Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of practical distributed backpressure protocols., , and . ICCCN, page 1-8. IEEE, (2014)Efficient Power Adaptation against Deep Learning Based Predictive Adversaries., and . WiseML@WiSec, page 37-42. ACM, (2019)Efficient chaff-aided obfuscation in resource constrained environments., , , and . MILCOM, page 97-102. IEEE, (2017)Location Privacy in Mobile Edge Clouds: A Chaff-based Approach., , , and . CoRR, (2017)Distributed backpressure protocols with limited state feedback., , , , and . MILCOM, page 693-698. IEEE, (2011)Security-aware service migration for tactical mobile micro-clouds., , , , and . MILCOM, page 1058-1063. IEEE, (2015)Topology control for time-varying contested environments., , , , and . MILCOM, page 1397-1402. IEEE, (2015)Operational information content sum capacity: From theory to practice., , , , , and . Comput. Networks, (2014)Scalability and satisfiability of quality-of-information in wireless networks., , , , and . WCNC, page 1-6. IEEE, (2016)Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints., , , , , , and . DCOSS, page 209-216. IEEE Computer Society, (2014)