In this paper, we develop a random access scheme which combines the widely used binary exponential backoff (BEB) algorithm with a cross-layer tree algorithm (TA) that relies on suc...
The validity and usefulness of system simulation has been well-established for decades in areas such as computer and communications systems, general manufacturing systems, and mil...
Daniel T. Brunner, Gary Cross, Catherine McGhee, J...
— We consider the use of binary proximity sensors for tracking targets. Such sensors provide only 1-bit information regarding a target’s presence or absence in their vicinity, ...
WooYoung Kim, Kirill Mechitov, Jeung-Yoon Choi, So...
An alternate formulation of the classical vehicle routing problem with stochastic demands (VRPSD) is considered. We propose a new heuristic method to solve the problem. The algori...
—In IEEE 802.11-based wireless mesh networks a user is associated with an access point (AP) in order to communicate and be part of the overall network. The association mechanism ...