Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protocol coding for reliable wireless bits under jamming: Concept and experimental validation., , , , and . MILCOM, page 113-118. IEEE, (2011)Reliable and Efficient Access for Alarm-Initiated and Regular M2M Traffic in IEEE 802.11ah Systems., , and . IEEE Internet of Things Journal, 3 (5): 673-682 (2016)An Empirical NB-IoT Power Consumption Model for Battery Lifetime Estimation., , , and . VTC Spring, page 1-5. IEEE, (2018)A Tractable Model of the LTE Access Reservation Procedure for Machine-Type Communications., , , , and . GLOBECOM, page 1-6. IEEE, (2015)Massive M2M access with reliability guarantees in LTE systems., , , and . ICC, page 2997-3002. IEEE, (2015)A Modelling and Experimental Framework for Battery Lifetime Estimation in NB-IoT and LTE-M., , , , , , , and . CoRR, (2021)Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid., , , , , and . CoRR, (2015)Reengineering GSM/GPRS Towards a Dedicated Network for Massive Smart Metering., , and . CoRR, (2014)Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems., , and . CoRR, (2017)Random Access for Machine-Type Communication based on Bloom Filtering., , , and . CoRR, (2015)