Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matching patterns in networks with multi-dimensional attributes: a machine learning approach.. Social Netw. Analys. Mining, 4 (1): 188 (2014)Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks., , , , , and . INFOCOM, page 2357-2365. IEEE, (2010)A simple conceptual generator for the Internet graph., , , and . LANMAN, page 1-6. IEEE, (2010)Gaming the jammer: Is frequency hopping effective?, , and . WiOpt, page 1-10. IEEE, (2009)Coping with packet replay attacks in wireless networks., , , , , and . SECON, page 368-376. IEEE, (2011)VICO: A framework for configuring indoor visible light communication networks., , , , , and . MASS, page 136-144. IEEE Computer Society, (2012)Detecting Route Attraction Attacks in Wireless Networks., , , , , and . MASS, page 371-380. IEEE Computer Society, (2011)Forensic Analysis of Packet Losses in Wireless Networks., , , , , and . IEEE/ACM Trans. Netw., 24 (4): 1975-1988 (2016)Event Analytics via Discriminant Tensor Factorization., , and . TKDD, 12 (6): 72:1-72:38 (2018)Reports of the Workshops Held at the 2016 International AAAI Conference on Web and Social Media., , , , , , , , , and 1 other author(s). AI Magazine, 37 (4): 89-93 (2016)