Exploiting Interference for Capacity Improvement in Software-Defined Vehicular Networks
暂无分享,去创建一个
Min Chen | Yan Zhang | Yan Huang | Tomoaki Ohtsuki | Xin Guan | Huayang Wu | Min Chen | Yan Zhang | T. Ohtsuki | X. Guan | Huayang Wu | Yan Huang
[1] Eytan Modiano,et al. Capacity and delay tradeoffs for ad hoc mobile networks , 2005, IEEE Trans. Inf. Theory.
[2] A. Ganz,et al. The Capacity of Vehicular Ad Hoc Networks , 2007 .
[3] Roger Wattenhofer,et al. Capacity of Arbitrary Wireless Networks , 2009, IEEE INFOCOM 2009.
[4] David Tse,et al. Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[5] Yiwei Thomas Hou,et al. On the Asymptotic Capacity of Multi-Hop MIMO Ad Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[6] Minjie Zhang,et al. A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..
[7] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[8] Massimo Franceschetti,et al. Closing the Gap in the Capacity of Wireless Networks Via Percolation Theory , 2007, IEEE Transactions on Information Theory.
[9] Jianzhong Li,et al. Capacity of wireless networks with multiple types of multicast sessions , 2014, MobiHoc '14.
[10] Birsen Sirkeci-Mergen,et al. On the Broadcast Capacity of Wireless Networks With Cooperative Relays , 2010, IEEE Transactions on Information Theory.
[11] Vladimir Vapnik,et al. Chervonenkis: On the uniform convergence of relative frequencies of events to their probabilities , 1971 .
[12] Jianzhong Li,et al. A Study on Application-Aware Scheduling in Wireless Networks , 2017, IEEE Transactions on Mobile Computing.
[13] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[14] Victor C. M. Leung,et al. Exploiting Adversarial Jamming Signals for Energy Harvesting in Interference Networks , 2017, IEEE Transactions on Wireless Communications.
[15] Jianzhong Li,et al. An Application-Aware Scheduling Policy for Real-Time Traffic , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[16] Zongpeng Li,et al. A Constant Bound on Throughput Improvement of Multicast Network Coding in Undirected Networks , 2009, IEEE Transactions on Information Theory.
[17] Yu Cheng,et al. Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay , 2012, 2012 Proceedings IEEE INFOCOM.
[18] Michele Garetto,et al. Restricted Mobility Improves Delay-Throughput Tradeoffs in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Information Theory.
[19] Matthias Grossglauser,et al. Island Hopping: Efficient Mobility-Assisted Forwarding in Partitioned Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[20] Xingming Sun,et al. Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.
[21] Jianzhong Li,et al. Curve Query Processing in Wireless Sensor Networks , 2015, IEEE Transactions on Vehicular Technology.
[22] Xiaodong Liu,et al. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.
[23] Xiang-Yang Li. Multicast capacity of wireless ad hoc networks , 2009, TNET.
[24] Xingming Sun,et al. Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder , 2016, IEEE Transactions on Broadcasting.
[25] Xingming Sun,et al. Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.
[26] Helmut Groemer,et al. Über die Einlagerung von Kreisen in einen konvexen Bereich , 1960 .
[27] Xuemin Shen,et al. Capacity and delay analysis for social-proximity urban vehicular networks , 2012, 2012 Proceedings IEEE INFOCOM.
[28] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[29] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[30] Mohammad Nekoui,et al. The capacity of Vehicular Ad Hoc Networks with infrastructure , 2008, WiOpt 2008.
[31] Hamid R. Sadjadpour,et al. On the multicast capacity of wireless ad hoc networks with network coding , 2011, Journal of Communications and Networks.
[32] Zhipeng Cai,et al. Approximate aggregation for tracking quantiles and range countings in wireless sensor networks , 2015, Theor. Comput. Sci..
[33] Victor C. M. Leung,et al. Interference Alignment and Its Applications: A Survey, Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[34] Hamid R. Sadjadpour,et al. Extending the capacity of ad hoc networks beyond network coding , 2007, IWCMC.
[35] Rong Zheng,et al. Asymptotic Bounds of Information Dissemination in Power-Constrained Wireless Networks , 2008, IEEE Transactions on Wireless Communications.
[36] Hao Wang,et al. A measure system of zero moment point using wearable inertial sensors , 2016, China Communications.