Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A dynamic offloading algorithm for mobile computing
Offloading is an effective method for extending the lifetime of handheld mobile devices by
executing some components of applications remotely (eg, on the server in a data center or in …
executing some components of applications remotely (eg, on the server in a data center or in …
Heterogeneous cellular networks with spatio-temporal traffic: Delay analysis and scheduling
Emergence of new types of services has led to various traffic and diverse delay
requirements in fifth-generation (5G) wireless networks. Meeting diverse delay requirements …
requirements in fifth-generation (5G) wireless networks. Meeting diverse delay requirements …
Coded slotted ALOHA: A graph-based method for uncoordinated multiple access
In this paper, a random access scheme is introduced, which relies on the combination of
packet erasure correcting codes and successive interference cancellation (SIC). The …
packet erasure correcting codes and successive interference cancellation (SIC). The …
Information theory and communication networks: An unconsummated union
Information theory has not yet had a direct impact on networking, although there are
similarities in concepts and methodologies that have consistently attracted the attention of …
similarities in concepts and methodologies that have consistently attracted the attention of …
Stability and delay of finite-user slotted ALOHA with multipacket reception
The effect of multipacket reception (MPR) on stability and delay of slotted ALOHA based
random-access systems is considered. A general asymmetric MPR model is introduced and …
random-access systems is considered. A general asymmetric MPR model is introduced and …
Cognitive multiple access via cooperation: Protocol design and performance analysis
In this paper, a novel cognitive multiple-access strategy in the presence of a cooperating
relay is proposed. Exploiting an important phenomenon in wireless networks, source …
relay is proposed. Exploiting an important phenomenon in wireless networks, source …
Stability of N interacting queues in random-access systems
W Luo, A Ephremides - IEEE Transactions on Information …, 1999 - ieeexplore.ieee.org
We revisit the stability problem of systems consisting of N buffered terminals accessing a
common receiver over the collision channel by means of the standard ALOHA protocol. We …
common receiver over the collision channel by means of the standard ALOHA protocol. We …
On the stability of static poisson networks under random access
We investigate the stable packet arrival rate region of a discrete-time slotted random access
network, where the sources are distributed as a Poisson point process. Each of the sources …
network, where the sources are distributed as a Poisson point process. Each of the sources …
Resource allocation in space multiaccess systems
Currently, most Landsat satellites are deployed in the low earth orbit (LEO) to obtain high-
resolution data of the Earth surface and atmosphere. However, the return channels of LEO …
resolution data of the Earth surface and atmosphere. However, the return channels of LEO …
Exploiting decentralized channel state information for random access
S Adireddy, L Tong - IEEE Transactions on Information Theory, 2005 - ieeexplore.ieee.org
We study the use of channel state information (CSI) for random access in fading channels.
Traditionally, random access protocols have been designed by assuming simple models for …
Traditionally, random access protocols have been designed by assuming simple models for …