Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of practical distributed backpressure protocols., , and . ICCCN, page 1-8. IEEE, (2014)Symptotics: a framework for estimating the scalability of real-world wireless networks., , , , and . Wireless Networks, 23 (4): 1063-1083 (2017)Efficient chaff-aided obfuscation in resource constrained environments., , , and . MILCOM, page 97-102. IEEE, (2017)Efficient Power Adaptation against Deep Learning Based Predictive Adversaries., and . WiseML@WiSec, page 37-42. ACM, (2019)Generative Models for Global Collaboration Relationships., , and . CoRR, (2016)Distributed backpressure protocols with limited state feedback., , , , and . MILCOM, page 693-698. IEEE, (2011)Scalability and Satisfiability of Quality-of-Information in Wireless Networks., , , , and . IEEE/ACM Trans. Netw., 26 (1): 398-411 (2018)Location Privacy in Mobile Edge Clouds: A Chaff-based Approach., , , and . CoRR, (2017)Operational information content sum capacity: From theory to practice., , , , , and . Comput. Networks, (2014)Topology control for time-varying contested environments., , , , and . MILCOM, page 1397-1402. IEEE, (2015)