Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Throughput analysis of IEEE802. 11 multi-hop ad hoc networks
PC Ng, SC Liew - IEEE/ACM Transactions on networking, 2007 - ieeexplore.ieee.org
In multi-hop ad hoc networks, stations may pump more traffic into the networks than can be
supported, resulting in high packet-loss rate, re-routing instability and unfairness problems …
supported, resulting in high packet-loss rate, re-routing instability and unfairness problems …
On dipole compression modes in nuclei
Isoscalar dipole strength distributions in spherical medium-and heavy-mass nuclei are
calculated within random phase approximation (RPA) or quasiparticle RPA. Different …
calculated within random phase approximation (RPA) or quasiparticle RPA. Different …
Performance enhancement of multirate IEEE 802.11 WLANs with geographically scattered stations
DY Yang, TJ Lee, K Jang, JB Chang… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
In today's IEEE 802.11 Wireless LANs (WLANs), eg, the popular IEEE 802.11 b, stations
support multiple transmission rates, and use them adaptively depending on the underlying …
support multiple transmission rates, and use them adaptively depending on the underlying …
Performance of wireless networks with hidden nodes: A queuing-theoretic analysis
Hidden nodes are a fundamental problem that can potentially affect any wireless network
where nodes cannot hear each other. Although the hidden node problem is well known, so …
where nodes cannot hear each other. Although the hidden node problem is well known, so …
IEEE 802.11 saturation throughput analysis in the presence of hidden terminals
Due to its usefulness and wide deployment, IEEE 802.11 has been the subject of numerous
studies, but still lacks a complete analytical model. Hidden terminals are common in IEEE …
studies, but still lacks a complete analytical model. Hidden terminals are common in IEEE …
An overview of WLAN performance, some important case-scenarios and their associated models
The study of the 802.11 standard has been very intense for more than a decade now.
Several works have striven at understanding its performance, even in the simplest topology …
Several works have striven at understanding its performance, even in the simplest topology …
Offered load control in IEEE 802.11 multi-hop ad-hoc networks
PC Ng, SC Liew - … IEEE International Conference on Mobile Ad …, 2004 - ieeexplore.ieee.org
In a multi-hop ad-hoc network, stations may pump more traffic into it than can be supported,
resulting in high packet-loss rate, rerouting instability and unfairness problems. The paper …
resulting in high packet-loss rate, rerouting instability and unfairness problems. The paper …
RSS-based grou** strategy for avoiding hidden terminals with GS-DCF MAC protocol
Due to the massive growth in the number of wireless devices and their traffic, the problem of
sharing channel access has become much severe in wireless networks. Group …
sharing channel access has become much severe in wireless networks. Group …
[PDF][PDF] Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques.
The presence of physical obstacles and radio interference results in the so called “shadow
regions” in wireless networks. When a mobile station roams into a shadow region, it loses its …
regions” in wireless networks. When a mobile station roams into a shadow region, it loses its …
[PDF][PDF] An empirical characterization of instantaneous throughput in 802.11 b WLANs
A Vasan, AU Shankar - 2002 - Citeseer
We present an empirical, ie, measurementbased, characterization of the instantaneous
throughput of a station in an 802.11 b WLAN as a function of the number of competing …
throughput of a station in an 802.11 b WLAN as a function of the number of competing …