Academic literature on the topic 'Deterministic medium access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deterministic medium access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Deterministic medium access"

1

Li, Zhi Wei, Qing Hua Zhong, and Hai Xia Cui. "Cooperative Medium Access Control in Distributed Wireless Sensor Networks with Multiuser Diversity." Applied Mechanics and Materials 321-324 (June 2013): 596–99. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.596.

Full text
Abstract:
This paper addresses the cooperative random access problem for distributed wireless sensor networks through network utility maximization framework based on persistence probabilistic model. To exploit spatial diversity, we also present a virtual link scheduling policy by employing multi-relay cooperative transmission and interference avoidance. Numerical results illustrate that our proposed cooperative medium access control (MAC) significantly improves the system throughput compared with the one based on deterministic model and the one without cooperative diversity.
APA, Harvard, Vancouver, ISO, and other styles
2

van den Bossche, Adrien, Thierry Val, and Eric Campo. "Modelisation and validation of a full deterministic medium access method for IEEE 802.15.4 WPAN." Ad Hoc Networks 7, no. 7 (September 2009): 1285–301. http://dx.doi.org/10.1016/j.adhoc.2008.12.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vera-Pérez, Jose, David Todolí-Ferrandis, Salvador Santonja-Climent, Javier Silvestre-Blanes, and Víctor Sempere-Payá. "A Joining Procedure and Synchronization for TSCH-RPL Wireless Sensor Networks." Sensors 18, no. 10 (October 20, 2018): 3556. http://dx.doi.org/10.3390/s18103556.

Full text
Abstract:
Wireless Sensor Networks have become a key enabler for Industrial Internet of Things (IoT) applications; however, to adapt to the derived robust communication requirements, deterministic and scheduled medium access should be used, along with other features, such as channel hopping and frequency diversity. Implementing these mechanisms requires a correct synchronization of all devices in the network, a stage in deployment that can lead to non-operational networks. The present article presents an analysis of such situations and possible solutions, including the common current approaches and recommendations, and proposes a new beacon advertising method based on a specific Trickle Timer for the Medium Access Control (MAC) Time-Slotted Channel Hopping (TSCH) layer, decoupling from the timers in the network and routing layers. With this solution, improvements in connection success, time to join, and energy consumption can be obtained for the widely extended IEEE802.15.4e standard.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Jun, Hanhua Lai, and Yan Xiong. "Concurrent Transmission Based on Distributed Scheduling for Underwater Acoustic Networks." Sensors 19, no. 8 (April 19, 2019): 1871. http://dx.doi.org/10.3390/s19081871.

Full text
Abstract:
Handshaking is a common technique used to avoid collisions in terrestrial and underwater content-based networks. However, due to the long propagation delay of the underwater acoustic channel, the conventional handshaking mechanism, which only allows one successful handshake and one pair of nodes to communicate per transmission cycle, becomes less effective in underwater acoustic networks. This paper proposes a new distributed scheduling method for underwater acoustic networks that supports multiple handshakes and concurrent transmissions in one transmission cycle for one-hop clusters. A deterministic scheduling algorithm was developed to optimize the sending sequence and time of the source nodes jointly so that the total data transmission time is shortened while avoiding collisions among multiple concurrent transmissions. The deterministic scheduling algorithm can also reduce the scheduling overhead and enables the synchronization of the data concurrent transmissions in a distributed manner via the standard two-way handshaking. Simulation results show that the proposed method outperforms several conventional underwater medium access control protocols in normalized throughput, packet delivery rate, average end-to-end delay, and average energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
5

Sawicki, Krzysztof, Grzegorz Bieszczad, and Zbigniew Piotrowski. "StegoFrameOrder—MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks." Sensors 21, no. 18 (September 18, 2021): 6268. http://dx.doi.org/10.3390/s21186268.

