Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Retrospective spectrum access protocol: A payoff-based learning algorithm for cognitive radio networks., , and . ICC, page 1422-1427. IEEE, (2014)Opportunistic Spectrum Access with Channel Switching Cost for Cognitive Radio Networks., , and . ICC, page 1-5. IEEE, (2011)Securing IoT Uplink Communications Against Eavesdropping., , , and . CIoT, page 1-8. IEEE, (2018)Let Cognitive Radios Imitate: Imitation-based Spectrum Access for Cognitive Radio Networks, , and . CoRR, (2011)Workshop message: IoT-SoS 2016., , , , , , , , and . WoWMoM, page 1. IEEE Computer Society, (2016)Spectrum auction with interference constraint for cognitive radio networks with multiple primary and secondary users., , , and . Wireless Networks, 17 (5): 1355-1371 (2011)Imitation-based spectrum access policy for CSMA/CA-based cognitive radio networks., , and . WCNC, page 2780-2785. IEEE, (2012)Imitation-based spectrum access policy for cognitive radio networks., , , and . ISWCS, page 1019-1023. IEEE, (2012)Competitive location in cognitive radio networks., , , , and . 4OR, 13 (1): 81-110 (2015)Proportional and double imitation rules for spectrum access in cognitive radio networks., , and . Computer Networks, 57 (8): 1863-1879 (2013)