Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Closed Form Solutions for Symmetric Water Filling Games., , and . INFOCOM, page 673-681. IEEE, (2008)The Case for Non-Cooperative Multihoming of Users to Access Points in IEEE 802.11 WLANs., , and . INFOCOM, IEEE, (2006)Maximum Damage Malware Attack in Mobile Wireless Networks., , and . INFOCOM, page 749-757. IEEE, (2010)Optimal Activation and Transmission Control in Delay Tolerant Networks., , , and . INFOCOM, page 106-110. IEEE, (2010)A game theory framework for a distributed and energy efficient bandwidth expansion process., , , and . INFOCOM Workshops, page 712-717. IEEE, (2014)Risk sensitive optimal control framework applied to delay tolerant networks., , , , and . INFOCOM, page 3146-3154. IEEE, (2011)A dynamic game solution to malware attack., , and . INFOCOM, page 2138-2146. IEEE, (2011)The Distribution of Delays of Dispersed Messages in an M/M/1 Queue., and . INFOCOM, page 338-344. IEEE Computer Society, (1995)New insights from a fixed point analysis of single cell IEEE 802.11 WLANs., , , and . INFOCOM, page 1550-1561. IEEE, (2005)Predicting popularity dynamics of online contents using data filtering methods., , , , and . Allerton, page 31-38. IEEE, (2016)