Author of the publication

Bridging the Gap between Protocol and Physical Models for Wireless Networks.

, , , and . IEEE Trans. Mob. Comput., 12 (7): 1404-1416 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Multicast Throughput in Multihop MIMO Networks With Interference Alignment., , , , , , and . IEEE Trans. Veh. Technol., 67 (7): 6627-6641 (2018)Potential Singularity of the 3D Euler Equations in the Interior Domain.. Found. Comput. Math., 23 (6): 2203-2249 (December 2023)Achieving Real-Time Spectrum Sharing in 5G Underlay Coexistence With Channel Uncertainty., , , , , , and . IEEE Trans. Mob. Comput., 22 (4): 1922-1937 (April 2023)Multiscale Elliptic PDE Upscaling and Function Approximation via Subsampled Data., and . Multiscale Model. Simul., 20 (1): 188-219 (2022)Toward privacy-assured and searchable cloud data storage services., , , , and . IEEE Netw., 27 (4): 1-0 (2013)Memory Forensic Challenges Under Misused Architectural Features., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (9): 2345-2358 (2018)Multiscale modeling of incompressible turbulent flows., , and . J. Comput. Phys., 232 (1): 383-396 (2013)MANDA: On Adversarial Example Detection for Network Intrusion Detection System., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1139-1153 (March 2023)Location Based Handshake and Private Proximity Test with Location Tags., , , and . IEEE Trans. Dependable Secur. Comput., 14 (4): 406-419 (2017)A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing., , , , , and . IEEE Internet Things J., 5 (4): 2971-2992 (2018)