Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forward Correction and Fountain codes in Delay Tolerant Networks., and . INFOCOM, page 1899-1907. IEEE, (2009)Decentralized Stochastic Control of Delay Tolerant Networks., , , and . INFOCOM, page 1134-1142. IEEE, (2009)Distributed k-Core Decomposition., , and . IEEE Trans. Parallel Distributed Syst., 24 (2): 288-300 (2013)Joint Traffic Offloading and Aging Control in 5G IoT Networks, , , and . 32th International Teletraffic Congress (ITC 32), Osaka, Japan, (2020)On the Benefits of QoS-Differentiated Posted Pricing in Cloud Computing: An Analytical Model., and . CoRR, (2017)Why neighbourhood matters: interests-driven opportunistic data diffusion schemes., , , , and . Challenged Networks, page 81-88. ACM, (2008)Performance evaluation of a WiMAX testbed under VoIP traffic., , , , and . WINTECH, page 97-98. ACM, (2006)An optimal transmission strategy in zero-sum matrix games under intelligent jamming attacks., , , , , and . Wireless Networks, 25 (4): 1777-1789 (2019)Load balancing combining fractional frequency reuse with unrestricted user association., , , , and . PIMRC, page 1306-1311. IEEE, (2012)Activation games in online dating platforms., , and . ICC Workshops, page 1593-1599. IEEE, (2015)