Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rethinking information theory for mobile ad hoc networks., , , , , , , , , and 1 other author(s). IEEE Communications Magazine, 46 (12): 94-101 (2008)Efficiency and Detectability of Random Reactive Jamming in Carrier Sense Wireless Networks., and . IEEE Trans. Commun., 67 (10): 6925-6938 (2019)Exact repair problems with multiple sources., , , and . CISS, page 1-6. IEEE, (2014)Broadcast capacity of a WSN employing power control and limited range dissemination., , and . CISS, page 238-243. IEEE, (2007)Performance of a WSN in the Presence of Channel Variations and Interference., , and . WCNC, page 2899-2904. IEEE, (2008)Impact of sample size on false alarm and missed detection rates in PCA-based anomaly detection., and . CISS, page 1-6. IEEE, (2017)Participation incentives on a wireless random access erasure collision channel., and . NetEcon@EC, page 3:1-3:6. ACM, (2017)A new computational approach for determining rate regions and optimal codes for coded networks., , , and . NetCod, page 1-6. IEEE, (2013)Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas., , and . ICC, page 1-6. IEEE, (2009)A new system for controlled testing of sensor network applications: architecture, prototype and experimental evaluation., , and . Ad Hoc Networks, 10 (6): 1101-1114 (2012)