Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Square Peg in a Round Hole: The Complex Path for Wireless in the Manufacturing Industry., , and . CoRR, (2018)Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi., , , and . IEEE/ACM Trans. Netw., 25 (6): 3267-3281 (2017)Coexistence of WiFi and LTE in unlicensed bands: A proportional fair allocation scheme., and . ICC Workshops, page 2288-2293. IEEE, (2015)Potential and Pitfalls of Multi-Armed Bandits for Decentralized Spatial Reuse in WLANs., , , , , and . CoRR, (2018)Collaborative Spatial Reuse in Wireless Networks via Selfish Multi-Armed Bandits., , , , , and . CoRR, (2017)Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks., , and . EUNICE, volume 7479 of Lecture Notes in Computer Science, page 23-32. Springer, (2012)Fairness and Convergence of CSMA with Enhanced Collision Avoidance (ECA)., , , and . ICC, page 1-6. IEEE, (2010)Carrier sense multiple access with enhanced collision avoidance: a performance analysis., , , , and . IWCMC, page 733-738. ACM, (2009)State of the Art in Power Line Communications: From the Applications to the Medium., , , , , and . IEEE J. Sel. Areas Commun., 34 (7): 1935-1952 (2016)A low power listening MAC with scheduled wake up after transmissions for WSNs., , , and . IEEE Communications Letters, 13 (4): 221-223 (2009)