Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power allocation using Vickrey auction and sequential first-price auction games for physical layer security in cognitive relay networks., , , , and . ICC, page 1683-1687. IEEE, (2012)Feedback Control Game for Channel State Information in Wireless Networks., , , and . ICC, page 1-5. IEEE, (2011)Popular content distribution in vehicular networks using coalition formation games., , , , and . ICC, page 6381-6385. IEEE, (2013)Energy-aware resource allocation for device-to-device underlay communication., , , , , and . ICC, page 6076-6080. IEEE, (2013)Radio resource allocation for physical-layer security in D2D underlay communications., , , and . ICC, page 2319-2324. IEEE, (2014)Amplify-and-Forward Cooperative Communications Using Double-Differential Modulation over Nakagami-m Channels., , and . WCNC, page 350-355. IEEE, (2008)A Threshold-Based Hybrid Relay Selection Scheme., , , and . WCNC Workshops, page 1-5. IEEE, (2010)Roadside-unit caching in vehicular ad hoc networks for efficient popular content delivery., , , , and . WCNC, page 1207-1212. IEEE, (2015)Precoded Differential Orthogonal Space-Time Modulation Over Correlated Ricean MIMO Channels., , and . J. Sel. Topics Signal Processing, 2 (2): 124-134 (2008)Interference Improves PHY Security for Cognitive Radio Networks., , , and . IEEE Trans. Information Forensics and Security, 11 (3): 609-620 (2016)