Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Access Is Fine, But Who Is Going To Pay?. DAIS, volume 198 of IFIP Conference Proceedings, page 149-158. Kluwer, (2001)Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based WLANs., , , , and . KiVS, page 195-206. Springer, (2003)Interference-aware decentralized access point selection policy for multi-rate IEEE 802.11 Wireless LANs., and . PIMRC, page 1-6. IEEE, (2008)Predicting the Perceptual Service Quality Using a Trace of VoIP Packets., , and . QofIS, volume 3266 of Lecture Notes in Computer Science, page 21-30. Springer, (2004)Snuffle: Integrated Measurement and Analysis Tool for Internet and Its Use in Wireless In-House Environment., , , , and . Computer Performance Evaluation (Tools), volume 1469 of Lecture Notes in Computer Science, page 340-343. Springer, (1998)Reinforcement Learning Scheduler for Vehicle-to-Vehicle Communications Outside Coverage., , , and . CoRR, (2019)Interference Effect on Localization Solutions: Signal Feature Perspective., , , , and . VTC Spring, page 1-7. IEEE, (2015)Hypothesis Testing Based Model for Fingerprinting Localization Algorithms., , and . VTC Spring, page 1-6. IEEE, (2017)Towards efficient coexistence of IEEE 802.15.4e TSCH and IEEE 802.11., and . NOMS, page 1-7. IEEE, (2018)Regionalizing global optimization algorithms to improve the operation of large ad hoc networks., , and . WCNC, page 819-824. IEEE, (2004)