Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A game-theoretic approach for joint channel and power allocation in downlink of cellular cognitive radio networks., and . PIMRC, page 1198-1202. IEEE, (2012)Two dimensional MMSE-DFE for space-time coded wideband CDMA., and . WCNC, page 1216-1221. IEEE, (2004)An incentive-based leader selection mechanism for mobile ad-hoc networks (MANETs)., , , , , and . Wireless Days, page 1-6. IEEE, (2013)Delay-constrained utility maximisation in multi-hop random access networks., and . IET Commun., 4 (16): 1908-1918 (2010)Linear Decoupled and Quasi-Decoupled Space-Time Codes., , and . IEEE Trans. Commun., 55 (1): 54-59 (2007)Performance Analysis of Heterogeneous Cellular Caching Networks With Overlapping Small Cells., , , and . IEEE Trans. Veh. Technol., 71 (2): 1941-1951 (2022)Optimal Utility-Energy Tradeoff in Delay Constrained Random Access Networks., , and . ICC, page 1-5. IEEE, (2009)Asymptotic analysis of error probability and outage behavior of equal-gain combining., , and . PIMRC, page 868-872. IEEE, (2009)Secure consensus averaging for secure information fusion in sensor networks., , , and . ISSPA, page 1-4. IEEE, (2007)Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain., , , and . CoRR, (2023)