Sciweavers

2268 search results - page 338 / 454
» Modeling wireless shadow networks
Sort
View
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 11 months ago
A Model-based Admission Control for IEEE 802.11e Networks
Abstract—The recently approved IEEE 802.11e standard improves the support for real-time multimedia applications in Wireless LANs. Yet, to provide some level of guarantee in terms...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
157
Voted
CISS
2008
IEEE
15 years 7 months ago
Client-centric fractional frequency reuse based on user cooperation in OFDMA networks
Abstract--This paper proposes client-centric fractional frequency reuse (CC-FFR) techniques for interference mitigation in OFDMA-based cellular wireless networks. In this framework...
Stefan Geirhofer, Ozgur Oyman
WIOPT
2006
IEEE
15 years 11 months ago
Achievable performance improvements provided by cooperative diversity
— This paper examines the achievable performance gains when a particular class of cooperative relaying known as best-select is employed. In essence, best-select seeks to improve ...
Stephan Bohacek
ADHOCNOW
2003
Springer
15 years 10 months ago
Topology Control Problems under Symmetric and Asymmetric Power Thresholds
We consider topology control problems where the goal is to assign transmission powers to the nodes of an ad hoc network so as to induce graphs satisfying specific properties. The ...
Sven Oliver Krumke, Rui Liu, Errol L. Lloyd, Madha...
166
Voted
LCN
1998
IEEE
15 years 9 months ago
Effect of Hidden Terminals on the Performance of IEEE 802.11 MAC Protocol
The hidden terminal problem is unique to wireless networks and as of now, there is very limited understanding about it's effects on network performance. Results are presented...
Sumit Khurana, Anurag Kahol, Anura P. Jayasumana