Author of the publication

Smart retransmission for CSI recovery in uplink multi-user MIMO networks.

, , , , and . INFOCOM Workshops, page 1061-1062. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation., , , , , , , , and . J. Comput. Sci. Technol., 29 (4): 589-604 (2014)Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information., , , , and . INFOCOM, page 2544-2552. IEEE, (2013)Popularity Biased Hybrid Search in P2P Systems., and . GCC, page 173-176. IEEE Computer Society, (2006)Device-Free Object Tracking Using Passive Tags, , , and . Springer Briefs in Electrical and Computer Engineering Springer, (2014)Mutual Anonymity for Mobile P2P Systems., and . IEEE Trans. Parallel Distrib. Syst., 19 (8): 1009-1019 (2008)EMoD: Efficient Motion Detection of Device-Free Objects Using Passive RFID Tags., , , , , , and . ICNP, page 291-301. IEEE Computer Society, (2015)Wi-Fi Fingerprint Based Indoor Localization without Indoor Space Measurement., , , , , and . MASS, page 384-392. IEEE Computer Society, (2013)Randomizing RFID Private Authentication., , , , , and . PerCom, page 1-10. IEEE Computer Society, (2009)Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols., , , , , and . IPDPS, page 1-10. IEEE, (2007)DHT-assisted probabilistic exhaustive search in unstructured P2P networks., , , and . IPDPS, page 1-9. IEEE, (2008)