Contention resolution without collision detection
暂无分享,去创建一个
Michael A. Bender | Tsvi Kopelowitz | Seth Pettie | William Kuszmaul | William Kuszmaul | M. A. Bender | Seth Pettie | T. Kopelowitz
[1] Maxwell Young,et al. Is Our Model for Contention Resolution Wrong?: Confronting the Cost of Collisions , 2017, SPAA.
[2] Christian Scheideler,et al. Sade: competitive MAC under adversarial SINR , 2018, Distributed Computing.
[3] Aleksandar Kuzmanovic,et al. Removing exponential backoff from TCP , 2008, CCRV.
[4] Christian Scheideler,et al. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks , 2010, DISC.
[5] Michael A. Bender,et al. Contention Resolution with Heterogeneous Job Sizes , 2006, ESA.
[6] Seth Pettie,et al. Simple Contention Resolution via Multiplicative Weight Updates , 2019, SOSA@SODA.
[7] Robert Metcalfe,et al. Ethernet: distributed packet switching for local computer networks , 1988, CACM.
[8] Frank Thomson Leighton,et al. Analysis of Backoff Protocols for Multiple Access Channels , 1996, SIAM J. Comput..
[9] Ruosong Wang,et al. Exponential separations in the energy complexity of leader election , 2016, STOC.
[10] Dariusz R. Kowalski,et al. Brief Announcement: Deterministic Contention Resolution on a Shared Channel , 2018, DISC.
[11] Philippe Flajolet,et al. Estimating the multiplicities of conflicts to speed their resolution in multiple access channels , 1987, JACM.
[12] Michael A. Bender,et al. Adversarial contention resolution for simple channels , 2005, SPAA '05.
[13] Christian Scheideler,et al. Competitive and fair throughput for co-existing networks under adversarial interference , 2012, PODC '12.
[14] Yossi Matias,et al. An optical simulation of shared memory , 1994, SPAA '94.
[15] Dariusz R. Kowalski,et al. Local Queuing Under Contention , 2018, DISC.
[16] Peter March,et al. Stability of binary exponential backoff , 1988, JACM.
[17] David J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels , 1987, IEEE Trans. Inf. Theory.
[18] Van Jacobson,et al. Congestion avoidance and control , 1988, SIGCOMM '88.
[19] Dan E. Willard,et al. Log-Logarithmic Selection Resolution Protocols in a Multiple Access Channel , 1986, SIAM J. Comput..
[20] Christian Scheideler,et al. A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.
[21] Dariusz R. Kowalski,et al. Adversarial queuing on the multiple-access channel , 2006, PODC '06.
[22] Christian Scheideler,et al. An Efficient and Fair MAC Protocol Robust to Reactive Interference , 2013, IEEE/ACM Transactions on Networking.
[23] Frank Thomson Leighton,et al. Analysis of backoff protocols for multiple access channels , 1987, STOC '87.
[24] Byung-Jae Kwak,et al. On the Stability of Exponential Backoff , 2003, Journal of research of the National Institute of Standards and Technology.
[25] Michael A. Bender,et al. Scaling Exponential Backoff , 2018, J. ACM.
[26] Thanasis Tsantilas,et al. Efficient optical communication in parallel computers , 1992, SPAA '92.
[27] Aravind Srinivasan,et al. Contention resolution with constant expected delay , 2000, JACM.
[28] Christian Scheideler,et al. Competitive and Fair Medium Access Despite Reactive Jamming , 2011, 2011 31st International Conference on Distributed Computing Systems.
[29] Antonio Fernández,et al. Unbounded Contention Resolution in Multiple-Access Channels , 2011, PODC '11.
[30] Eli Upfal,et al. Stochastic contention resolution with short delays , 1995, STOC '95.
[31] Dariusz R. Kowalski,et al. A better wake-up in radio networks , 2004, PODC '04.
[32] James R. Goodman,et al. Speculative lock elision: enabling highly concurrent multithreaded execution , 2001, MICRO.
[33] Maurice Herlihy,et al. Transactional Memory: Architectural Support For Lock-free Data Structures , 1993, Proceedings of the 20th Annual International Symposium on Computer Architecture.
[34] Grzegorz Stachowiak,et al. Asynchronous Shared Channel , 2017, PODC.
[35] Christian Scheideler,et al. Competitive throughput in multi-hop wireless networks despite adaptive jamming , 2012, Distributed Computing.
[36] Michael A. Bender,et al. Contention resolution with log-logstar channel accesses , 2016, STOC.
[37] Marek Chrobak,et al. The wake-up problem in multi-hop radio networks , 2004, SODA '04.
[38] Colin McDiarmid,et al. Surveys in Combinatorics, 1989: On the method of bounded differences , 1989 .
[39] Michael A. Bender,et al. How to Scale Exponential Backoff: Constant Throughput, Polylog Access Attempts, and Robustness , 2016, SODA.
[40] Leslie Ann Goldberg,et al. Analysis of practical backoff protocols for contention resolution with multiple servers , 1996, SODA '96.
[41] Dariusz R. Kowalski,et al. On the Wake-Up Problem in Radio Networks , 2005, ICALP.
[42] Frank Thomson Leighton,et al. Doubly Logarithmic Communication Algorithms for Optical-Communication Parallel Computers , 1997, SIAM J. Comput..
[43] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[44] Bogdan S. Chlebus,et al. Adversarial Multiple Access Channel with Individual Injection Rates , 2009, OPODIS.
[45] Albert G. Greenberg,et al. A lower bound on the time needed in the worst case to resolve conflicts deterministically in multiple access channels , 1985, JACM.