Analytical modelling of false blocking problem in wireless ad hoc networks
暂无分享,去创建一个
Micheal Drieberg | Varun Jeoti | Rizwan Ahmad | Wai Kheong Chong | R. Ahmad | V. Jeoti | M. Drieberg
[1] Gunasekaran Raja,et al. FINDER: A D2D based critical communications framework for disaster management in 5G , 2018, Peer-to-Peer Netw. Appl..
[2] Micheal Drieberg,et al. Mitigating false blocking problem in wireless ad hoc networks , 2012, Telecommun. Syst..
[3] Xiaoheng Deng,et al. Performance Analysis for IEEE 802.11s Wireless Mesh Network in Smart Grid , 2017, Wirel. Pers. Commun..
[4] Chao Yang,et al. Efficient Interference-Aware Power Control for Wireless Networks , 2018, Comput. Networks.
[5] Djamil Aïssani,et al. Modeling and enhancement of the IEEE 802.11 RTS/CTS scheme in an error-prone channel , 2014, Formal Aspects of Computing.
[6] Md. Iftekhar Hussain,et al. A comparison of 802.11ah and 802.15.4 for IoT , 2016, ICT Express.
[7] Sushil Kumar,et al. Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals , 2016, Wirel. Pers. Commun..
[8] Fatemeh Ghassemi,et al. Modeling and efficient verification of wireless ad hoc networks , 2016, Formal Aspects of Computing.
[9] Sandip Chakraborty,et al. Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks , 2016, IEEE Transactions on Wireless Communications.
[10] Ignas Niemegeers,et al. Performance Analysis of IEEE 802.11ad MAC Protocol , 2017, IEEE Communications Letters.
[11] David Starobinski,et al. On False Blocking in RTS/CTS-Based Multihop Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.
[12] Jin Kwak,et al. Internet of things system technologies based on quality of experience , 2019, Peer-to-Peer Netw. Appl..
[13] S. U.,et al. Performance analysis of IEEE 802.11ah wireless local area network under the restricted access window‐based mechanism , 2018, International Journal of Communication Systems.
[14] Xenofon Fafoutis,et al. Receiver-initiated medium access control protocols for wireless sensor networks , 2015, Comput. Networks.
[15] Omar Hayat,et al. In-Band Device to Device (D2D) Communication and Device Discovery: A Survey , 2019, Wireless Personal Communications.
[16] Choong Seon Hong,et al. An efficient multi-channel MAC protocol for wireless ad hoc networks , 2016, Ad Hoc Networks.
[17] Maher Ben Jemaa,et al. An accurate two dimensional Markov chain model for IEEE 802.11n DCF , 2018, Wirel. Networks.
[18] Anurag Kumar,et al. Analytical Modeling of IEEE 802.11-Type CSMA/CA Networks With Short Term Unfairness , 2016, IEEE/ACM Transactions on Networking.
[19] Daniel Gutiérrez-Reina,et al. A survey on probabilistic broadcast schemes for wireless ad hoc networks , 2015, Ad Hoc Networks.
[20] Xiaojun Hei,et al. A Systematic Study of IEEE 802.11 DCF Network Optimization From Theory to Testbed , 2020, IEEE Access.
[21] M. Yousof Naderi,et al. Performance Analysis of CSMA/CA based Medium Access in Full Duplex Wireless Communications , 2015, IEEE Transactions on Mobile Computing.
[22] Yuefeng Ji,et al. Collision analysis of CSMA/CA based MAC protocol for duty cycled WBANs , 2017, Wirel. Networks.
[23] Mohammad Mahdi Jaghoori,et al. Modere: the model-checking engine of Rebeca , 2006, SAC.
[24] Daniel E. Lucani,et al. A Markov Chain Model for the Decoding Probability of Sparse Network Coding , 2016, ArXiv.
[25] David Starobinski,et al. RTS/CTS-induced congestion in ad hoc wireless LANs , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[26] Rishi Pal Singh,et al. Modelling of IEEE 802.11 DCF in the presence of hidden nodes , 2015, Int. J. Wirel. Mob. Comput..
[27] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[28] Chien-Erh Weng,et al. The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs , 2016, Comput. Stand. Interfaces.
[29] Nurul I. Sarkar,et al. Performance study of block ACK and reverse direction in IEEE 802.11n using a Markov chain model , 2017, J. Netw. Comput. Appl..