Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert Wireless Communication With Artificial Noise Generation., , , , and . IEEE Trans. Wireless Communications, 17 (11): 7252-7267 (2018)Inferring Higher-Order Structure Statistics of Large Networks from Sampled Edges., , , , , and . IEEE Trans. Knowl. Data Eng., 31 (1): 61-74 (2019)Implications of peer selection strategies by publishers on the performance of P2P swarming systems., , , , and . SIGMETRICS Performance Evaluation Review, 39 (3): 55-57 (2011)Symmetry property of the throughput in closed tandem queueing networks with finite buffers., and . Oper. Res. Lett., 10 (9): 541-547 (1991)LRU Cache under Stationary Requests., , and . CoRR, (2017)Improving Energy Efficiency of MPTCP for Mobile Devices., , , , and . CoRR, (2014)A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs., , , , , , , , and . CoRR, (2016)Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes, , and . CoRR, (2012)LPD Communication when the Warden Does Not Know When., , and . CoRR, (2014)Multiple Random Walks to Uncover Short Paths in Power Law Networks, , and . CoRR, (2012)