Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cascading Attacks on Wi-Fi Networks with Weak Interferers., and . MSWiM, page 255-258. ACM, (2018)Exploiting multi-Channel diversity to speed up over-the-air programming of wireless sensor networks., and . SenSys, page 292-293. ACM, (2005)Channel Sensitivity of LIFO-Backpressure: Quirks and Improvements., , , , and . IEEE Trans. Control. Netw. Syst., 3 (2): 192-205 (2016)Benchmarking the Physical Layer of Wireless Cards using Software-Defined Radios., , , and . MSWiM, page 271-278. ACM, (2019)Strategic Revenue Management of Preemptive versus Non-Preemptive Queues., and . CoRR, (2020)Dynamic Pricing of Preemptive Service for Secondary Demand., , , and . IEEE Trans. Cogn. Commun. Netw., 2 (2): 208-222 (2016)A case study of a shared/buy-in computing ecosystem., , , , and . Clust. Comput., 21 (3): 1595-1606 (2018)Advance Reservation Games., and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 2 (2): 10:1-10:21 (2017)Joint monitoring and routing in wireless sensor networks using robust identifying codes., , , and . BROADNETS, page 197-206. IEEE, (2007)Jamming-resistant rate control in Wi-Fi networks., and . GLOBECOM, page 1048-1053. IEEE, (2012)