Alexander Reznik, Ph.D.

Affiliations: 
2005 Princeton University, Princeton, NJ 
Area:
Information Sciences & Systems
Google:
"Alexander Reznik"

Parents

Sign in to add mentor
Sanjeev R. Kulkarni grad student 2005 Princeton
 (New results in network information theory.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Liu H, Eldarrat F, Alqahtani H, et al. (2018) Mobile Edge Cloud System: Architectures, Challenges, and Approaches Ieee Systems Journal. 12: 2495-2508
Hajimirsadeghi M, Mandayam NB, Reznik A. (2017) Joint Caching and Pricing Strategies for Popular Content in Information Centric Networks Ieee Journal On Selected Areas in Communications. 35: 654-667
Purkayastha D, Li J, Balazinski B, et al. (2014) Edge Caching in a Small Cell Network International Journal of Computing. 2: 41-46
Taleb T, Ksentini A, Reznik A, et al. (2014) Research and standards: Leading the evolution of telecom network architectures Ieee Wireless Communications. 21: 10-11
Zhang F, Zhang Y, Reznik A, et al. (2014) Providing explicit congestion control and multi-homing support for content-centric networking transport Computer Communications
Li T, Mandayam NB, Reznik A. (2013) A framework for distributed resource allocation and admission control in a cognitive digital home Ieee Transactions On Wireless Communications. 12: 984-995
Zuniga JC, Bernardos CJ, De La Oliva A, et al. (2013) Distributed mobility management: A standards landscape Ieee Communications Magazine. 51: 80-87
Baykas T, Kasslin M, Cummings M, et al. (2012) Developing a standard for TV white space coexistence: Technical challenges and solution approaches Ieee Wireless Communications. 19: 10-22
Nitinawarat S, Ye C, Barg A, et al. (2010) Secret key generation for a pairwise independent network model Ieee Transactions On Information Theory. 56: 6482-6489
Ye C, Mathur S, Reznik A, et al. (2010) Information-Theoretically secret key generation for fading wireless channels Ieee Transactions On Information Forensics and Security. 5: 240-254
See more...