Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Access Communications With Energy Harvesting: A Multi-Armed Bandit Model and the Optimality of the Myopic Policy., and . IEEE J. Sel. Areas Commun., 33 (3): 585-597 (2015)Guest Editorial Special Issue on Machine Learning in Wireless Communication - Part 2., , , , , and . IEEE J. Sel. Areas Commun., 37 (11): 2409-2412 (2019)Management and Orchestration of Virtual Network Functions via Deep Reinforcement Learning., , and . IEEE J. Sel. Areas Commun., 38 (2): 304-317 (2020)A Reinforcement-Learning Approach to Proactive Caching in Wireless Networks., , and . IEEE J. Sel. Areas Commun., 36 (6): 1331-1344 (2018)On the capacity region of a multiple access channel with common messages., and . ISIT, page 470-474. IEEE, (2010)Energy-distortion tradeoff for the gaussian broadcast channel with feedback., , , and . ISIT, page 1829-1833. IEEE, (2016)Systematic lossy source transmission over Gaussian time-varying channels., and . ISIT, page 1-5. IEEE, (2013)Joint source-channel coding for the multiple-access relay channel., , and . ISIT, page 1937-1941. IEEE, (2012)Reliable Cooperative Source Transmission with Side Information., and . ITW, page 1-5. IEEE, (2007)Throughput and delay analysis in video streaming over block-fading channels., , and . ICC, page 5578-5582. IEEE, (2013)