Results 1 - 10
of
16,502
Effective Collision Avoidance Mechanism for RFID Tags
"... Abstract — RFID is technologies which transfer data between electronic tag and reader by radio frequency for the purpose of database auditing. RFID systems are used for automated identification. It is also called Automated Data Collection technology. In this, binary tree anti-collision protocol sear ..."
Abstract
- Add to MetaCart
Abstract — RFID is technologies which transfer data between electronic tag and reader by radio frequency for the purpose of database auditing. RFID systems are used for automated identification. It is also called Automated Data Collection technology. In this, binary tree anti-collision protocol
ANALYZING THE PERFORMANCE OF WIRELESS LOCAL AREA NETWORKS WITH AN IMPROVED COLLISION AVOIDANCE MECHANISM
"... Abstract- This paper presents and analyzes a collision avoidance mechanism that increases the throughput and decreases the delay in wireless local area networks. The analysis considers the IEEE 802.11 standard parameters employed in the Distributed Coordination Function used in the Ad Hoc mode opera ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract- This paper presents and analyzes a collision avoidance mechanism that increases the throughput and decreases the delay in wireless local area networks. The analysis considers the IEEE 802.11 standard parameters employed in the Distributed Coordination Function used in the Ad Hoc mode
A Collision Avoidance Mechanism for IEEE 802.11e EDCA Protocol to Improve Voice Transmissions in Wireless Local Area Networks
"... Abstract—Enhanced distributed channel access (EDCA) is the basis protocol in IEEE 802.11e protocol suite. It is used for providing differentiated quality of service (QoS) in IEEE 802.11e standard wireless local area networks (WLANs). One of the main drawbacks in EDCA protocol is the values used for ..."
Abstract
- Add to MetaCart
throughput performance even when the network size is small. In this paper, we propose a new modification to the collision avoidance mechanism used by AC VO queues without seriously effecting the performance of other traffic categories such as video and data. Extensive simulations are carried out to verify
Real-Time Obstacle Avoidance for Manipulators and Mobile Robots
- INT. JOUR OF ROBOTIC RESEARCH
, 1986
"... This paper presents a unique real-time obstacle avoidance approach for manipulators and mobile robots based on the artificial potential field concept. Collision avoidance, tradi-tionally considered a high level planning problem, can be effectively distributed between different levels of control, al- ..."
Abstract
-
Cited by 1345 (28 self)
- Add to MetaCart
This paper presents a unique real-time obstacle avoidance approach for manipulators and mobile robots based on the artificial potential field concept. Collision avoidance, tradi-tionally considered a high level planning problem, can be effectively distributed between different levels of control, al
The Dynamic Window Approach to Collision Avoidance
"... This paper describes the dynamic window approach to reactive collision avoidance for mobile robots equipped with synchro-drives. The approach is derived directly from the motion dynamics of the robot and is therefore particularly well-suited for robots operating at high speed. It differs from previo ..."
Abstract
-
Cited by 433 (32 self)
- Add to MetaCart
This paper describes the dynamic window approach to reactive collision avoidance for mobile robots equipped with synchro-drives. The approach is derived directly from the motion dynamics of the robot and is therefore particularly well-suited for robots operating at high speed. It differs from
Random Early Detection Gateways for Congestion Avoidance.
- IEEELACM Transactions on Networking,
, 1993
"... Abstract-This paper presents Random Early Detection (RED) gateways for congestion avoidance in packet-switched networks. The gateway detects incipient congestion by computing the average queue size. The gateway could notify connections of congestion either by dropping packets arriving at the gatewa ..."
Abstract
-
Cited by 2716 (31 self)
- Add to MetaCart
avoidance scheme [ 18], described later in this paper, is an early example of congestion detection at the gateway; DECbit gateways give explicit feedback when the average queue size exceeds a certain threshold. This paper proposes a different congestion avoidance mechanism at the gateway, RED (Random Early
The Vector Field Histogram -- Fast Obstacle Avoidance For Mobile Robots
- IEEE JOURNAL OF ROBOTICS AND AUTOMATION
, 1991
"... A new real-time obstacle avoidance method for mobile robots has been developed and implemented. This method, named the vector field histogram(VFH), permits the detection of unknown obstacles and avoids collisions while simultaneously steering the mobile robot toward the target. The VFH method uses a ..."
Abstract
-
Cited by 484 (24 self)
- Add to MetaCart
A new real-time obstacle avoidance method for mobile robots has been developed and implemented. This method, named the vector field histogram(VFH), permits the detection of unknown obstacles and avoids collisions while simultaneously steering the mobile robot toward the target. The VFH method uses
Performance Analysis of the IEEE 802.11 Distributed Coordination Function
, 2000
"... Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary slott ..."
Abstract
-
Cited by 1869 (1 self)
- Add to MetaCart
Recently, the IEEE has standardized the 802.11 protocol for Wireless Local Area Networks. The primary medium access control (MAC) technique of 802.11 is called distributed coordination function (DCF). DCF is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme with binary
A comparison of mechanisms for improving TCP performance over wireless links
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1997
"... Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. However, networks with wireless and other lossy links also suffer from significant losses due to bit errors and handoffs. TCP responds to all losses by i ..."
Abstract
-
Cited by 927 (11 self)
- Add to MetaCart
by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance in wireless and lossy systems. In this paper, we compare several schemes designed to improve the performance of TCP in such networks. We classify these schemes into three broad categories: end
Results 1 - 10
of
16,502