Sciweavers

74 search results - page 2 / 15
» Throughput Analysis of Multiple Access Relay Channel under C...
Sort
View
JSAC
2011
127views more  JSAC 2011»
12 years 12 months ago
Opportunistic Multiple Access for Cognitive Radio Networks
—In this paper, opportunistic multiple access to the under-utilized channel resources is investigated. Exploiting source burstiness, secondary cognitive nodes utilizes primary no...
Amr A. El-Sherif, Ahmed K. Sadek, K. J. Ray Liu
IWCMC
2009
ACM
14 years 8 hour ago
Carrier sense multiple access with enhanced collision avoidance: a performance analysis
Abstract—Carrier Sense Multiple Access with Enhanced Collision Avoidance (CSMA/ECA) is a recently proposed modification to the well-known CSMA/CA protocol. By using a determinis...
Jaume Barceló, Boris Bellalta, Cristina Can...
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 6 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
TSP
2008
145views more  TSP 2008»
13 years 5 months ago
Multichannel ALLIANCES: A Cooperative Cross-Layer Scheme for Wireless Networks
A random access protocol named ALLIANCES was recently proposed, that achieves high throughput by resolving collisions in wireless networks. ALLIANCES exploits diversity provided b...
Lun Dong, Athina P. Petropulu
INFOCOM
1989
IEEE
13 years 9 months ago
An Efficient Multiple-Access Method for the Binary Adder Channel
Consider M - HChoose P - T communications: T users or less, out of M potential users, are chosen at random to simultaneously transmit binary data over a common channel. A method f...
Israel Bar-David, Eli Plotnik, Raphael Rom