Author of the publication

Dynamic eICIC - A Proactive Strategy for Improving Spectral Efficiencies of Heterogeneous LTE Cellular Networks by Leveraging User Mobility and Traffic Dynamics.

, , and . IEEE Trans. Wireless Communications, 12 (10): 4956-4969 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boosted WiFi through LTE small cells: The solution for an all-wireless enterprise., , , , , and . PIMRC, page 1-6. IEEE, (2016)EV-do revision C: Evolution of the cdma2000* data optimized system to higher spectral efficiencies and enhanced services., , , , , , , , , and . Bell Labs Technical Journal, 11 (4): 5-24 (2007)Evolution of the reverse link of CDMA-based systems to support high-speed data., , , , , , , and . Bell Labs Technical Journal, 7 (3): 69-82 (2003)Dynamic eICIC - A Proactive Strategy for Improving Spectral Efficiencies of Heterogeneous LTE Cellular Networks by Leveraging User Mobility and Traffic Dynamics., , and . IEEE Trans. Wireless Communications, 12 (10): 4956-4969 (2013)Enabling Data Offload and Proximity Services Using Device to Device Communication over Licensed Cellular Spectrum with Infrastructure Control., , , and . VTC Fall, page 1-7. IEEE, (2013)Co-operative scheduling for balancing throughput gains and fairness in cell-edge enhancement schemes for wireless networks., , and . COMSNETS, page 1-7. IEEE, (2013)Performance Gains of a Hybrid Wi-Fi/LTE Architecture., , , and . VTC Spring, page 1-6. IEEE, (2015)Multiuser detectors for synchronous CDMA communication over non-selective Rician fading channels., and . IEEE Trans. Communications, 42 (234): 711-722 (1994)An approach to determine link balance in a CDMA system., , and . WCNC, page 918-922. IEEE, (1999)Effective border gateway protocol protection that does not require universal adoption of a public key infrastructure., , and . IET Networks, 1 (4): 217-228 (2012)