Author of the publication

Performance Analysis of Selfish Access Strategies on WiFi Infrastructure Networks.

, , and . GLOBECOM, page 1-5. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Coexistence Study of Low-Power Wide-Area Networks based on LoRaWAN and Sigfox., , , , and . WCNC, page 1-7. IEEE, (2023)The risks of WiFi flexibility: Enabling and detecting cheating., , , , , and . Future Network & Mobile Summit, page 1-9. IEEE, (2013)Demo: A Cell-level Traffic Generator for LoRa Networks., , and . MobiCom, page 474-476. ACM, (2017)Modelling of Multi-Tier Handover in LiFi Networks., , and . GLOBECOM, page 1-6. IEEE, (2021)Performance Analysis of Sweep-Spread Carrier (S2C) Modulation for Underwater Communications., , , , and . WUWNet, page 17:1-17:5. ACM, (2022)Scalable and privacy-preserving admission control for smart grids., , , and . CDC, page 5233-5238. IEEE, (2015)Optimal resource allocation in multi-hop networks: Contention vs. scheduling., , and . MED, page 1055-1060. IEEE, (2014)Rings for privacy: An architecture for privacy-preserving user profiling., , and . INFOCOM Workshops, page 199-200. IEEE, (2014)Testbed implementation of the meta-MAC protocol., , , and . INFOCOM Workshops, page 580-585. IEEE, (2016)Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid., , , and . Sensors, 20 (8): 2249 (2020)