A capacity enhancing modification to RTS/CTS
暂无分享,去创建一个
[1] Paolo Santi. Topology control in wireless ad hoc and sensor networks , 2005 .
[2] Zbigniew Michalewicz,et al. Adaptive Business Intelligence , 2009, Encyclopedia of Artificial Intelligence.
[3] Reza Olfati-Saber,et al. Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.
[4] R. Hunjet,et al. On optimising the capacity and power efficiency of a wireless network , 2012, Australasian Telecommunication Networks and Applications Conference (ATNAC) 2012.
[5] Robert Hunjet,et al. Increasing the capacity of ad-hoc networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).
[6] Yu-Chee Tseng,et al. A Multi-channel MAC Protocol with Power Control for Multi-hop Mobile Ad Hoc Networks , 2002, Comput. J..
[7] Pramod K. Varshney,et al. Tuning the carrier sensing range of IEEE 802.11 MAC , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[8] Lih-Yuan Deng,et al. The Cross-Entropy Method: A Unified Approach to Combinatorial Optimization, Monte-Carlo Simulation, and Machine Learning , 2006, Technometrics.
[9] Jeffrey G. Andrews,et al. The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.
[10] Kyle Jamieson,et al. Understanding the real-world performance of carrier sense , 2005, E-WIND '05.
[11] Jian Lin,et al. The Hidden Cost of Hidden Terminals , 2010, 2010 IEEE International Conference on Communications.
[12] Choong Seon Hong,et al. A SINR-based transmission power control for MAC protocol in wireless ad hoc networks , 2012, 2012 Fourth International Conference on Communications and Electronics (ICCE).
[13] Mario Gerla,et al. How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[14] Qiang Xu,et al. Investigating the Optimum Carrier Sensing Range in Wireless Ad Hoc Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.