The capacity of wireless CSMA/CA networks

R Laufer, L Kleinrock - IEEE/ACM Transactions on Networking, 2015 - ieeexplore.ieee.org
Due to a poor understanding of the interactions among transmitters, wireless networks using
carrier sense multiple access with collision avoidance (CSMA/CA) have been commonly …

End-to-end delay analysis for IEEE 802.11 string-topology multi-hop networks

K Sanada, J Shi, N Komuro… - IEICE Transactions on …, 2015 - search.ieice.org
String-topology multi-hop network is often selected as an analysis object because it is one of
the fundamental network topologies. The purpose of this paper is to establish expression for …

Visual data association in narrow-bandwidth networks

D Tardioli, E Montijano… - 2015 IEEE/RSJ …, 2015 - ieeexplore.ieee.org
The performance of any cooperative task that involves two or more robots will be determined
by their capacity to recognize common information of the environment. Vision sensors are …

End-to-end throughput and delay analysis for IEEE 802.11 string topology multi-hop network using Markov-chain model

K Sanada, N Komuro, H Sekiya - 2015 IEEE 26th Annual …, 2015 - ieeexplore.ieee.org
This paper proposes the analytical expressions for the IEEE 802.11 string-topology multi-
hop networks using Markov-chain model. For achieving that, the proposed analysis …

Increasing user perceived quality by selective load balancing of video traffic in wireless networks

A Hava, Y Ghamri-Doudane… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Wireless mesh networks (WMNs) are becoming increasingly popular mostly due to their
deployment flexibility. The main drawback of these networks is their lack of guaranteeing …

Performance evaluation of unmanned aerial vehicle ad hoc networks

R Grodi, DB Rawat, C Bajracharya - SoutheastCon 2015, 2015 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) can form an ad-hoc network to communicate and
cooperate with each other via wireless links. UAV ad hoc networks have the potential to …

DiscoverFriends: Secure social network communication in mobile ad hoc networks

E Chung, J Joy, M Gerla - 2015 International Wireless …, 2015 - ieeexplore.ieee.org
This paper presents a secure communication application called DiscoverFriends. Its
purpose is to communicate to a group of online friends while bypassing their respective …

End-to-end throughput analysis for IEEE 802.11 e EDCA string-topology wireless multi-hop networks

Y Shimoyamada, K Sanada, N Komuro… - Nonlinear Theory and Its …, 2015 - jstage.jst.go.jp
This paper proposes analytical expressions of end-to-end throughput for IEEE 802.11 e
Enhanced Distributed Channel Access (EDCA) wireless string-topology multi-hop networks …

Approaching single-hop performance in multihop networks: End-to-end known-interference cancelation (E2E-KIC)

F Wang, L Guo, S Wang, Q Song… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
To improve the efficiency of wireless data communications, new physical-layer transmission
methods based on known-interference cancelation (KIC) have been developed. These …

[PDF][PDF] 一种节点自分布最优Ad Hoc 多播树及其应用

戴勇谦, 张明武, 祝胜林, 朱同林, 周权, 戴勇新 - 电子学报, 2015 - ejournal.org.cn
为无线单播模式设计的RTS/CTS 信道握手机制不适用于多播模式, 导致Ad hoc
多播树节点易与隐藏终端发生冲突. 通过提出m 阶冲突域, 节点在冲突域中的分布指标 …