• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 140
Next 10 →

Courtesy Piggybacking: Supporting Differentiated

by Services Multihop, Mobile Ad
"... Abstract—Due to the salient characteristics such as the timevarying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with different ..."
Abstract - Add to MetaCart
Piggybacking (CP) to address this problem. With the recognition of inter-layer coupling, our Courtesy Piggybacking scheme exploits the channel dynamics and stochastic traffic features to alleviate the conflict. The basic idea is to let the high priority traffic help the low priority traffic by sharing unused

Courtesy piggybacking: Supporting differentiated services in multiop mobile ad hoc networks

by Wei Liu, Student Member, Xiang Chen, Student Member, Yuguang Fang, Senior Member, John M. Shea - IEEE Transactions on Mobile Computing , 2004
"... Abstract—Due to the salient characteristics such as the time-varying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with differen ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
Piggybacking to address this problem. With the recognition of interlayer coupling, our Courtesy Piggybacking scheme exploits the channel dynamics and stochastic traffic features to alleviate the conflict. The basic idea is to let the high-priority traffic help the low-priority traffic by sharing unused

Piggyback resistive Micromegas

by D. Attié, A. Chaus, D. Dur, D. Deforges, E. Ferrer-ribas, J. Galán, A. Gongadze, F. J. Iguaz, F. Jeanneau, R. De Oliveira, A. Peyaud, A. Teixeira , 2013
"... Piggyback Micromegas consists in a novel readout architecture where the anode element is made of a resistive layer on a ceramic substrate. The resistive layer is deposited on the thin ceramic substrate by an industrial process which provides large dynamic range of resistivity (106 to 1010MΩ/square). ..."
Abstract - Add to MetaCart
Piggyback Micromegas consists in a novel readout architecture where the anode element is made of a resistive layer on a ceramic substrate. The resistive layer is deposited on the thin ceramic substrate by an industrial process which provides large dynamic range of resistivity (106 to 1010MΩ

DNS resolution with renewal using piggyback

by Beakcheol Jang, Dongman Lee, Kilnam Chon, Hyunchul Kim - In Proceedings of the Twelfth International World Wide Web Conference (Poster , 2003
"... Abstract: Domain Name System (DNS) is a primary identification mechanism for Internet applications. However, DNS resolutions often take an unbearably long time, and this could seriously im-pair the consistency of the service quality of Internet applications based on DNS such as World-Wide Web. Sever ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
. Several approaches re-duce DNS resolution time by proactively refreshing expired cached records or prefetching available records beforehand, but these ap-proaches have an inherent problem in that they cause additional DNS traffic. In this paper, we propose a DNS resolution time re-duction scheme, named

TRANSMISSION CONTROL PROTOCOL PERFORMANCE COMPARISON USING PIGGYBACK SCHEME IN WLANS

by Ali Ahmad Milad, Zul Azri, Bin Muhamad Noh, Abdul Samad Shibghatullah, Shahrin Sahib, Rabiah Ahmad, Mustafa Almahdi Algaet
"... The main problem at wireless networks is the overhead at MAC layer; when the data physical rate is increasing it causes increasing the overhead and decreasing at the MAC efficiency. In this study we study the performance comparison of TCP protocol in WLANs with and without using piggyback. The study ..."
Abstract - Add to MetaCart
. The study of results concerning of implemented both mechanisms in NS2 simulator and find out the good performance from this comparison. Based on the results from our experiments show that the Piggyback scheme is one of the efficient ways to reduce the overhead at MAC wireless networks.

IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms

by Yang Xiao - IEEE TRANS. WIRELESS COMMUN , 2005
"... The IEEE 802.11 medium access control (MAC) is a very robust protocol for the best effort service in the wireless medium. However, many studies have reported that it is not very efficient. One of the fundamental problems of MAC inefficiency is overhead. In this paper, we propose two novel mechanism ..."
Abstract - Cited by 22 (8 self) - Add to MetaCart
mechanisms to reduce overhead of the IEEE 802.11 protocols: 1) concatenation mechanism (CM); and 2) piggyback mechanism (PM). Performance analysis is conducted under both the best-case scenario and the saturation scenario. Studies show that both proposed schemes have greatly improved the system performance.

Time-domain modeling of batching under user interaction and dynamic adaptive piggybacking

by W. Ke, P. Basu, T. D. C. Little - In Proceedings of the 2002 IS&T/SPIE Conference on Multimedia Computing and Networking (MMCN’02 , 2002
"... Abstract – Provision of Video-on-Demand services requires sustained periods of high bandwidth network and server capacity. Aggregation schemes can be used to increase the supported customer population under the constraints of this resource. To this end, a number of aggregation algorithms have been p ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
using the well known convolution theorem. We model two aggregation schemes using this technique: (1) Batching by timeout and (2) Adaptive Piggybacking employing Snapshot-RSMA [1, 2, 3]. We delineate the requirements of the VoD system under which this technique can be employed and show that it yields

The Hedge Fund Game: Incentives, Excess Returns, and Piggy‐Backing

by Dean P. Foster, H. Peyton Young, Joe Perkins, Kislaya Prasad, Tarun Ramadorai, Neil Shepard, Robert Stine , 2008
"... We show that it is very difficult to structure incentive schemes that distinguish between unskilled hedge fund managers, who cannot generate excess returns, and highly skilled managers who can consistently deliver such returns. Under any incentive scheme that does not levy penalties for underperform ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
We show that it is very difficult to structure incentive schemes that distinguish between unskilled hedge fund managers, who cannot generate excess returns, and highly skilled managers who can consistently deliver such returns. Under any incentive scheme that does not levy penalties

Piggybacking an additional lonely bit on linearly coded payload data

by Erik G Larsson , Reza Moosavi , Erik G Larsson , Reza Moosavi , Erik G Larsson , Reza Moosavi - IEEE Wireless. Commun. Lett , 2012
"... Abstract-We provide a coding scheme, by which an additional lonely bit can be piggybacked on a payload data packet encoded with a linear channel code, at no essential extra cost in power or bandwidth. The underlying principle is to use the additional bit to select which of two linear codes that sho ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract-We provide a coding scheme, by which an additional lonely bit can be piggybacked on a payload data packet encoded with a linear channel code, at no essential extra cost in power or bandwidth. The underlying principle is to use the additional bit to select which of two linear codes

Bayesian Piggyback Control for Improving Real-Time Communication Quality

by Wei-cheng Xiao, Kuan-ta Chen
"... Abstract—The critical tasks in designing a real-time commu-nication system, such as online games, voice chat, and video conference applications, is to keep the end-to-end delay and jitter as low as possible. Delays and jitters are usually caused by network congestion and packet losses. A packet loss ..."
Abstract - Add to MetaCart
. We show that our loss detector can achieve high accuracy and high probability of detection as the false alarm ratio is lower than 20%. In addition, we also present a piggyback scheme for packet retransmission. Cooperated with the loss detector, the piggyback scheme can reduce the end-to-end delay
Next 10 →
Results 1 - 10 of 140
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University