Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path optimization for elastic traffic under fairness constraints, , , and . Teletraffic Engineering in the Internet EraProceedings of the International Teletraffic Congress - ITC-I7, volume 4 of Teletraffic Science and Engineering, Elsevier, (2001)A Recursive Formula to Calculate the Steady State of CDMA Networks, and . page 1285-1294. (2005)Fast-Lipschitz Power Control and User-Frequency Assignment in Full-Duplex Cellular Networks., , and . IEEE Trans. Wirel. Commun., 16 (10): 6672-6687 (2017)A Binary Power Control Scheme for D2D Communications., and . IEEE Wirel. Commun. Lett., 4 (6): 669-672 (2015)Benchmarking Practical RRM Algorithms for D2D Communications in LTE Advanced., , , , , and . Wirel. Pers. Commun., 82 (2): 883-910 (2015)Antenna Array Calibration Via Gaussian Process Models., , and . CoRR, (2023)Channel Estimation in RIS-Assisted MIMO Systems Operating Under Imperfections., , , , , and . CoRR, (2022)A Hybrid Model-based and Data-driven Approach to Spectrum Sharing in mmWave Cellular Networks., , , , and . CoRR, (2020)Millimeter Wave Cellular Networks: A MAC Layer Perspective., , , , and . CoRR, (2015)Fingerprinting Codes Under the Weak Marking Assumption., , and . IEEE Trans. Inf. Forensics Secur., 13 (6): 1495-1508 (2018)