How to Scale Exponential Backoff
暂无分享,去创建一个
Michael A. Bender | Maxwell Young | Seth Gilbert | Jeremy T. Fineman | Seth Gilbert | M. A. Bender | Maxwell Young
[1] Rachid Guerraoui,et al. Secure communication over radio channels , 2008, PODC '08.
[2] Chenyang Lu,et al. Energy-efficient Low Power Listening for wireless sensor networks in noisy environments , 2013, 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[3] Ramesh K. Sitaraman,et al. The power of two random choices: a survey of tech-niques and results , 2001 .
[4] Christian Scheideler,et al. Competitive and fair throughput for co-existing networks under adversarial interference , 2012, PODC '12.
[5] Dariusz R. Kowalski,et al. A better wake-up in radio networks , 2004, PODC '04.
[6] Peter March,et al. Stability of binary exponential backoff , 1988, JACM.
[7] Eli Upfal,et al. Balanced Allocations , 1999, SIAM J. Comput..
[8] Christian Scheideler,et al. A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.
[9] Robert Simon,et al. A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.
[10] Aravind Srinivasan,et al. Contention resolution with constant expected delay , 2000, JACM.
[11] Nitin H. Vaidya,et al. Reliable broadcast in radio networks: the bounded collision case , 2006, PODC '06.
[12] Victor O. K. Li,et al. Receiver-initiated busy-tone multiple access in packet radio networks , 1987, Computer Communication Review.
[13] Yih-Chun Hu,et al. Demo: bankrupting the jammer , 2011, MobiSys '11.
[14] Christian Scheideler,et al. Competitive and Fair Medium Access Despite Reactive Jamming , 2011, 2011 31st International Conference on Distributed Computing Systems.
[15] Rachid Guerraoui,et al. Interference-Resilient Information Exchange , 2009, IEEE INFOCOM 2009.
[16] Xin Liu,et al. SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[17] D. K. Arvind,et al. Towards an Integrated Design Approach to Specknets , 2007, 2007 IEEE International Conference on Communications.
[18] Robert Metcalfe,et al. Ethernet: distributed packet switching for local computer networks , 1976, CACM.
[19] Michael A. Bender,et al. Adversarial contention resolution for simple channels , 2005, SPAA '05.
[20] Alan M. Frieze,et al. On Balls and Bins with Deletions , 1998, RANDOM.
[21] Ravi Rajwar,et al. Speculative lock elision: enabling highly concurrent multithreaded execution , 2001, Proceedings. 34th ACM/IEEE International Symposium on Microarchitecture. MICRO-34.
[22] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[23] Maxwell Young,et al. Making evildoers pay: resource-competitive broadcast in sensor networks , 2012, PODC '12.
[24] Thomas Sauerwald,et al. Balls-into-bins with nearly optimal load distribution , 2013, SPAA.
[25] Rachid Guerraoui,et al. Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks , 2006, OPODIS.
[26] Yang Xiao,et al. Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs , 2005, IEEE Transactions on Wireless Communications.
[27] J. Capetanakis,et al. Generalized TDMA: The Multi-Accessing Tree Protocol , 1979, IEEE Trans. Commun..
[28] Yossi Matias,et al. An Optical Simulation of Shared Memory , 1999, SIAM J. Comput..
[29] Leslie Ann Goldberg,et al. Analysis of practical backoff protocols for contention resolution with multiple servers , 1996, SODA '96.
[30] Frank Thomson Leighton,et al. Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..
[31] Jing Deng,et al. Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks , 2002, IEEE Trans. Commun..
[32] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[33] Frank Thomson Leighton,et al. A doubly logarithmic communication algorithm for the completely connected optical communication parallel computer , 1993, SPAA '93.
[34] Marek Chrobak,et al. The wake-up problem in multi-hop radio networks , 2004, SODA '04.
[35] Frank Thomson Leighton,et al. Doubly Logarithmic Communication Algorithms for Optical-Communication Parallel Computers , 1997, SIAM J. Comput..
[36] Stefan Schmid,et al. Speed Dating Despite Jammers , 2009, DCOSS.
[37] Christian Scheideler,et al. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks , 2010, DISC.
[38] Michael A. Bender,et al. Contention Resolution with Heterogeneous Job Sizes , 2006, ESA.
[39] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[40] Albert G. Greenberg,et al. A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.
[41] Byung-Jae Kwak,et al. Performance analysis of exponential backoff , 2005, IEEE/ACM Transactions on Networking.
[42] Maxwell Young,et al. Resource-competitive analysis: a new perspective on attack-resistant distributed computing , 2012, FOMC '12.
[43] Andrzej Pelc,et al. Feasibility and complexity of broadcasting with random transmission failures , 2005, PODC '05.
[44] Maurice Herlihy,et al. Transactional Memory: Architectural Support For Lock-free Data Structures , 1993, Proceedings of the 20th Annual International Symposium on Computer Architecture.
[45] V. Jacobson,et al. Congestion avoidance and control , 1988, CCRV.
[46] Frank Thomson Leighton,et al. Analysis of backoff protocols for multiple access channels , 1987, STOC '87.
[47] Michael Mitzenmacher,et al. The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..
[48] Dariusz R. Kowalski,et al. On the Wake-Up Problem in Radio Networks , 2005, ICALP.
[49] Artur Czumaj,et al. Multiple-Choice Balanced Allocation in (Almost) Parallel , 2012, APPROX-RANDOM.
[50] Bogdan S. Chlebus,et al. Adversarial Multiple Access Channel with Individual Injection Rates , 2009, OPODIS.
[51] Max Buot. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2006 .
[52] Dariusz R. Kowalski,et al. Adversarial Queuing on the Multiple Access Channel , 2012, TALG.
[53] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.