• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 12,992
Next 10 →

Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks

by Ros Tassiulas, Anthony Ephremides - IEEE Transactions on Automatic Control , 1992
"... Abstruct-The stability of a queueing network with interdependent servers is considered. The dependency of servers is described by the definition of their subsets that can be activated simultaneously. Multihop packet radio networks (PRN’s) provide a motivation for the consideration of this system. We ..."
Abstract - Cited by 949 (19 self) - Add to MetaCart
Abstruct-The stability of a queueing network with interdependent servers is considered. The dependency of servers is described by the definition of their subsets that can be activated simultaneously. Multihop packet radio networks (PRN’s) provide a motivation for the consideration of this system

Sensing-throughput tradeoff for cognitive radio networks

by Ying-chang Liang, Senior Member, Yonghong Zeng, Senior Member, Edward C. Y. Peh, Anh Tuan Hoang - in Proc. IEEE Int. Conf. Commun.(ICC , 2006
"... Abstract—In a cognitive radio network, the secondary users are allowed to utilize the frequency bands of primary users when these bands are not currently being used. To support this spectrum reuse functionality, the secondary users are required to sense the radio frequency environment, and once the ..."
Abstract - Cited by 291 (19 self) - Add to MetaCart
Abstract—In a cognitive radio network, the secondary users are allowed to utilize the frequency bands of primary users when these bands are not currently being used. To support this spectrum reuse functionality, the secondary users are required to sense the radio frequency environment, and once

Scheduling Algorithms for Multihop Radio Networks

by Subramanian Ramanathan - IEEE/ACM Transactions on Networking , 1993
"... Abstructqew algorithms for transmission scheduling in multi-hop broadcast radio networks are presented. Both link scheduling and broadcast scheduling are considered. In each instance, sched-uling algorithms are given that improve upon existing algorithms both theoretically and experimentally. Theore ..."
Abstract - Cited by 209 (1 self) - Add to MetaCart
Abstructqew algorithms for transmission scheduling in multi-hop broadcast radio networks are presented. Both link scheduling and broadcast scheduling are considered. In each instance, sched-uling algorithms are given that improve upon existing algorithms both theoretically and experimentally

Radio Networks

by Seah Moon Ming, Dudley Knox Library, Seah Moon Ming, Seah Moon Ming
"... 20. ABSTRACT (Continue on reverse side If necessary and Identify by block number) The use of packet virtual circuit technique for voice communica-tions in military radio networks was investigated. The work was concerned with various aspects of networking which include network modeling, communication ..."
Abstract - Add to MetaCart
20. ABSTRACT (Continue on reverse side If necessary and Identify by block number) The use of packet virtual circuit technique for voice communica-tions in military radio networks was investigated. The work was concerned with various aspects of networking which include network modeling

Multicluster, Mobile, Multimedia Radio Network

by Mario Gerla, Jack Tzu-chieh Tsai - Journal of Wireless Networks , 1995
"... A multi-cluster, multi-hop packet radio network architecture for wireless adaptive mobile information systems is presented... ..."
Abstract - Cited by 97 (9 self) - Add to MetaCart
A multi-cluster, multi-hop packet radio network architecture for wireless adaptive mobile information systems is presented...

radio networks

by Daniel K. Roberts - IEEE Trans. Veh. Technol , 1993
"... The views expressed in this thesis are those of the author and do not reflect the official ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
The views expressed in this thesis are those of the author and do not reflect the official

Radio Networks

by unknown authors
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Power Consumption in Packet Radio Networks

by Lefteris M. Kirousis, Evangelos Kranakis, Danny Krizanc, Andrzej Pelc - THEORETICAL COMPUTER SCIENCE , 1997
"... In this paper we study the problem of assigning transmission ranges to the nodes of a multihop packet radio network so as to minimize the total power consumed under the constraint that adequate power is provided to the nodes to ensure that the network is strongly connected (i.e., each node can co ..."
Abstract - Cited by 134 (2 self) - Add to MetaCart
In this paper we study the problem of assigning transmission ranges to the nodes of a multihop packet radio network so as to minimize the total power consumed under the constraint that adequate power is provided to the nodes to ensure that the network is strongly connected (i.e., each node can

Broadcast in Radio Networks

by Iris Gaber, Yishay Mansour , 1995
"... We show that for any radio network there exists a schedule of a broadcast whose time is O(D + log 5 (n)), where D is the diameter and n is the number of nodes. (This result implies an optimal broadcast to networks with D = \Omega\Gamma115 5 n).) We present a (centralized) polynomial time algorit ..."
Abstract - Cited by 58 (4 self) - Add to MetaCart
We show that for any radio network there exists a schedule of a broadcast whose time is O(D + log 5 (n)), where D is the diameter and n is the number of nodes. (This result implies an optimal broadcast to networks with D = \Omega\Gamma115 5 n).) We present a (centralized) polynomial time

Radio Networks with Reliable Communication

by Yvo Desmedt, Yongge Wang, Rei Safavi-naini, Huaxiong Wang - 11th Annual International Conference on Computing and Combinatoric, COCOON’05
"... Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the general networks modeled by hypergraphs. Radio networks have received special attention in recent years. For example, t ..."
Abstract - Cited by 7 (4 self) - Add to MetaCart
Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the general networks modeled by hypergraphs. Radio networks have received special attention in recent years. For example
Next 10 →
Results 1 - 10 of 12,992
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University