Full text
Abstract:
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless computer networks exploiting non-deterministic algorithms of medium access (such as the distributed coordination function), especially in IEEE 802.11 networks. Such a covert channel enables the possibility of leaking crucial information outside secured network in a manner that is difficult to detect. The SFO method embeds hidden bits of information in the relative order of frames transmitted by wireless terminals operating on the same radio channel. The paper presents an idea of this covert channel, its implementation, and possible variants. The paper also discusses implementing the SFO method in a real environment and the experiments performed in the real-world scenario.
APA, Harvard, Vancouver, ISO, and other styles
6

Isolani, Pedro H., Daniel J. Kulenkamp, Johann M. Marquez-Barja, Lisandro Z. Granville, Steven Latré, and Violet R. Syrotiuk. "Support for 5G Mission-Critical Applications in Software-Defined IEEE 802.11 Networks." Sensors 21, no. 3 (January 20, 2021): 693. http://dx.doi.org/10.3390/s21030693.

Full text
Abstract:
With the emergence of 5G networks and the stringent Quality of Service (QoS) requirements of Mission-Critical Applications (MCAs), co-existing networks are expected to deliver higher-speed connections, enhanced reliability, and lower latency. IEEE 802.11 networks, which co-exist with 5G, continue to be the access choice for indoor networks. However, traditional IEEE 802.11 networks lack sufficient reliability and they have non-deterministic latency. To dynamically control resources in IEEE 802.11 networks, in this paper we propose a delay-aware approach for Medium Access Control (MAC) management via airtime-based network slicing and traffic shaping, as well as user association while using Multi-Criteria Decision Analysis (MCDA). To fulfill the QoS requirements, we use Software-Defined Networking (SDN) for airtime-based network slicing and seamless handovers at the Software-Defined Radio Access Network (SD-RAN), while traffic shaping is done at the Stations (STAs). In addition to throughput, channel utilization, and signal strength, our approach monitors the queueing delay at the Access Points (APs) and uses it for centralized network management. We evaluate our approach in a testbed composed of APs controlled by SD-RAN and SDN controllers, with STAs under different workload combinations. Our results show that, in addition to load balancing flows across APs, our approach avoids the ping-pong effect while enhancing the QoS delivery at runtime. Under varying traffic demands, our approach maintains the queueing delay requirements of 5 ms for most of the experiment run, hence drawing closer to MCA requirements.
APA, Harvard, Vancouver, ISO, and other styles
7

Böhm, Annette, and Magnus Jonsson. "Real-Time Communication Support for Cooperative, Infrastructure-Based Traffic Safety Applications." International Journal of Vehicular Technology 2011 (June 8, 2011): 1–17. http://dx.doi.org/10.1155/2011/541903.

Full text
Abstract:
The implementation of ITS (Intelligent Transport Systems) services offers great potential to improve the level of safety, efficiency and comfort on our roads. Although cooperative traffic safety applications rely heavily on the support for real-time communication, the Medium Access Control (MAC) mechanism proposed for the upcoming IEEE 802.11p standard, intended for ITS applications, does not offer deterministic real-time support, that is, the access delay to the common radio channel is not upper bounded. To address this problem, we present a framework for a vehicle-to-infrastructure-based (V2I) communication solution extending IEEE 802.11p by introducing a collision-free MAC phase assigning each vehicle an individual priority based on its geographical position, its proximity to potential hazards and the overall road traffic density. Our solution is able to guarantee the timely treatment of safety-critical data, while minimizing the required length of this real-time MAC phase and freeing bandwidth for best-effort services (targeting improved driving comfort and traffic efficiency). Furthermore, we target fast connection setup, associating a passing vehicle to an RSU (Road Side Unit), and proactive handover between widely spaced RSUs. Our real-time MAC concept is evaluated analytically and by simulation based on a realistic task set from a V2I highway merge assistance scenario.
APA, Harvard, Vancouver, ISO, and other styles
8

Choi. "Basic MAC Scheme for RF Energy Harvesting Wireless Sensor Networks: Throughput Analysis and Optimization." Sensors 19, no. 8 (April 16, 2019): 1822. http://dx.doi.org/10.3390/s19081822.

