Academic literature on the topic 'Multiple access protocols (Computer networks protocols)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multiple access protocols (Computer networks protocols).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multiple access protocols (Computer networks protocols)"

1

Harikrishnan, Harshini, Aarjish Sarkar, Shams Al Ajrawi, Albena Mihovska, and Christopher Paolini. "Medium Access Control Protocols for Brain Computer Interface Applications." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 2 (2021): 24–41. http://dx.doi.org/10.4018/ijitn.2021040103.

Full text
Abstract:
Noteworthy advancements have occurred in the field of brain computer interfaces (BCI) in the last decade. The transmission of the collected signals to the corresponding organ through a wireless link is still in a nascent stage. This paper investigates the feasibility of having multiple UHF-RFID transmitters inside the skull which communicate to the receiver outside. The purpose of this paper is to design a wireless communication channel and enhance the communication using a MAC protocol. The existing MAC protocols were analyzed to be used in a BCI application. Though the combination of existing protocols seems like a possibility to use in a BCI system, the complexity of such a protocol is high. This drawback is overcome by proposing a novel MAC protocol. The performance of the proposed MAC algorithm is related with the widely used Q algorithm for anti-collision in the RFID tags. Parameters like delay and collisions are analyzed in detail which are essential to build a consistent, energy efficient, and a low power BCI system.
APA, Harvard, Vancouver, ISO, and other styles
2

Patel, A. "Performance analysis of multiple access protocols." Computer Communications 10, no. 1 (1987): 39–40. http://dx.doi.org/10.1016/0140-3664(87)90314-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmadzadeh, Seyed Ali, and Gordon Agnew. "Covert channels in multiple access protocols." ACM SIGCOMM Computer Communication Review 41, no. 4 (2011): 404–5. http://dx.doi.org/10.1145/2043164.2018490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ullah, Niamat, M. Sanaullah Chowdhury, Mosaddique Al Ameen, and Kyung Sup Kwak. "Energy Efficient MAC Protocol for Low-Energy Critical Infrastructure Monitoring Networks Using Wakeup Radio." International Journal of Distributed Sensor Networks 8, no. 4 (2012): 504946. http://dx.doi.org/10.1155/2012/504946.

Full text
Abstract:
Critical infrastructure monitoring applications are rapidly increasing. Application requirements include reliable data transfer, energy efficiency, and long deployment lifetime. These applications must also be able to operate in an extremely low-cost communication environment in order to be attractive to potential users. A low rate wireless personal area network can help control and manage the operations of such applications. In this paper, we present a medium access control (MAC) protocol for low-energy critical infrastructure monitoring (LECIM) applications. The proposed MAC protocol is based on a framed slotted aloha multiple access schemes. For downlink communication, we use a wakeup radio approach to avoid complex bookkeeping associated with the traditional MAC protocols. Analytical expressions for power consumption and delay are derived to analyze and compare the performance of our proposed protocol with the existing well-known T-MAC, B-MAC, X-MAC, ZigBee, and WiseMAC protocols. It is shown that our proposed protocol outperforms all the other protocols in terms of power consumption and delay.
APA, Harvard, Vancouver, ISO, and other styles
5

Wolejsza, C., D. Taylor, M. Grossman, and W. Osborne. "Multiple access protocols for data communications via VSAT networks." IEEE Communications Magazine 25, no. 7 (1987): 30–39. http://dx.doi.org/10.1109/mcom.1987.1093648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Apostolopoulos, TK, and EN Protonotarios. "Queueing analysis of buffered slotted multiple access protocols." Computer Communications 8, no. 1 (1985): 9–21. http://dx.doi.org/10.1016/0140-3664(85)90126-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sivalingam, Krishna M., Kalyani Bogineni, and Patrick W. Dowd. "Pre-allocation media access control protocols for multiple access WDM photonic networks." ACM SIGCOMM Computer Communication Review 22, no. 4 (1992): 235–46. http://dx.doi.org/10.1145/144191.144289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Yonghua, Xuxin Huang, and Siye Wang. "Multiple Protocols Interworking With Open Connectivity Foundation in Fog Networks." IEEE Access 7 (2019): 60764–73. http://dx.doi.org/10.1109/access.2019.2907554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sklira, M., and A. S. Pomportsis. "Prioritized slotted multiple access protocols for bank LANs." International Journal of Communication Systems 16, no. 9 (2003): 841–49. http://dx.doi.org/10.1002/dac.620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sklira, M., and A. S. Pomportsis. "Hybrid prioritized multiple access protocols for bank LANs." International Journal of Communication Systems 17, no. 7 (2004): 735–41. http://dx.doi.org/10.1002/dac.663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Multiple access protocols (Computer networks protocols)"

