• Nenhum resultado encontrado

[PDF] Top 20 MyopicMAC: A Throughput-Optimal Random Access Scheme for Distributed Wireless Networks

Has 10000 "MyopicMAC: A Throughput-Optimal Random Access Scheme for Distributed Wireless Networks" found on our website. Below are the top 20 most common "MyopicMAC: A Throughput-Optimal Random Access Scheme for Distributed Wireless Networks".

MyopicMAC: A Throughput-Optimal Random Access Scheme for Distributed Wireless Networks

MyopicMAC: A Throughput-Optimal Random Access Scheme for Distributed Wireless Networks

... Medium Access Control (MAC) algorithm for single-hop distributed wireless networks, MyopicMAC, which is designed to maximize the network throughput ...our scheme, all ... See full document

23

A Random Access MAC Protocol for MPR Satellite Networks

A Random Access MAC Protocol for MPR Satellite Networks

... Medium Access Control (MAC) schemes are important in a wireless medium to coordinate MTs eligible for packet ...the access of communicating stations to the wireless medium, to share the net- ... See full document

118

The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

... based wireless mesh networks (WMNs) have been mainly investigated for extending wireless transmission throughput ...the networks, contending is also increased in the wireless ... See full document

7

Empirical Performance Evaluation of Enhanced Throughput Schemes of IEEE802.11 Technology in Wireless Area Networks

Empirical Performance Evaluation of Enhanced Throughput Schemes of IEEE802.11 Technology in Wireless Area Networks

... transmission scheme was used to mitigate interference by beam forming and increase system capacity in WLAN systems where matlab simulation was ...advanced distributed beamforming techniques at physical ... See full document

15

Improvement in Medium Access Control protocol based on new contention scheme for wireless ad hoc network

Improvement in Medium Access Control protocol based on new contention scheme for wireless ad hoc network

... todays wireless networks, stations using the IEEE ...the Distributed Coordination Function ...of wireless devices. In this paper, we present a Medium Access Control (MAC) scheme ... See full document

6

Optimal Rate Based Image Transmission Scheme in Multi-rate Wireless Sensor Networks

Optimal Rate Based Image Transmission Scheme in Multi-rate Wireless Sensor Networks

... and access service is handled by accommodating multiprotocol service discovery with different communication paradigms like RPC , event based request response publish , subscribe ...for distributed ... See full document

7

A Novel Reservation-based MAC Scheme for Distributed Cognitive Radio Networks

A Novel Reservation-based MAC Scheme for Distributed Cognitive Radio Networks

... several wireless systems to reduce the number of idle slots needed to schedule a transmission ...the throughput region of a centralized reservation-based access ... See full document

5

Quality of Service Policy for IEEE 802.11 Networks with Service Rate Selection based on Fairness Index

Quality of Service Policy for IEEE 802.11 Networks with Service Rate Selection based on Fairness Index

... During the fairness index evaluation, the AP starts a repetition cycle, using the connection/service rate values yielded by the STAs and tests the feasibility of each combination of service rate, service type and ... See full document

5

Improved Optimal Searching Techniques in Distributed P2P networks using Guided Protocol Approach

Improved Optimal Searching Techniques in Distributed P2P networks using Guided Protocol Approach

... (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of vast amount of ...P2P networks is to achieve efficient resources ...P2P ... See full document

4

Estratégias distribuídas para a coexistência de redes de banda larga sem fio em bandas não-licensiadas

Estratégias distribuídas para a coexistência de redes de banda larga sem fio em bandas não-licensiadas

... in wireless broadband access networks requires both the development of efficient, novel wireless broadband access technologies and the allocation of new spectrum bands for that ... See full document

159

A DYNAMIC ROUTE DISCOVERY SCHEME FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS BASED ON POLYCHROMATIC SETS THEORY

A DYNAMIC ROUTE DISCOVERY SCHEME FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS BASED ON POLYCHROMATIC SETS THEORY

... and wireless protocols, nodes with different capabilities are used to form a heterogeneous ...of networks is seriously deteriorated because of the bottlenecks inside the ... See full document

13

Dynamic connection provisioning in fiber-wireless access networks using tuning-based roadms

Dynamic connection provisioning in fiber-wireless access networks using tuning-based roadms

... optical networks have become a focal point of interest to both researchers and practitioners as they have offered a way by which this demand can be ...optical networks, a technology called wavelength ... See full document

70

A High Throughput Screening Assay for Anti-Mycobacterial Small Molecules Based on Adenylate Kinase Release as a Reporter of Cell Lysis.

A High Throughput Screening Assay for Anti-Mycobacterial Small Molecules Based on Adenylate Kinase Release as a Reporter of Cell Lysis.

... As with any screening assay or technology, AK-based screening of M. smegmatis has limita- tions. First, some molecules may require prolonged incubation before they become cidal and, thus, be false negatives. The ... See full document

14

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... node, some of the received messages are combined for transmission. This coding approach has reduced the total number of transmissions considerably compared to broadcasting using the same forwarding nodes without coding. ... See full document

11

Distributed Algorithms for Target Localization in Wireless Sensor Networks Using Hybrid Measurements

Distributed Algorithms for Target Localization in Wireless Sensor Networks Using Hybrid Measurements

... Recursive methods, such as Newton’s method combined with gradient descent method, are often used to obtain the ML solution [33]. However, since the objective function may have numerous local optima, it is possible that ... See full document

85

Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set

Energy Efficient Routing Scheme for Sensor Networks Using Connected Dominating Set

... routing scheme for accumulating all the data at the sink periodically, which is the main problem discussed in this ...routing scheme for gathering all data at the sink periodically so that the lifetime of ... See full document

7

Soluções cientes de agregação de dados da correlação espaço-temporal e consumo de energia para realizar coleta de dados em redes de sensores sem fio

Soluções cientes de agregação de dados da correlação espaço-temporal e consumo de energia para realizar coleta de dados em redes de sensores sem fio

... A reliable and data aggregation aware routing protool for wireless sensor. networks[r] ... See full document

136

Intrusion Detection in Wireless Body Sensor Networks

Intrusion Detection in Wireless Body Sensor Networks

... named Wireless Body Area Networks (WBANs) also known as Wireless Body Sensor Networks ...Adhoc networks such as: limited energy resource, reduced memory size, small transmission power ... See full document

6

A Distributed Agent Media Access Framework

A Distributed Agent Media Access Framework

... as access to the cache or the public resource is handled in the normal fashion whereby the initiation of the path can originate from within the private network because an agent is executing within the ... See full document

10

Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network

Traffic And Security Using Randomized Dispersive Routes In Heterogeneous Sensor Network

... a wireless sensor network (WSN), in this paper we are specifically interested in combating two types of attacks: the compromised-node (CN) attack and the denial-of-service (DOS) ... See full document

10

Show all 10000 documents...