Alexander Reznik, Ph.D.
Affiliations: | 2005 | Princeton University, Princeton, NJ |
Area:
Information Sciences & SystemsGoogle:
"Alexander Reznik"Parents
Sign in to add mentorSanjeev R. Kulkarni | grad student | 2005 | Princeton | |
(New results in network information theory.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Liu H, Eldarrat F, Alqahtani H, et al. (2018) Mobile Edge Cloud System: Architectures, Challenges, and Approaches Ieee Systems Journal. 12: 2495-2508 |
Hajimirsadeghi M, Mandayam NB, Reznik A. (2017) Joint Caching and Pricing Strategies for Popular Content in Information Centric Networks Ieee Journal On Selected Areas in Communications. 35: 654-667 |
Purkayastha D, Li J, Balazinski B, et al. (2014) Edge Caching in a Small Cell Network International Journal of Computing. 2: 41-46 |
Taleb T, Ksentini A, Reznik A, et al. (2014) Research and standards: Leading the evolution of telecom network architectures Ieee Wireless Communications. 21: 10-11 |
Zhang F, Zhang Y, Reznik A, et al. (2014) Providing explicit congestion control and multi-homing support for content-centric networking transport Computer Communications |
Li T, Mandayam NB, Reznik A. (2013) A framework for distributed resource allocation and admission control in a cognitive digital home Ieee Transactions On Wireless Communications. 12: 984-995 |
Zuniga JC, Bernardos CJ, De La Oliva A, et al. (2013) Distributed mobility management: A standards landscape Ieee Communications Magazine. 51: 80-87 |
Baykas T, Kasslin M, Cummings M, et al. (2012) Developing a standard for TV white space coexistence: Technical challenges and solution approaches Ieee Wireless Communications. 19: 10-22 |
Nitinawarat S, Ye C, Barg A, et al. (2010) Secret key generation for a pairwise independent network model Ieee Transactions On Information Theory. 56: 6482-6489 |
Ye C, Mathur S, Reznik A, et al. (2010) Information-Theoretically secret key generation for fading wireless channels Ieee Transactions On Information Forensics and Security. 5: 240-254 |