A bound on the capacity of backoff and acknowledgment-based protocols
暂无分享,去创建一个
[1] Raphael Rom,et al. Multiple Access Protocols: Performance and Analysis , 1990, SIGMETRICS Perform. Evaluation Rev..
[2] R. A. Doney,et al. 4. Probability and Random Processes , 1993 .
[3] Leslie Ann Goldberg,et al. Analysis of practical backoff protocols for contention resolution with multiple servers , 1996, SODA '96.
[4] Peter March,et al. Stability of binary exponential backoff , 1988, JACM.
[5] Frank Kelly,et al. Stochastic Models of Computer Communication Systems , 1985 .
[6] Eli Upfal,et al. Stochastic Contention Resolution With Short Delays , 1998, SIAM J. Comput..
[7] Anthony Ephremides,et al. Information Theory and Communication Networks: An Unconsummated Union , 1998, IEEE Trans. Inf. Theory.
[8] Pierre A. Humblet,et al. A Class of Efficient Contention Resolution Algorithms for Multiple Access Channels , 1985, IEEE Trans. Commun..
[9] Aravind Srinivasan,et al. Contention resolution with constant expected delay , 2000, JACM.
[10] George C. Polyzos,et al. Conflict Resolution Algorithms and their Performance Analysis , 1993 .
[11] U. Loher. Efficiency of first-come first-served algorithms , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[12] John Capetanakis,et al. Tree algorithms for packet broadcast channels , 1979, IEEE Trans. Inf. Theory.
[13] I. MacPhee,et al. The Number of Packets Transmitted by Collision Detect Random Access Schemes , 1987 .
[14] Leslie Ann Goldberg,et al. An Improved Stability Bound for Binary Exponential Backoff , 2001, Theory of Computing Systems.
[15] Aravind Srinivasan,et al. Contention resolution with bounded delay , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[16] G. Grimmett,et al. Probability and random processes , 2002 .
[17] Philippe Flajolet,et al. Estimating the multiplicities of conflicts to speed their resolution in multiple access channels , 1987, JACM.
[18] Leslie Ann Goldberg,et al. Binary Exponential Backoff Is Stable for High Arrival Rates , 2000, STACS.
[19] G. Fayolle,et al. Topics in the Constructive Theory of Countable Markov Chains , 1995 .
[20] Rajeev Motwani,et al. Randomized Algorithms , 1995, SIGA.
[21] Frank Thomson Leighton,et al. Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..
[22] David J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.
[23] Gordon Bell,et al. Ethernet: Distributed Packet Switching for Local Computer Networks , 1976 .
[24] Raphael Rom,et al. Multiple Access Protocols: Performance and Analysis , 1990, SIGMETRICS Perform. Evaluation Rev..
[25] S. Verdu. Computation of the efficiency of the Mosely-Humblet contention resolution algorithm: A simple method , 1986, Proceedings of the IEEE.
[26] Urs Loher. Information-theoretic and genie-aided analyses of random-acess algorithms , 1998 .
[27] F. G. Foster. On the Stochastic Matrices Associated with Certain Queuing Processes , 1953 .