Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The SHIELD framework: How to control Security, Privacy and Dependability in complex systems., , and . COMPENG, page 1-4. IEEE, (2012)A Future Internet interface to control programmable networks., , , , , , and . MED, page 242-248. IEEE, (2015)Mobility management procedures for a global mobile broadband system., and . Space Communications, 19 (1): 1-16 (2003)Load-adaptive bandwidth-on-demand protocol for satellite networks., and . CDC, page 4066-4071. IEEE, (2002)Optimal Control of Connection Admission in telecommunication networks., , , and . ECC, page 2929-2935. IEEE, (2009)Handling of user mobility in a CDMA cellular network., and . PIMRC, page 635-639. (1994)A dissipativity-based approach to output regulation of non-minimum-phase systems., , and . Syst. Control. Lett., 58 (8): 584-591 (2009)Fixed and adaptive blocking thresholds in CDMA cellular networks., and . IEEE Wirel. Commun., 5 (2): 56-63 (1998)Enhancing the Performance of a Second Generation Cellular Network in a Realistic GSM Environment., , , and . ICC (1), page 86-90. IEEE, (1997)Capacity-constrained Wardrop equilibria and application to multi-connectivity in 5G networks., , , and . J. Frankl. Inst., 358 (17): 9364-9384 (2021)