Author of the publication

Opportunistic spectrum access in multi-user multi-channel cognitive radio networks.

, , and . EUSIPCO, page 1229-1233. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary Programming in a Distributed Packet Scheduling Architecture., , and . CAINE, page 230-233. ISCA, (2003)Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs., , , , , and . ICC, page 1-7. IEEE, (2018)Physical layer security in wireless cooperative relay networks: state of the art and beyond., , , , , and . IEEE Communications Magazine, 53 (12): 32-39 (2015)Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels., and . Intelligent Vehicles Symposium, page 957-962. IEEE, (2014)Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems., , , , and . WCNC, page 1942-1947. IEEE, (2015)Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks., and . Int. J. Grid High Perform. Comput., 8 (2): 94-110 (2016)Dynamic Spectrum Access for Wireless Networks, , and . Springer Briefs in Electrical and Computer Engineering Springer, (2015)TCP Venoplus - A cross-layer approach to improve TCP performance in wired-cum-wireless networks using signal strength., , and . ICNSC, page 693-697. IEEE, (2010)Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus., , , , and . IEEE Trans. Veh. Technol., 72 (4): 4493-4509 (April 2023)TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets., , , and . MILCOM, page 1-6. IEEE, (2018)