1

Kondareddy, Yogesh Reddy Agrawal Prathima. "MAC and routing protocols for multi-hop cognitive radio networks." Auburn, Ala, 2008. http://repo.lib.auburn.edu/EtdRoot/2008/SUMMER/Electrical_and_Computer_Engineering/Thesis/Kondareddy_Yogesh_18.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Suryadevara, Usha. "Buffer management in tone allocated multiple access protocol." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000357.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.
Title from title page of source document. Document formatted into pages; contains vi, 78 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Mingxing. "Architectures and multiple access protocols for optical subcarrier multiplexed local area networks." Thesis, University of Essex, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scarlett, Jonathan Mark. "Reliable communication under mismatched decoding." Thesis, University of Cambridge, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hanratty, Joseph M. "Performance analysis of hybrid ARQ protocols in a slotted code division multiple-access network." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/15690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Salayma, Marwa. "Reliable and energy efficient scheduling protocols for Wireless Body Area Networks (WBAN)." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1532410.

Full text
Abstract:
Wireless Body Area Network (WBAN) facilitates efficient and cost-effective e-health care and well-being applications. The WBAN has unique challenges and features compared to other Wireless Sensor Networks (WSN). In addition to battery power consumption, the vulnerability and the unpredicted channel behavior of the Medium Access Control (MAC) layer make channel access a serious problem. MAC protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, conventional static TDMA techniques adopted by IEEE 802.15.4 and IEEE 802.15.6 do not sufficiently consider the channel status or the buffer requirements of the nodes within heterogeneous contexts. Although there are some solutions that have been proposed to alleviate the effect of the deep fade in WBAN channel by adopting dynamic slot allocation, these solutions still suffer from some reliability and energy efficiency issues and they do not avoid channel deep fading. This thesis presents novel and generic TDMA based techniques to improve WBAN reliability and energy efficiency. The proposed techniques synchronise nodes adaptively whilst tackling their channel and buffer status in normal and emergency contexts. Extensive simulation experiments using various traffic rates and time slot lengths demonstrate that the proposed techniques improve the reliability and the energy efficiency compared to the de-facto standards of WBAN, i.e. the IEEE 802.15.4 and the IEEE 802.15.6. In normal situations, the proposed techniques reduce packet loss up to 61% and 68% compared to the IEEE 802.15.4 and IEEE 802.15.6 respectively. They also reduce energy consumption up to 7.3%. In emergencies, however, the proposed techniques reduce packets loss up to 63.4% and 90% with respect to their counterparts in IEEE 802.15.4 and 802.15.6. The achieved results confirm the significant enhancements made by the developed scheduling techniques to promote the reliability and energy efficiency of WBAN, opening up promising doors towards new horizons and applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Jing. "A bit-map-assisted energy-efficient MAC scheme for Wireless Sensor Networks." Master's thesis, Mississippi State : Mississippi State University, 2004. http://library.msstate.edu/etd/show.asp?etd=etd-04052004-180146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Elkourdi, Mohamed. "Machine Learning, Game Theory Algorithms, and Medium Access Protocols for 5G and Internet-of-Thing (IoT) Networks." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7782.

