Author of the publication

Roaming charges for customers of cellular-wireless entrant providers.

, , , and . INFOCOM Workshops, page 1-5. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Zero knowledge hidden Markov model inference., , , and . Pattern Recognit. Lett., 30 (14): 1273-1280 (2009)Unsupervised Machine Learning of Open Source Russian Twitter Data Reveals Global Scope and Operational Characteristics., and . CoRR, (2018)Topological Structure is Predictive of Deep Neural Network Success in Learning., , and . CoRR, (2023)A cellular automata model can quickly approximate UDP and TCP network traffic., , and . Complex., 9 (3): 32-40 (2004)Modeling Longitudinal Behavior Dynamics Among Extremist Users in Twitter Data., , , and . IEEE BigData, page 4906-4914. IEEE, (2021)Identification and characterization of cyberbullying dynamics in an online social network., , , and . ASONAM, page 280-285. ACM, (2015)Behavior in a shared resource game with cooperative, greedy, and vigilante players., and . CISS, page 1-6. IEEE, (2014)Roaming charges for customers of cellular-wireless entrant providers., , , and . INFOCOM Workshops, page 1-5. IEEE, (2015)Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results., and . IEEE Symposium on Security and Privacy Workshops, page 113-116. IEEE Computer Society, (2012)Deriving an optimally deceptive policy in two-player iterated games., , and . ACC, page 3808-3813. IEEE, (2016)