Full text
Abstract:
Traditionally, how to reduce energy consumption has been an issue of utmost importance in wireless sensor networks. Recently, radio frequency (RF) energy harvesting technologies, which scavenge the ambient RF waves, provided us with a new paradigm for such networks. Without replacement or recharge of batteries, an RF energy harvesting wireless sensor network may live an eternal life. Against theoretical expectations, however, energy is scarce in practice and, consequently, structural naiveté has to be within a MAC scheme that supports a sensor node to deliver its data to a sink node. Our practical choice for the MAC scheme is a basic one, rooted in ALOHA, in which a sensor node simply repeats harvesting energy, backing off for a while and transmitting a packet. The basic medium access control (MAC) scheme is not able to perfectly prevent a collision of packets, which in turn deteriorates the throughput. Thus, we derive an exact expression of the throughput that the basic MAC scheme can attain. In various case studies, we then look for a way to enhance the throughput. Using the throughput formula, we reveal that an optimal back-off time, which maximizes the total throughput, is not characterized by the distribution but only by the mean value when the harvest times are deterministic. Also, we confirm that taking proper back-off times is able to improve the throughput even when the harvest times are random. Furthermore, we show that shaping the back-off time so that its variance is increased while its mean remains unchanged can help ameliorate the throughput that the basic MAC scheme is able to achieve.
APA, Harvard, Vancouver, ISO, and other styles
9

Silva, Thales. "VP32 Incorporation Of The Only Drug For Primary Biliary Cholangitis Brazil." International Journal of Technology Assessment in Health Care 35, S1 (2019): 84. http://dx.doi.org/10.1017/s0266462319003064.

Full text
Abstract:
IntroductionPrimary biliary cholangitis (CBP) is a rare autoimmune cholestatic liver disease, inflammation and progressive destruction of small and medium-sized interlobular ducts, progressing to fibrosis, cirrhosis, and death. Currently, the Brazilian public health system (SUS) offers treatment of the symptoms of cirrhosis, and has no medication with indication for CBP.MethodsScientific technical opinion with systematic review (SR) of available evidence in the databases MEDLINE (Pubmed), LILACS and Cochrane Library (accessed July 2017) on ursodeoxycholic acid (AUDC). Methodological quality was evaluated with AMSTAR and Newcastle Ottawa tools. Meta-analyses were performed in Review Manager® 5.2 in the random effects model. Analysis of the budget impact calculation deterministic model, from the perspective of five years for the SUS.ResultsTen SRs and three cohorts were included. There was no statistically significant difference between AUDC and placebo in outcome. Overall survival was significantly (P <0.001) higher in the AUDC group compared to that predicted by the Mayo model or placebo. Treatment with UCD showed an increase in the long-term transplant-free survival time from the fifth year of treatment, with statistically significant results for years five, eight and ten (p <0.01). There were no statistically significant differences for safety outcomes. Based on the assumptions adopted, the incremental budgetary impact with the incorporation of the AUDC into SUS would be BRL 11.77 million (EUR 2.68 million) in the first year and BRL 98.52 million (EUR 22.45 million) in the accumulated five years, considering a market share of 10 percent per year.ConclusionsDespite the uncertainties in the evidence of effectiveness of the AUDC and the probably underestimated budgetary impact, AUDC was incorporated into the SUS because it is the only alternative with indication for CBP and in use for more than two decades, allowing everyone access to the medicine
APA, Harvard, Vancouver, ISO, and other styles
10

Popa Strainu, Roxana, and Mircea Georgescu. "Support Management Decisions in Small and Medium Companies." Review of Economic and Business Studies 8, no. 2 (December 1, 2015): 167–81. http://dx.doi.org/10.1515/rebs-2016-0011.

Full text
Abstract:
AbstractA system built to support management decisions and not only needs to be accurate and well adapted to the requirements of the decision and the variables involved in it, and this happens because a decision is still a human act in any type of business and institution. We can say that a decision support system has a part in it that cannot be determined by any software: the human decision which is not a determinist act. It depends on a lot of variables but also still involves the decision maker intuition and experience. This is why an important problem emerged to be discussed in this paper: the need to implement and develop an in house solution to help management decisions and not only, using existing tools and this with no additional fees. This can be a good opportunity to discover models and solutions. An identified solution using Microsoft Excel and Access is discussed in this paper and a model applied on a case study will be presented. The results of the case study showed a real support in making decisions and a better transparency in manipulating the data, improving also the time needed to collect, transform and present data. The model can be applied in any type of problem that needs a visual presentation of data as well as in situations that need working with a large amount of data, but especially in small and medium size companies.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Deterministic medium access"

1

Kim, Jinho D. "Centralized random backoff for collision free wireless local area networks." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31055.

