Sciweavers

ICC
2009
IEEE
149views Communications» more  ICC 2009»
13 years 9 months ago
Adoption of Cognitive Radio Scheme to Class-Based Call Admission Control
Abstract--By using cognitive radio technology, opportunistic spectrum access has the potential to solve the underused spectrum problem. In this paper, we employ class-based call ad...
Dongyue Xue, Hui Yu, Xinbing Wang, Hsiao-Hwa Chen
INFOCOM
2003
IEEE
14 years 4 months ago
Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802.11 network
Abstract— Throughput performance of the IEEE 802.11 Distributed Coordination Function (DCF) is very sensitive to the number n of competing stations. The contribute of this paper ...
Giuseppe Bianchi, Ilenia Tinnirello
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
14 years 5 months ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
WCNC
2008
IEEE
14 years 6 months ago
Performance Comparison of Uplink WLANs with Single-User and Multi-User MIMO Schemes
— In this paper, we compare the performance of wireless local area networks (WLANs) with single-user MIMO (SU-MIMO) and multi-user MIMO (MU-MIMO) in terms of collision probabilit...
Hu Jin, Bang Chul Jung, Ho Young Hwang, Dan Keun S...
SAC
2010
ACM
14 years 6 months ago
Analysis of collision probability in unsaturated situation
A large number of the MAC protocols proposed for establishing wireless sensor networks are based on the 802.11 standard. The trade-off in these protocols is the control packet ov...
Qian Dong, Waltenegus Dargie