Author of the publication

A novel scheme for D2D resource allocation based on users' data rate requirements.

, , and . ICIIP, page 39. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When group-buying meets cloud computing., , , , , and . INFOCOM, page 1-9. IEEE, (2016)Monadic bounded hoops., , and . Soft Comput., 22 (6): 1749-1762 (2018)Monadic pseudo BCI-algebras and corresponding logics., , , and . Soft Comput., 23 (5): 1499-1510 (2019)Cursed yet Satisfied Agents., , and . ITCS, volume 215 of LIPIcs, page 44:1-44:1. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Randomized Wagering Mechanisms., , and . CoRR, (2018)Randomized Wagering Mechanisms., , and . AAAI, page 1845-1852. AAAI Press, (2019)How to design a common telecom infrastructure by competitors individually rational and collectively optimal., , and . INFOCOM Workshops, page 552-557. IEEE, (2015)SAIL: A Strategy-Proof Auction Mechanism for Cooperative Communication., , , and . ICPADS, page 380-387. IEEE Computer Society, (2013)Cost-Efficient Cooperative Sharing of a Complete Wi-Fi Signature Scheme for Indoor Localization in Shopping Malls., , and . ICEBE, page 196-201. IEEE Computer Society, (2016)Cost optimization heuristics for deadline constrained workflow scheduling on clouds and their comparative evaluation., , , , and . Concurrency and Computation: Practice and Experience, (2018)