Results 1 - 10
of
1,340
Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 2000
"... In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically ..."
Abstract
-
Cited by 445 (13 self)
- Add to MetaCart
In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we
A Descriptive Framework of Workspace Awareness for RealTime Groupware
- Computer Supported Cooperative Work
, 2002
"... Abstract. Supporting awareness of others is an idea that holds promise for improving the usability of real-time distributed groupware. However, there is little principled information available about awareness that can be used by groupware designers. In this article, we develop a descriptive theory o ..."
Abstract
-
Cited by 251 (26 self)
- Add to MetaCart
of awareness for the purpose of aiding groupware design, focusing on one kind of group awareness called workspace awareness. We focus on how small groups perform generation and execution tasks in medium-sized shared workspaces – tasks where group members frequently shift between individual and shared
Energy-aware routing in cluster-based sensor networks
, 2002
"... Recently there has been a growing interest in the applications of sensor networks. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial in extending the life of the sensor. In this paper, we present a novel approach for energy-aware and co ..."
Abstract
-
Cited by 154 (11 self)
- Add to MetaCart
Recently there has been a growing interest in the applications of sensor networks. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial in extending the life of the sensor. In this paper, we present a novel approach for energy-aware
Energy-Efficient Surveillance System Using Wireless Sensor Networks
- In Mobisys
, 2004
"... The focus of surveillance missions is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve a high element of risk for human personnel and require a high degree of stealthiness. Hence, the ability to deploy unmanned surveillance miss ..."
Abstract
-
Cited by 212 (31 self)
- Add to MetaCart
missions, by using wireless sensor networks, is of great practical importance for the military. Because of the energy constraints of sensor devices, such systems necessitate an energy-aware design to ensure the longevity of surveillance missions. Solutions proposed recently for this type of system show
Contention-aware admission control for ad hoc networks
"... An admission control algorithm must coordinate between flows in order to provide guarantees about how the medium is shared. In wired networks, nodes can monitor the medium to see how much bandwidth is being used. However, in ad hoc networks, communication from one node may consume the bandwidth of n ..."
Abstract
-
Cited by 112 (3 self)
- Add to MetaCart
An admission control algorithm must coordinate between flows in order to provide guarantees about how the medium is shared. In wired networks, nodes can monitor the medium to see how much bandwidth is being used. However, in ad hoc networks, communication from one node may consume the bandwidth
An Analysis of Wireless Network Coding for Unicast Sessions: The Case for Coding-Aware Routing
- in Proc. of IEEE INFOCOM
, 2007
"... Abstract — A recent approach, COPE [10], for improving the throughput of unicast traffic in wireless multi-hop networks exploits the broadcast nature of the wireless medium through opportunistic network coding. In this paper, we analyze throughput improvements obtained by COPE-type network coding in ..."
Abstract
-
Cited by 109 (1 self)
- Add to MetaCart
Abstract — A recent approach, COPE [10], for improving the throughput of unicast traffic in wireless multi-hop networks exploits the broadcast nature of the wireless medium through opportunistic network coding. In this paper, we analyze throughput improvements obtained by COPE-type network coding
Vigilnet: An Integrated Sensor Network System for Energy-Efficient Surveillance
- ACM Transaction on Sensor Networks
, 2006
"... This article describes one of the major efforts in the sensor network community to build an integrated sensor network system for surveillance missions. The focus of this effort is to acquire and verify information about enemy capabilities and positions of hostile targets. Such missions often involve ..."
Abstract
-
Cited by 159 (36 self)
- Add to MetaCart
involve a high element of risk for human personnel and require a high degree of stealthiness. Hence, the ability to deploy unmanned surveillance missions, by using wireless sensor networks, is of great practical importance for the military. Because of the energy constraints of sensor devices, such systems
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
- IEEE Transactions on Mobile Computing
, 2002
"... Abstract—PEDAMACS is a Time Division Multiple Access (TDMA) scheme that extends the common single hop TDMA to a multihop sensor network, using a high-powered access point to synchronize the nodes and to schedule their transmissions and receptions. The protocol first enables the access point to gathe ..."
Abstract
-
Cited by 53 (6 self)
- Add to MetaCart
Abstract—PEDAMACS is a Time Division Multiple Access (TDMA) scheme that extends the common single hop TDMA to a multihop sensor network, using a high-powered access point to synchronize the nodes and to schedule their transmissions and receptions. The protocol first enables the access point
Exploiting multiuser diversity for medium access control in wireless networks
- Proc. of IEEE INFOCOM
, 2003
"... Abstract--- Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be exploited by scheduling transmissions so that users transmit when their channel conditions are favorable. Using such an approach leads to a system capacity that ..."
Abstract
-
Cited by 98 (5 self)
- Add to MetaCart
that increases with the number of users. However, such scheduling requires centralized control. In this paper, we consider a decentralized medium access control (MAC) protocol, where each user only has knowledge of its own channel gain. We consider a variation of the ALOHA protocol, channel-aware ALOHA; using
Energy-aware TDMA-based MAC for sensor networks
- IEEE Workshop on Integrated Management of Power Aware Communications, Computing and Networking (IMPACCT 2002
, 2002
"... Networking unattended sensors is expected to have a significant impact on the efficiency of many military and civil applications. Sensors in such systems are typically disposable and expected to last until their energy drains. Therefore, energy is a very scarce resource for such sensor systems and h ..."
Abstract
-
Cited by 77 (6 self)
- Add to MetaCart
Networking unattended sensors is expected to have a significant impact on the efficiency of many military and civil applications. Sensors in such systems are typically disposable and expected to last until their energy drains. Therefore, energy is a very scarce resource for such sensor systems
Results 1 - 10
of
1,340