Sciweavers

2392 search results - page 39 / 479
» Channel-Hopping Multiple Access
Sort
View
WCRE
2009
IEEE
14 years 2 months ago
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis
Feature models are widely employed in domainspecific software development to specify the domain requirements with commonality and variability. A feature model is usually construct...
Yiming Yang, Xin Peng, Wenyun Zhao
ICOIN
2003
Springer
14 years 18 days ago
Periodic Communication Support in Multiple Access Networks Exploiting Token with Timer
Timed token medium access protocols are widely adopted in real-time multiple access networks because of bounded access time. However, timed token protocols inadequately provide per...
Young-yeol Choo, Cheeha Kim
JSAC
2011
127views more  JSAC 2011»
13 years 1 months ago
Opportunistic Multiple Access for Cognitive Radio Networks
—In this paper, opportunistic multiple access to the under-utilized channel resources is investigated. Exploiting source burstiness, secondary cognitive nodes utilizes primary no...
Amr A. El-Sherif, Ahmed K. Sadek, K. J. Ray Liu
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 1 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
AINA
2009
IEEE
14 years 2 months ago
Optimization of iSCSI Remote Storage Access through Multiple Layers
iSCSI has a problem of drastic performance deterioration in the case of longer-latency. Thus, we have optimized iSCSI remote storage access through multiple layers. As a result, w...
Reika Higa, Kosuke Matsubara, Takao Okamawari, San...