Full text
Abstract:
In the first part of this dissertation, a novel medium access protocol for the Internet of Thing (IoT) networks is introduced. The Internet of things (IoT), which is the network of physical devices embedded with sensors, actuators, and connectivity, is being accelerated into the mainstream by the emergence of 5G wireless networking. This work presents an uncoordinated non-orthogonal random-access protocol, which is an enhancement to the recently introduced slotted ALOHA- NOMA (SAN) protocol that provides high throughput, while being matched to the low complexity requirements and the sporadic traffic pattern of IoT devices. Under ideal conditions it has been shown that slotted ALOHA-NOMA (SAN), using power- domain orthogonality, can significantly increase the throughput using SIC (Successive Interference Cancellation) to enable correct reception of multiple simultaneous transmitted signals. For this ideal performance, the enhanced SAN receiver adaptively learns the number of active devices (which is not known a priori) using a form of multi-hypothesis testing. For small numbers of simultaneous transmissions, it is shown that there can be substantial throughput gain of 5.5 dB relative to slotted ALOHA (SA) for 0.07 probability of transmission and up to 3 active transmitters. As a further enhancement to SAN protocol, the SAN with beamforming (BF-SAN) protocol was proposed. The BF-SAN protocol uses beamforming to significantly improve the throughput to 1.31 compared with 0.36 in conventional slotted ALOHA when 6 active IoT devices can be successfully separated using 2×2 MIMO and a SIC (Successive Interference Cancellation) receiver with 3 optimum power levels. The simulation results further show that the proposed protocol achieves higher throughput than SAN with a lower average channel access delay. In the second part of this dissertation a novel Machine Learning (ML) approach was applied for proactive mobility management in 5G Virtual Cell (VC) wireless networks. Providing seamless mobility and a uniform user experience, independent of location, is an important challenge for 5G wireless networks. The combination of Coordinated Multipoint (CoMP) networks and Virtual- Cells (VCs) are expected to play an important role in achieving high throughput independent of the mobile’s location by mitigating inter-cell interference and enhancing the cell-edge user throughput. User- specific VCs will distinguish the physical cell from a broader area where the user can roam without the need for handoff, and may communicate with any Base Station (BS) in the VC area. However, this requires rapid decision making for the formation of VCs. In this work, a novel algorithm based on a form of Recurrent Neural Networks (RNNs) called Gated Recurrent Units (GRUs) is used for predicting the triggering condition for forming VCs via enabling Coordinated Multipoint (CoMP) transmission. Simulation results show that based on the sequences of Received Signal Strength (RSS) values of different mobile nodes used for training the RNN, the future RSS values from the closest three BSs can be accurately predicted using GRU, which is then used for making proactive decisions on enabling CoMP transmission and forming VCs. Finally, the work in the last part of this dissertation was directed towards applying Bayesian games for cell selection / user association in 5G Heterogenous networks to achieve the 5G goal of low latency communication. Expanding the cellular ecosystem to support an immense number of connected devices and creating a platform that accommodates a wide range of emerging services of different traffic types and Quality of Service (QoS) metrics are among the 5G’s headline features. One of the key 5G performance metrics is ultra-low latency to enable new delay-sensitive use cases. Some network architectural amendments are proposed to achieve the 5G ultra-low latency objective. With these paradigm shifts in system architecture, it is of cardinal importance to rethink the cell selection / user association process to achieve substantial improvement in system performance over conventional maximum signal-to- interference plus noise ratio (Max-SINR) and Cell Range Expansion (CRE) algorithms employed in Long Term Evolution- Advanced (LTE- Advanced). In this work, a novel Bayesian cell selection / user association algorithm, incorporating the access nodes capabilities and the user equipment (UE) traffic type, is proposed in order to maximize the probability of proper association and consequently enhance the system performance in terms of achieved latency. Simulation results show that Bayesian game approach attains the 5G low end-to-end latency target with a probability exceeding 80%.
APA, Harvard, Vancouver, ISO, and other styles
9

Louis, Lee Winnie. "Flexible-schedule-based TDMA protocols for supporting fault-tolerance, on-demand TDMA slot transfer, and peer-to-peer communication in wireless sensor networks." University of Western Australia. School of Computer Science and Software Engineering, 2008. http://theses.library.uwa.edu.au/adt-WU2008.0028.

Full text
Abstract:
[Truncated abstract] This thesis develops a scheduled protocol (time division multiple access, TDMA) called flexible-schedule-based TDMA Protocol (FlexiTP), to address the problem of providing end-to-end guarantees on data delivery, whilst also respecting severe resource constraints of wireless sensor networks. FlexiTP achieves this balance through a distributed, synchronised, and loose slot structure in which sensor nodes can build, modify, or extend their schedules based on their local information. In FlexiTP, it is not necessary to predetermine the number of slots required for a network. FlexiTP's local repair scheme allows nodes to adjust their schedules dynamically and autonomously to recover from node and communication faults. Hence, it maintains a reliable and selforganising multihop network. Most sensor network protocols designed for data gathering applications implicitly assume a periodic rate of data collection from all nodes in the network to the base station. However, nodes may want to report their data more rapidly or slowly depending on the significance and importance of their data to the end-user. The problem is that traditional TDMA-based protocols are not flexible to changes in traffic patterns because of their rigid slot structure schemes. This thesis aims to solve this problem by developing an ondemand TDMA slot transfer method that leverages the flexible-slot structure algorithm of FlexiTP to transfer time slots from one part of the network to another part. ... While these communication patterns are sufficient for monitoring applications, individual sensor nodes may need to send their data to multiple destination nodes across the network in order to execute a distributed cooperative-function based on their local environment. This peer-to-peer communication pattern makes sensor networks more reactive to triggers from the environment. This thesis attempts to solve the problem of lack of peer-to-peer communication in the design of a TDMA-driven protocol by extending the idea of on-demand TDMA slot transfer method to allow each sensor node in the network to claim extra time slots to communicate with any other nodes (peers) in the network, without going through the base station. Nodes in the network may have different priorities of data because of event-triggering sensor readings or various types of sensor readings (e.g., light, temperature, and humidity) they provide. When nodes with high priority packets increase the frequency of their data collections, the network bandwidth may be dominated by these nodes. It is desirable to allow nodes with low priority packets to aggregate their packets and so enabling these nodes to send their data to the base station under the current available network bandwidth. This thesis proposes an on-demand data aggregation algorithm that enables sensor nodes to perform an in-network-aggregation based on their current sensing requirements and network capacity constraints. In summary, this thesis describes the design, implementation, and evaluation of protocols for wireless sensor networks that focus on achieving energy-efficiency, provisioning performance assurances, and supporting reactivity and adaptability in constantly changing environment.
APA, Harvard, Vancouver, ISO, and other styles
10

Azarian, Yazdi Kambiz. "Outage limited cooperative channels protocols and analysis /." Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1154740723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Multiple access protocols (Computer networks protocols)"

1

Performance analysis of multiple access protocols. MIT Press, 1986.

APA, Harvard, Vancouver, ISO, and other styles
2

NATO Advanced Study Institute on Coding and Analysis of Multiple Access Channels (2006 Budapest, Hungary). Multiple access channels: Theory and practice. IOS Press, 2007.

APA, Harvard, Vancouver, ISO, and other styles
3

MACOM 2010 (2010 Barcelona, Spain). Multiple access communications: Third international workshop, MACOM 2010, Barcelona, Spain, September 13-14, 2010 : proceedings. Springer, 2010.

APA, Harvard, Vancouver, ISO, and other styles
4

Bader, Faouzi, and Nizar Zorba. Advances on processing for multiple carrier schemes: OFDM & OFDMA. Nova Science Publishers, 2011.

APA, Harvard, Vancouver, ISO, and other styles
5

Sacchi, Claudio. Multiple Access Communications: 4th International Workshop, MACOM 2011, Trento, Italy, September 12-13, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

APA, Harvard, Vancouver, ISO, and other styles
6

Bellalta, Boris. Multiple Access Communications: 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

APA, Harvard, Vancouver, ISO, and other styles
7

Bengi, Kemal. Optical Packet Access Protocols for WDM Networks. Springer US, 2002.

APA, Harvard, Vancouver, ISO, and other styles
8

Institute, American National Standards. IEEE standards for local and metropolitan area networks: Supplement to carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications. Institute of Electrical and Electronics Engineers, 1992.

APA, Harvard, Vancouver, ISO, and other styles
9

Cortier, Véronique, and Steve Kremer. Formal models and techniques for analyzing security protocols. IOS Press, 2011.

APA, Harvard, Vancouver, ISO, and other styles
10

Institute, American National Standards. IEEE standards for local and metropolitan area networks: Supplement to carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications : layer management for 10 Mb/s baseband repeaters (section 19). Institute of Electrical and Electronics Engineers, 1992.

APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Multiple access protocols (Computer networks protocols)"

1

Ye, Wei. "Carrier Sense Multiple Access Protocols." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118256114.ch50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shanmuganathan, C., and P. Raviraj. "A Comparative Analysis of Demand Assignment Multiple Access Protocols for Wireless ATM Networks." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24043-0_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Konorski, Jerzy. "Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations." In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Walrand, Jean. "Multiplexing: A." In Probability in Electrical Engineering and Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-49995-2_3.

