A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks

T Korakis, G Jakllari, L Tassiulas - … on Mobile ad hoc networking & …, 2003 - dl.acm.org
Directional antennas in ad hoc networks offer many benefits compared with classical
omnidirectional antennas. The most important include significant increase of spatial reuse, …

[PDF][PDF] Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage

A Mishra, E Rozner, S Banerjee… - Proceedings of the 5th …, 2005 - usenix.org
… are important to utilize the full capacity of a mesh network. Channel assignment affects the
… which utilizes a single wireless card to connect to multiple networks by constantly switching …

Empowering full-duplex wireless communication by exploiting directional diversity

E Everett, M Duarte, C Dick… - 2011 Conference record …, 2011 - ieeexplore.ieee.org
… in Figure 5(a) that full-duplex performs quite well when directionality is exploited and
both RF and digital cancellation are employed. At 10 m range full-duplex outperforms half-duplex …

Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks

JN Laneman, GW Wornell - IEEE Transactions on Information …, 2003 - ieeexplore.ieee.org
… multiple protocol layers in a wireless network. The protocols exploit spatial diversity available
among a … We demonstrate that these protocols achieve full spatial diversity in the number of …

Distributed approaches for exploiting multiuser diversity in wireless networks

X Qin, RA Berry - IEEE Transactions on information theory, 2006 - ieeexplore.ieee.org
… diversity can be exploited by scheduling … for exploiting multiuser diversity with only local
channel knowledge. A variation of the ALOHA protocol is given in which users attempt to exploit

Intelligent interference exploitation for heterogeneous cellular networks against eavesdropping

Y Zou - IEEE Journal on Selected Areas in Communications, 2018 - ieeexplore.ieee.org
… the perfect secrecy by taking full advantage of physical characteristics of wireless channels
[14]… and that of wiretap channel, which is severely degraded in wireless fading environments. …

Detecting selfish exploitation of carrier sensing in 802.11 networks

K Pelechrinis, G Yan, S Eidenbenz… - IEEE INFOCOM …, 2009 - ieeexplore.ieee.org
… the performance of Wireless LANs. However, CCA tuning can be exploited by selfish nodes
in … This full text paper was peer reviewed at the direction of IEEE Communications Society …

FDOE: Exploit concurrent communication opportunities in full-duplex wireless mesh networks

M Yu, A Tang, X Wang, J Liu - IEEE Transactions on Mobile …, 2022 - ieeexplore.ieee.org
… duplex can still achieve high throughput gain as long as fullduplex links can be efficiently …
fullduplex links to exploit concurrent transmission opportunities in a wireless mesh network. …

On sampled reinforcement learning in wireless networks: Exploitation of policy structures

L Liu, U Mitra - IEEE Transactions on Communications, 2020 - ieeexplore.ieee.org
… Nevertheless, complexity reduction can be achieved by exploiting the particular structure of
… Numerical experiments on a single link wireless network with a large state space show that …

On the exploitation of CDF based wireless scheduling

U Ben-Porat, A Bremler-Barr, H Levy - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
… in wireless data networks by exploiting channel fluctuations. A highly desired property of
such a scheduling strategy is that its algorithm will be stable, in the sense that no user has …