Full text
Abstract:
Over the past few decades, wireless local area networks (WLANs) have been widely deployed for data communication in indoor environments such as offices, houses, and airports. In order to fairly and efficiently use the unlicensed frequency band that Wi-Fi devices share, the devices follow a set of channel access rules, which is called a wireless medium access control (MAC) protocol. It is known that wireless devices following the 802.11 standard MAC protocol, i.e. the distributed coordination function (DCF), suffer from packet collisions when multiple nodes simultaneously transmit. This significantly degrades the throughput performance. Recently, several studies have reported access techniques to reduce the number of packet collisions and to achieve a collision free WLAN. Although these studies have shown that the number of collisions can be reduced to zero in a simple way, there have been a couple of remaining issues to solve, such as dynamic parameter adjustment and fairness to legacy DCF nodes in terms of channel access opportunity. Recently, In-Band Full Duplex (IBFD) communication has received much attention, because it has significant potential to improve the communication capacity of a radio band. IBFD means that a node can simultaneously transmit one signal and receive another signal in the same band at the same time. In order to maximize the performance of IBFD communication capability and to fairly share access to the wireless medium among distributed devices in WLANs, a number of IBFD MAC protocols have been proposed. However, little attention has been paid to fairness issues between half duplex nodes (i.e. nodes that can either transmit or receive but not both simultaneously in one time-frequency resource block) and IBFD capable nodes in the presence of the hidden node problem.
APA, Harvard, Vancouver, ISO, and other styles
2

Kunert, Kristina. "Architectures and Protocols for Performance Improvements of Real-Time Networks." Doctoral thesis, Högskolan i Halmstad, Inbyggda system (CERES), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14082.

Full text
Abstract:
When designing architectures and protocols for data traffic requiring real-time services, one of the major design goals is to guarantee that traffic deadlines can be met. However, many real-time applications also have additional requirements such as high throughput, high reliability, or energy efficiency. High-performance embedded systems communicating heterogeneous traffic with high bandwidth and strict timing requirements are in need of more efficient communication solutions, while wireless industrial applications, communicating control data, require support of reliability and guarantees of real-time predictability at the same time. To meet the requirements of high-performance embedded systems, this thesis work proposes two multi-wavelength high-speed passive optical networks. To enable reliable wireless industrial communications, a framework in­corporating carefully scheduled retransmissions is developed. All solutions are based on a single-hop star topology, predictable Medium Access Control algorithms and Earliest Deadline First scheduling, centrally controlled by a master node. Further, real-time schedulability analysis is used as admission control policy to provide delay guarantees for hard real-time traffic. For high-performance embedded systems an optical star network with an Arrayed Waveguide Grating placed in the centre is suggested. The design combines spatial wavelength re­use with fixed-tuned and tuneable transceivers in the end nodes, enabling simultaneous transmis­sion of both control and data traffic. This, in turn, permits efficient support of heterogeneous traf­fic with both hard and soft real-time constraints. By analyzing traffic dependencies in this mul­tichannel network, and adapting the real-time schedulability analysis to incorporate these traffic dependencies, a considerable increase of the possible guaranteed throughput for hard real-time traffic can be obtained. Most industrial applications require using existing standards such as IEEE 802.11 or IEEE 802.15.4 for interoperability and cost efficiency. However, these standards do not provide predict­able channel access, and thus real-time guarantees cannot be given. A framework is therefore de­veloped, combining transport layer retransmissions with real-time analysis admission control, which has been adapted to consider retransmissions. It can be placed on top of many underlying communication technologies, exemplified in our work by the two aforementioned wireless stan­dards. To enable a higher data rate than pure IEEE 802.15.4, but still maintaining its energy saving properties, two multichannel network architectures based on IEEE 802.15.4 and encompassing the framework are designed. The proposed architectures are evaluated in terms of reliability, utiliza­tion, delay, complexity, scalability and energy efficiency and it is concluded that performance is enhanced through redundancy in the time and frequency domains.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Deterministic medium access"

1

Trsek, Henning. "Deterministic Medium Access Control." In Isochronous Wireless Network for Real-time Communication in Industrial Automation, 69–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49158-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Zhong, Jun-Hong Cui, Shengli Zhou, and Shuguang Cui. "Energy Efficient Communication with Random Node Cooperation." In Cooperative Communications for Improved Wireless Network Transmission, 280–300. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-665-5.ch010.

Full text
Abstract:
In this chapter, we focus on the energy efficient cooperative communication with random node cooperation for wireless networks. By “random,” we mean that the cooperative nodes for each communication event are randomly selected based on the network and channel conditions. Different from the conventional deterministic cooperative communication where cooperative nodes are determined prior to the communication, here the number of cooperative nodes and the cooperation pattern may be random, which is more practical given the random nature of the channels among the source nodes, relay nodes, and destination nodes. In addition, it is more robust to the dynamic wireless network environment. Starting with a thorough literature survey, we then discuss the challenges for random cooperative communication systems. Afterwards, two examples are presented to illustrate the design methodologies. In the first example, we analyze a simple scheme for clustered wireless networks, where cooperative communication is deployed in the long-haul inter-cluster transmissions to improve the energy efficiency. We quantify the energy performance and emphasize its difference from the conventional deterministic ones. In the second example, we consider the cross-layer design between the physical layer and the medium access control (MAC) layer for the one-hop random single-relay networks. We unify the power control and the relay selection at the physical layer into the MAC signaling in a distributed fashion. This example clearly shows the strength of cross-layer design for energy-efficient cooperative systems with random node collaboration. Finally, we conclude with discussions over possible future research directions.
APA, Harvard, Vancouver, ISO, and other styles
3

Bulatov, Vasily, and Wei Cai. "Line Dislocation Dynamics." In Computer Simulations of Dislocations. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780198526148.003.0015.

Full text
Abstract:
In the preceding chapters we have discussed several computational approaches focused on the structure and motion of single dislocations. Here we turn our attention to collective motion of many dislocations, which is what the method of dislocation dynamics (DD) was designed for. Typical length and time scales of DD simulations are on the order of microns and seconds, similar to in situ transmission electron microscopy (TEM) experiments where dislocations are observed to move in real time. In a way, DD simulations can be regarded as a computational counterpart of in situ TEM experiments. One very valuable aspect of such a “computational experiment” is that one has full control of the simulation conditions and access to the positions of all dislocation lines at any instant of time. Provided the dislocation model is realistic, DD simulations can offer important insights that help answer the fundamental questions in crystal plasticity, such as the origin of the complex dislocation patterns that emerge during plastic deformation and the relationship between microstructure, loading conditions and the mechanical strength of the crystal. So far, two approaches to dislocation dynamics simulations have emerged. In the line DD method to be discussed in this chapter, dislocations are represented as mathematical lines in an otherwise featureless host medium. An alternative approach is to rely on a continuous field of eigenstrains, in which regions of high strain gradients reveal the locations of the dislocation lines. This representation leads to the phase field DD approach, which will be discussed in Chapter 11. Line DD has certain similarities with the models discussed in the previous chapters, but, at the same time, is rather different from all of them. For example, the representation of dislocations by line segments in line DD method is similar to the kinetic Monte Carlo (kMC) model of Chapter 9. However, having to deal with multiple dislocations on large length and times scales necessitates a more economical treatment of dislocations in the line DD method. Thus, line DD usually relies on less detailed discretization of dislocation lines and treats dislocation motion as deterministic.
APA, Harvard, Vancouver, ISO, and other styles
4

Ukil, Arijit. "Advanced Scheduling Schemes in 4G Systems." In Wireless Technologies, 2108–57. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch809.