Full text
Abstract:
AbstractThis chapter explores the fluctuations of random variables away from their mean value. You flip a fair coin 100 times. How likely is it that you get 60 heads? Conversely, if you get 60 heads, how likely is it that the coin is fair? Such questions are fundamental in extracting information from data.In Sect. 3.1, we start by exploring the rate available to a user when a random number of them share a link, as illustrated in Sect. 3.1. Such calculations are central to network provisioning. The main analytical tool is the Central Limit Theorem explained in Sect. 3.2 where Gaussian random variables are also introduced and confidence intervals are defined. To share a common link, devices may be attached to a switch. For instance, the desktop computers in a building are typically connected to a switch that then sends the data to a common high-speed link. We explore the delays that packets face through the buffer of a switch in Sect. 3.3. The analysis uses a Markov chain model of the buffer. To share a wireless radio channel, devices use a multiple access protocol that regulates the transmissions. We study such schemes in Sect. 3.4. We use probabilistic models of the protocols.
APA, Harvard, Vancouver, ISO, and other styles
5

Gebali, Fayez. "Modeling Medium Access Control Protocols." In Analysis of Computer Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15657-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gebali, Fayez. "Modeling Medium Access Control Protocols." In Analysis of Computer and Communication Networks. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-74437-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rico Garcia, Cristina, Andreas Lehner, Patrick Robertson, and Thomas Strang. "Performance of MAC Protocols in Beaconing Mobile Ad-Hoc Multibroadcast Networks." In Multiple Access Communications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15428-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Dapeng, Kai Liu, Lianzhen Cheng, and Yan Zhang. "A Novel Multiple Access Protocol with QoS Support for Mobile Ad Hoc Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74784-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sreevidya, B., and M. Rajesh. "Design and Performance Evaluation of an Efficient Multiple Access Protocol for Virtual Cellular Networks." In International Conference on Computer Networks and Communication Technologies. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Lisong, Harry G. Perros, and George N. Rouskas. "A Simulation Study of Access Protocols for Optical Burst-Switched Ring Networks." In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_70.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multiple access protocols (Computer networks protocols)"

1

Hanratty, J. M., and G. L. Stuber. "Asymptotic performance analysis of hybrid ARQ protocols in slotted direct-sequence code division multiple-access networks." In IEEE INFOCOM '89, Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, 1989. http://dx.doi.org/10.1109/infcom.1989.101502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mukherjee, Biswanath. "Protocols for optical multiple-access networks." In Optical Fiber Communication Conference. OSA, 1993. http://dx.doi.org/10.1364/ofc.1993.thm1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadek, Ahmed, K. Ray Liu, and Anthony Ephremides. "Collaborative Multiple-Access Protocols for Wireless Networks." In 2006 IEEE International Conference on Communications. IEEE, 2006. http://dx.doi.org/10.1109/icc.2006.255347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sivalingam, Krishna M., Kalyani Bogineni, and Patrick W. Dowd. "Pre-allocation media access control protocols for multiple access WDM photonic networks." In Conference proceedings. ACM Press, 1992. http://dx.doi.org/10.1145/144179.144289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lien, S. Y., C. C. Tseng, and K. C. Chen. "Carrier Sensing Based Multiple Access Protocols for Cognitive Radio Networks." In 2008 IEEE International Conference on Communications. IEEE, 2008. http://dx.doi.org/10.1109/icc.2008.604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Chao, Ming Xiao, and Mikael Skoglund. "Efficient Multiple Access Protocols for Coded Multi-Source Multi-Relay Networks." In ICC 2011 - 2011 IEEE International Conference on Communications. IEEE, 2011. http://dx.doi.org/10.1109/icc.2011.5963100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sadek, Ahmed, K. Ray Liu, and Anthony Ephremides. "Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis." In 2006 40th Annual Conference on Information Sciences and Systems. IEEE, 2006. http://dx.doi.org/10.1109/ciss.2006.286652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hadjitheodosiou, M. H. "Performance optimisation of multiple access protocols for multiservice VSAT satellite networks." In 5th IEE Conference on Telecommunications. IEE, 1995. http://dx.doi.org/10.1049/cp:19950102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wikstrand, G., T. Nilsson, and M. S. Dougherty. "Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks." In IEEE INFOCOM 2008 - IEEE Conference on Computer Communications. IEEE, 2008. http://dx.doi.org/10.1109/infocom.2008.216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wikstrand, G., T. Nilsson, and M. S. Dougherty. "Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks." In 27th IEEE International Conference on Computer Communications (INFOCOM 2008). IEEE, 2008. http://dx.doi.org/10.1109/infocom.2007.216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography