• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,340
Next 10 →

Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit

by Frederico Calì, Marco Conti, Enrico Gregori - IEEE/ACM TRANSACTIONS ON NETWORKING , 2000
"... In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically ..."
Abstract - Cited by 445 (13 self) - Add to MetaCart
In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we

A Descriptive Framework of Workspace Awareness for RealTime Groupware

by Carl Gutwin, Saul Greenberg - Computer Supported Cooperative Work , 2002
"... Abstract. Supporting awareness of others is an idea that holds promise for improving the usability of real-time distributed groupware. However, there is little principled information available about awareness that can be used by groupware designers. In this article, we develop a descriptive theory o ..."
Abstract - Cited by 251 (26 self) - Add to MetaCart
of awareness for the purpose of aiding groupware design, focusing on one kind of group awareness called workspace awareness. We focus on how small groups perform generation and execution tasks in medium-sized shared workspaces – tasks where group members frequently shift between individual and shared

Energy-aware routing in cluster-based sensor networks

by Mohamed Younis , 2002
"... Recently there has been a growing interest in the applications of sensor networks. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial in extending the life of the sensor. In this paper, we present a novel approach for energy-aware and co ..."
Abstract - Cited by 154 (11 self) - Add to MetaCart
Recently there has been a growing interest in the applications of sensor networks. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial in extending the life of the sensor. In this paper, we present a novel approach for energy-aware

Energy-Efficient Surveillance System Using Wireless Sensor Networks

by Tian He, Sudha Krishnamurthy, John A. Stankovic, Tarek Abdelzaher, Liqian Luo, Radu Stoleru, Ting Yan, Lin Gu - In Mobisys , 2004
"... The focus of surveillance missions is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve a high element of risk for human personnel and require a high degree of stealthiness. Hence, the ability to deploy unmanned surveillance miss ..."
Abstract - Cited by 212 (31 self) - Add to MetaCart
missions, by using wireless sensor networks, is of great practical importance for the military. Because of the energy constraints of sensor devices, such systems necessitate an energy-aware design to ensure the longevity of surveillance missions. Solutions proposed recently for this type of system show

Contention-aware admission control for ad hoc networks

by Yaling Yang, Robin Kravets
"... An admission control algorithm must coordinate between flows in order to provide guarantees about how the medium is shared. In wired networks, nodes can monitor the medium to see how much bandwidth is being used. However, in ad hoc networks, communication from one node may consume the bandwidth of n ..."
Abstract - Cited by 112 (3 self) - Add to MetaCart
An admission control algorithm must coordinate between flows in order to provide guarantees about how the medium is shared. In wired networks, nodes can monitor the medium to see how much bandwidth is being used. However, in ad hoc networks, communication from one node may consume the bandwidth

An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing

by Sudipta Sengupta, Shravan Rayanchu, Suman Banerjee - in Proc. of IEEE INFOCOM , 2007
"... Abstract — A recent approach, COPE [10], for improving the throughput of unicast traffic in wireless multi-hop networks exploits the broadcast nature of the wireless medium through opportunistic network coding. In this paper, we analyze throughput improvements obtained by COPE-type network coding in ..."
Abstract - Cited by 109 (1 self) - Add to MetaCart
Abstract — A recent approach, COPE [10], for improving the throughput of unicast traffic in wireless multi-hop networks exploits the broadcast nature of the wireless medium through opportunistic network coding. In this paper, we analyze throughput improvements obtained by COPE-type network coding

Vigilnet: An Integrated Sensor Network System for Energy-Efficient Surveillance

by Tian He, Sudha Krishnamurthy, Liqian Luo, Ting Yan, Lin Gu, Radu Stoleru, Gang Zhou, Qing Cao, Pascal Vicaire, John A. Stankovic, Tarek F. Abdelzaher, Jonathan Hui, Bruce Krogh, Tianhe@cs. Umn. Edu S. Krishnamurthy, Liqian Luo, T. Yan, L. Gu, R. Stoleru, G. Zhou, Qing Cao - ACM Transaction on Sensor Networks , 2006
"... This article describes one of the major efforts in the sensor network community to build an integrated sensor network system for surveillance missions. The focus of this effort is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve ..."
Abstract - Cited by 159 (36 self) - Add to MetaCart
involve a high element of risk for human personnel and require a high degree of stealthiness. Hence, the ability to deploy unmanned surveillance missions, by using wireless sensor networks, is of great practical importance for the military. Because of the energy constraints of sensor devices, such systems

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

by Sinem Coleri Ergen, Pravin Varaiya - IEEE Transactions on Mobile Computing , 2002
"... Abstract—PEDAMACS is a Time Division Multiple Access (TDMA) scheme that extends the common single hop TDMA to a multihop sensor network, using a high-powered access point to synchronize the nodes and to schedule their transmissions and receptions. The protocol first enables the access point to gathe ..."
Abstract - Cited by 53 (6 self) - Add to MetaCart
Abstract—PEDAMACS is a Time Division Multiple Access (TDMA) scheme that extends the common single hop TDMA to a multihop sensor network, using a high-powered access point to synchronize the nodes and to schedule their transmissions and receptions. The protocol first enables the access point

Exploiting multiuser diversity for medium access control in wireless networks

by Xiangping Qin, Randall Berry - Proc. of IEEE INFOCOM , 2003
"... Abstract--- Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that users transmit when their channel conditions are favorable. Using such an approach leads to a system capacity that ..."
Abstract - Cited by 98 (5 self) - Add to MetaCart
that increases with the number of users. However, such scheduling requires centralized control. In this paper, we consider a decentralized medium access control (MAC) protocol, where each user only has knowledge of its own channel gain. We consider a variation of the ALOHA protocol, channel-aware ALOHA; using

Energy-aware TDMA-based MAC for sensor networks

by Khaled A. Arisha - IEEE Workshop on Integrated Management of Power Aware Communications, Computing and Networking (IMPACCT 2002 , 2002
"... Networking unattended sensors is expected to have a significant impact on the efficiency of many military and civil applications. Sensors in such systems are typically disposable and expected to last until their energy drains. Therefore, energy is a very scarce resource for such sensor systems and h ..."
Abstract - Cited by 77 (6 self) - Add to MetaCart
Networking unattended sensors is expected to have a significant impact on the efficiency of many military and civil applications. Sensors in such systems are typically disposable and expected to last until their energy drains. Therefore, energy is a very scarce resource for such sensor systems
Next 10 →
Results 1 - 10 of 1,340
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University