Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Alpcan, Tansu
add a person with the name Alpcan, Tansu
 

Other publications of authors with the same name

Defending Regression Learners Against Poisoning Attacks., , , , and . CoRR, (2020)A Game-Theoretic Analysis of Energy Efficiency and Performance for Cloud Computing in Communication Networks., , and . IEEE Syst. J., 11 (2): 649-660 (2017)A hybrid systems model for power control in multicell wireless data networks., and . Perform. Evaluation, 57 (4): 477-495 (2004)Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing., , , and . IEEE Trans. Dependable Secur. Comput., 14 (1): 95-108 (2017)An Information Analysis of Iterative Algorithms for Network Utility Maximization and Strategic Games., , , and . IEEE Trans. Control. Netw. Syst., 6 (1): 151-162 (2019)Fog Computing May Help to Save Energy in Cloud Computing., , , , and . IEEE J. Sel. Areas Commun., 34 (5): 1728-1739 (2016)Dual Control with Active Learning using Gaussian Process Regression. CoRR, (2011)Can we measure the difficulty of an optimization problem?, , and . ITW, page 356-360. IEEE, (2014)A lightweight biometric signature scheme for user authentication over networks., , , , , and . SecureComm, page 33. ACM, (2008)Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning., , , , and . LCN, page 469-472. IEEE, (2018)