radio., , and . GLOBECOM, page 1-5. IEEE, (2011)A Robust Distributed Mutual Exclusion Algorithm., and . WDAG, volume 579 of Lecture Notes in Computer Science, page 295-308. Springer, (1991)Overhead-throughput tradeoff in cooperative cognitive radio networks., , and . WCNC, page 739-744. IEEE, (2009)Adaptive resource scheduling in wireless OFDMA relay networks., and . INFOCOM, page 1080-1088. IEEE, (2012)