• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,245
Next 10 →

Cross-Layer Design for Wireless Networks

by Sanjay Shakkottai, Peter C. Karlsson - IEEE Communications Magazine , 2003
"... As the cellular and PCS world collides with Wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This paper highlights some of the pa ..."
Abstract - Cited by 254 (2 self) - Add to MetaCart
As the cellular and PCS world collides with Wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This paper highlights some

Resource Allocation in cellular Network: A cross layer approach

by Yashpal Rohilla, Preeti Gulia
"... As the cellular and PC’S world collide with Wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice composite infrastructure of cellular base stations and Ethernet-based wireless access points. A cross layer design is a way of getting the better ..."
Abstract - Add to MetaCart
As the cellular and PC’S world collide with Wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice composite infrastructure of cellular base stations and Ethernet-based wireless access points. A cross layer design is a way of getting the better

TOPICS IN EMERGING TECHNOLOGIES Cross-Layer Design for Wireless Networks

by Sanjay Shakkottai, Texas Austin, Peter C. Karlsson, Teliasonera Sweden
"... As the cellular and PCS world collides with wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This article highlights some of the ..."
Abstract - Add to MetaCart
As the cellular and PCS world collides with wireless LANs and Internet-based packet data, new networking approaches will support the integration of voice and data on the composite infrastructure of cellular base stations and Ethernet-based wireless access points. This article highlights some

Wireless mesh networks: a survey

by Ian F. Akyildiz, Xudong Wang, Weilin Wang - COMPUTER NETWORKS , 2005
"... Wireless meshnet8Ex8 (WMNs)consist of meshrout6L and meshclient8 where meshroutfix have minimal mobilit and formtr backbone of WMNs. They provide netide access for bot mesh andconvent1)fi8 clientt TheintL gratLfl of WMNs wit ot8 net8866 such as t1Int6fiPx1 cellular, IEEE 802.11, IEEE 802.15, IEEE 8 ..."
Abstract - Cited by 687 (12 self) - Add to MetaCart
Wireless meshnet8Ex8 (WMNs)consist of meshrout6L and meshclient8 where meshroutfix have minimal mobilit and formtr backbone of WMNs. They provide netide access for bot mesh andconvent1)fi8 clientt TheintL gratLfl of WMNs wit ot8 net8866 such as t1Int6fiPx1 cellular, IEEE 802.11, IEEE 802.15, IEEE

SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks

by Yih-Chun Hu, David B. Johnson, Adrian Perrig , 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract - Cited by 534 (8 self) - Add to MetaCart
An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance

Multicast Operation of the Ad-hoc On-Demand Distance Vector Routing Protocol

by Elizabeth M. Royer, Charles E. Perkins , 1999
"... An ad-hoc network is the cooperative engagement of a collection of (typically wireless) mobile nodes without the required intervention of any centralized access point or existing infrastructure. To provide optimal communication ability, a routing protocol for such a dynamic self-starting network mu ..."
Abstract - Cited by 446 (3 self) - Add to MetaCart
An ad-hoc network is the cooperative engagement of a collection of (typically wireless) mobile nodes without the required intervention of any centralized access point or existing infrastructure. To provide optimal communication ability, a routing protocol for such a dynamic self-starting network

Performance Anomaly of 802.11b

by Martin Heusse, Franck Rousseau, Gilles Berger-sabbatel, Andrzej Duda - In IEEE INFOCOM , 2003
"... Abstract — We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance of all hosts is considerably degraded. Such a situation is a common case in wireless local area networks in which ..."
Abstract - Cited by 431 (11 self) - Add to MetaCart
in which a host far away from an Access Point is subject to important signal fading and interference. To cope with this problem, the host changes its modulation type, which degrades its bit rate to some lower value. Typically, 802.11b products degrade the bit rate from 11 Mb/s to 5.5, 2, or 1 Mb/s when

Analysis of a Campus-wide Wireless Network

by David Kotz, Kobby Essien - In Proceedings of ACM Mobicom , 2002
"... Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace o ..."
Abstract - Cited by 308 (18 self) - Add to MetaCart
of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus population, using a campus-wide network of 476 access points spread over 161 buildings. Our study expands on those done by Tang and Baker, with a

Network Coding for Distributed Storage Systems

by Alexandros G. Dimakis, P. Brighten Godfrey, Yunnan Wu, Martin O. Wainwright, Kannan Ramchandran , 2008
"... Distributed storage systems provide reliable access to data through redundancy spread over individually unreliable nodes. Application scenarios include data centers, peer-to-peer storage systems, and storage in wireless networks. Storing data using an erasure code, in fragments spread across nodes, ..."
Abstract - Cited by 338 (13 self) - Add to MetaCart
Distributed storage systems provide reliable access to data through redundancy spread over individually unreliable nodes. Application scenarios include data centers, peer-to-peer storage systems, and storage in wireless networks. Storing data using an erasure code, in fragments spread across nodes

Stochastic Geometry and Wireless Networks, Volume I: Thepory

by François Baccelli, Bartłomiej Błaszczyszyn , 2009
"... A wireless communication network can be viewed as a collection of nodes, located in some domain, which can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users, base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, ..."
Abstract - Cited by 251 (35 self) - Add to MetaCart
A wireless communication network can be viewed as a collection of nodes, located in some domain, which can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users, base stations in a cellular network, access points of a WiFi mesh etc.). At a given time
Next 10 →
Results 1 - 10 of 3,245
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University