Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the gradual deployment of random pairwise key distribution schemes (Extended Version), and . CoRR, (2011)Tight Bounds for the Probability of Connectivity in Random K-out Graphs., and . ICC, page 1-6. IEEE, (2021)k-Connectivity in Random K-Out Graphs Intersecting Erdős-Rényi Graphs., , , and . IEEE Trans. Inf. Theory, 63 (3): 1677-1692 (2017)Zero-One Laws for Connectivity in Random Key Graphs., and . IEEE Trans. Inf. Theory, 58 (5): 2983-2999 (2012)Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures, and Robustness., , , and . IEEE Trans. Parallel Distributed Syst., 23 (9): 1708-1720 (2012)Hybridizing Personal and Impersonal Machine Learning Models for Activity Recognition on Mobile Devices., , , and . MobiCASE, page 117-126. ACM / ICST, (2016)Exact analysis of k-connectivity in secure sensor networks with unreliable links., , and . WiOpt, page 191-198. IEEE, (2015)Active Distribution Learning from Indirect Samples., , and . Allerton, page 1012-1019. IEEE, (2018)Random threshold graphs with exponential fitness: The width of the phase transition for connectivity., and . ISIT, page 61-65. IEEE, (2013)Bond percolation in clustered multilayer networks., and . ACSSC, page 851-555. IEEE, (2015)