Oleg Asenov

Orcid: 0000-0001-8385-7680

According to our database1, Oleg Asenov authored at least 14 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Practical application of heuristic approaches to improving the network architecture of a courier company.
Proceedings of the 20th International Conference on Computer Systems and Technologies, 2019

2018
Performance Optimization in Heterogeneous Wireless Access Networks Based on User Heat Maps.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

2017
Multilayered Distributed Routing for Power Efficient MANET Performance.
Wirel. Pers. Commun., 2017

2016
Layered routing algorithm for sustainable MANET operation.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

2015
Risk assessment based LTE HetNet uplink power and interference control.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Improved open loop power control for LTE uplink.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

2014
Resource Management Based on Dynamic Users Association for Future Heterogeneous Telecommunication Access Infrastructures.
Wirel. Pers. Commun., 2014

Combined power and inter-cell interference control for LTE based on role game approach.
Telecommun. Syst., 2014

A 3D model for adaptive multi-lingual online assessment.
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014

2013
Heuristic approach to dynamic Uplink Power Control in LTE.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

2012
Interference limited Uplink Power Control based on a Cognitive Approach.
Proceedings of the 35th International Conference on Telecommunications and Signal Processing, 2012

Identity protection accessing e-government through the biometric authentication methods.
Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012

2010
3D model of e-learning.
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, 2010

2000
Models for estimation of effectiveness of HTML-based training courses.
Proceedings of the Conference on Computer Systems and Technologies, 2000


  Loading...