Full text
Abstract:
The deterministic factor for 4G wireless technologies is to successfully deliver high value services such as voice, video, real-time data with well defined Quality of Service (QoS), which has strict prerequisite of throughput, delay, latency and jitter. This requirement should be achieved with minimum use of limited shared resources. This constraint leads to the development and implementation of scheduling policy which along with adaptive physical layer design completely exploit the frequency, temporal and spatial dimensions of the resource space of multi-user system to achieve the best system-level performance. The basic goal for scheduling is to allocate the users with the network resources in a channel aware way primarily as a function of time and frequency to satisfy individual user’s service request delivery (QoS guarantee) and overall system performance optimization. Advanced scheduling schemes consider cross-layer optimization principle, where to fully optimize wireless broadband networks; both the challenges from the physical medium and the QoS-demands from the applications are to be taken into account. Cross-layer optimization needs to be accomplished by the design philosophy of jointly optimizing the physical, media access control, and link layer, while leveraging the standard IP network architecture. Cross-layer design approaches are critical for efficient utilization of the scarce radio resources with QoS provisioning in 4G wireless networks and beyond. The scheduler, in a sense, becomes the focal point for achieving any cross-layer optimization, given that the system design allows for this. The scheduler uses information from the physical layer up to the application layer to make decisions and perform optimization. This is a fundamental advantage over a system where the intelligence is distributed throughout the all entities of the network. In this chapter, the authors present an overview of the basic scheduling schemes as well as investigate advanced scheduling schemes particularly in OFDMA and packet scheduling schemes in all-IP based 4G systems. Game theoretic approach of distributed scheduling, which is of particular importance in wireless ad hoc networks, will also be discussed. 4G wireless networks are mostly MIMO based which introduces another degree of freedom for optimization, i.e. spatial dimension, for which scheduling in MIMO systems is very much complicated and computation intensive. MIMO resource allocation and scheduling is also covered in this chapter. The key research challenges in 4G wireless networks like LTE, WiMAX and the future research direction for scheduling problems in 4G networks are also presented in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
5

Anzera, Giuseppe, and Francesca Comunello. "Toward Digital Inclusion." In Digital Multimedia, 373–94. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3822-6.ch019.

Full text
Abstract:
This chapter addresses the relationships between social inclusion and digital divide(s), mainly focusing on the conceptual frameworks that provide the basis for rethinking the relationship between technological, social, and human factors. Redefining the digital divide has deep consequences on the theoretical and empirical framework we apply to the digital divide and to the related social inclusion processes. It is widely acknowledged that the label digital divide can be partially misleading, because it is mostly emphasizing a binary dimension (haves vs. have not) and a mere technological dimension. In order to achieve a clear operational definition of the digital divide, we should avoid some misleading myths characterizing the debate and focus on the complex relationships between technological, social, and human factors (a dichotomous conceptualization, a narrow understanding of the technological factors involved, a technological deterministic approach), adopting, instead, an enabling technology approach. Therefore, the authors introduce a multilevel model for analyzing digital divides (Comunello, 2010), with a main focus on new media literacy (the model considers not only mere technology availability, but also real access, advanced reception practices, technical skills, content production, networking skills). Finally, they review some empirical methods for studying the digital divide, trying to underline how a more nuanced framework for analysing the digital divide can be adopted by empirical research.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Deterministic medium access"

1

Cruz, Cristovao, Joaquim Ferreira, and Arnaldo Oliveira. "Supporting Deterministic Medium Access Control in Wireless Vehicular Communications." In 2015 IEEE 82nd Vehicular Technology Conference (VTC Fall). IEEE, 2015. http://dx.doi.org/10.1109/vtcfall.2015.7391160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kunert, Kristina, Magnus Jonsson, and Urban Bilstrup. "Deterministic real-time medium access for cognitive industrial radio networks." In 2012 9th IEEE International Workshop on Factory Communication Systems - (WFCS 2012). IEEE, 2012. http://dx.doi.org/10.1109/wfcs.2012.6242549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tao Zheng, Mikael Gidlund, and Johan Akerberg. "Deterministic medium access mechanism for time-critical wireless sensor network applications." In 2013 IEEE 24th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 2013. http://dx.doi.org/10.1109/pimrc.2013.6666397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kirchner, Klaus-Peter, Andreas Fink, Matthias Vos, and Helmut Beikirch. "Packet-based time-critical medium access for a process-oriented deterministic bus system." In 2012 IEEE 17th Conference on Emerging Technologies & Factory Automation (ETFA 2012). IEEE, 2012. http://dx.doi.org/10.1109/etfa.2012.6489699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography