Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replication decoding., , and . IEEE Trans. Information Theory, 25 (3): 332-345 (1979)Power allocation and control for the downlink in cellular CDMA networks., , and . PIMRC, page C29-C33. IEEE, (2002)Key Minimal Authentication Systems for Unconditional Secrecy., and . EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 497-501. Springer, (1989)Some Cryptographic Aspects of Womcodes., and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 458-467. Springer, (1985)Analytical evaluation of various frequency reuse schemes in cellular OFDMA networks., , , and . VALUETOOLS, page 32. ICST/ACM, (2008)Inter-operator spectrum sharing for cellular networks using game theory., , and . PIMRC, page 425-429. IEEE, (2009)Dynamic Subcarrier Reuse With Rate Guaranty in a Downlink Multicell OFDMA System., , and . PIMRC, page 1-5. IEEE, (2006)Scheduling algorithms for soft handoff in cellular packet CDMA., , , and . PIMRC, page 671-675. IEEE, (2000)Optimal Relay Placement in Cellular Networks., , , , , and . IEEE Trans. Wireless Communications, 13 (2): 998-1009 (2014)SIR distribution analysis in cellular networks considering the joint impact of path-loss, shadowing and fast fading., , , and . EURASIP J. Wireless Comm. and Networking, (2011)