Author of the publication

An Afterstates Reinforcement Learning Approach to Optimize Admission Control in Mobile Cellular Networks.

, , and . EuroNGI Workshop, volume 3883 of Lecture Notes in Computer Science, page 115-129. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network-Coded Cooperation and Multi-Connectivity for Massive Content Delivery., , , , , , and . IEEE Access, (2020)Cooperative or non-cooperative transmission in synchronous DC WSNs: A DTMC-based approach., , and . ICC, page 1-6. IEEE, (2017)Performance analysis of access class barring for handling massive M2M traffic in LTE-A networks., , , , and . ICC, page 1-6. IEEE, (2016)Optimal robust policies for bandwidth allocation and admission control in wireless networks., , and . Comput. Networks, 52 (17): 3258-3272 (2008)Algorithmic Computation of Optimal Capacity in Multiservice MobileWireless Networks., , and . IEICE Trans. Commun., 88-B (2): 797-799 (2005)Efficient Method to Approximately Solve Retrial Systems with Impatience., , , , and . J. Appl. Math., (2012)Discrete-Time Analysis of Cognitive Radio Networks with Nonsaturated Source of Secondary Users., , , and . Wirel. Commun. Mob. Comput., (2019)Hierarchical Admission Control in Mobile Cellular Networks Using Adaptive Bandwidth Reservation., , , and . EuroNGI Workshop, volume 3883 of Lecture Notes in Computer Science, page 130-144. Springer, (2005)Solving Multiserver Systems with Two Retrial Orbits Using Value Extrapolation: A Comparative Perspective., , , , and . ASMTA, volume 5513 of Lecture Notes in Computer Science, page 56-70. Springer, (2009)Discrete Time Analysis of Cognitive Radio Networks with Saturated Source of Secondary Users., , , and . Networking Workshops, volume 6827 of Lecture Notes in Computer Science, page 3-12. Springer, (2011)