Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Runtime Minimization of the Threshold Distributed Computation Protocol in the Case of Participants Failures., , and . NEW2AN, volume 11660 of Lecture Notes in Computer Science, page 295-304. Springer, (2019)Statistical Analysis and Modeling of User Micromobility for THz Cellular Communications., , , , and . IEEE Trans. Veh. Technol., 71 (1): 725-738 (2022)An efficient multiplication-free and look-up table-free adaptive binary arithmetic coder., , , and . ICIP, page 701-704. IEEE, (2012)Achievability Bounds for T-Fold Irregular Repetition Slotted ALOHA Scheme in the Gaussian MAC., , , , and . WCNC, page 1-6. IEEE, (2019)Upper bound and approximation of random access throughput over chase combining HARQ., , , , , and . ICUMT, page 143-147. IEEE, (2017)eMBMS LTE usage to deliver mobile data., , and . ICUMT, page 60-65. IEEE, (2014)Wireless Broadband Access: WiMAX and Beyond - Investigation of Bandwidth Request Mechanisms under Point-to-Multipoint Mode of WiMAX Networks., , , , and . IEEE Commun. Mag., 45 (5): 132-138 (2007)Achievability Bounds for T-Fold Irregular Repetition Slotted ALOHA Scheme in the Gaussian Multiple Access Channel., , , and . CoRR, (2018)Stability and instability of a random multiple access model with adaptive energy harvesting., , and . CoRR, (2016)Interrelation of characteristics of blocked RMA stack algorithms., and . Probl. Inf. Transm., 43 (4): 344-352 (2007)