Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why Rely on Blind AIMDs?, , and . Networking, volume 5550 of Lecture Notes in Computer Science, page 404-415. Springer, (2009)On the Error Analysis of Fixed-Gain Relay Networks over Composite Multipath/Shadowing Channels., , and . VTC Spring, page 1-5. IEEE, (2013)Weighted Average Energy Efficiency Contours for Uplink Channels., , , and . VTC Fall, page 1-5. IEEE, (2013)Measurement threshold configuration scheme based on the traffic load., , and . IET Commun., 8 (12): 2085-2094 (2014)Power-and-Index based Multiple Access for V2X Networks., , , and . VTC Spring, page 1-6. IEEE, (2020)An evaluation of routing in vehicular networks using analytic hierarchy process., , , and . Wirel. Commun. Mob. Comput., 16 (8): 895-911 (2016)Review of Graph-Based Hazardous Event Detection Methods for Autonomous Driving Systems., , , and . IEEE Trans. Intell. Transp. Syst., 24 (5): 4697-4715 (May 2023)Outage Probability and Throughput of SWIPT Relay Networks with Differential Modulation., , , and . VTC Fall, page 1-6. IEEE, (2017)Asynchronous Multi-Channel MAC for Vehicular Ad Hoc Networks., , , and . VNC, page 109-115. IEEE, (2011)Opportunistic Scheduling with Reduced Feedback., and . VTC Fall, page 1-5. IEEE, (2010)