Search
Now showing items 1-10 of 11
Energy sensing strategy optimization for opportunistic spectrum access
(IEEE, 2012-06)
This paper introduces a correlator-based energy sensing strategy for opportunistic spectrum access in a slow, flat-fading channel. The correlator provides weighted energy accumulation in time. We assume that the noise ...
Advantages of application-based scheduling for indoor femtocells
(ACM, 2011)
This paper presents the necessity of application-based scheduling to maintain QoS requirements of all active applications in an indoor femtocell. A novel scheduler is proposed which takes into account the quality of service ...
Dağıtık bir openflow kontrol birimi mimarisi
(IEEE, 2012)
Considering the modern internet traffic rates, the network architecture is of particular importance as the running services itself. On the other hand, due to the increasing complexity and black-box structure of the available ...
On the broadcast capacity of wireless multihop interference networks
(IEEE, 2009)
This paper is concerned with wireless broadcasting in multihop networks where a selected number of relay nodes may aid the source node in the broadcast under a given total energy and hop constraint. We study an ad-hoc ...
Capacity of practical wireless multihop broadcast networks
(Springer Science+Business Media, 2013-04)
In a wireless multihop broadcasting scenario, a number of relay nodes may cooperate the source node in order to improve the capacity of the network. However, the imposition of total energy and maximum hop constraints to ...
Capacity of wireless ad-hoc broadcast networks under realistic channel models
(IEEE, 2009)
In a wireless broadcasting scenario, some of the nodes can help the source node by forwarding the received information. Due to the interference from multiple transmissions, selection of these nodes directly affects the ...
Hücresel sistemlerde bağlantı katmanı kaynak dağıtımı veriminin kontrolcü yoluyla artırılması
(IEEE, 2013)
In this work, we aim to investigate the efficiency of link layer resource allocation when a device which is called controller is used behind the base stations. By using this device, base stations are collaborating, in other ...
Experimental investigation of the impact on TCP traffic by hidden video-tagged UDP traffic
(IEEE, 2017)
This paper investigates the impact of video-tagged UDP traffic on best-effort TCP traffic in an experimental setup with a novel observation approach. Our setup consists of three 802.11ac nodes in a hidden node topology, ...
A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management
(IEEE, 2014-11)
The tremendous growth in wireless Internet use is showing no signs of slowing down. Existing cellular networks are starting to be insufficient in meeting this demand, in part due to their inflexible and expensive equipment ...
On the feasibility of synchronous, retransmission-based cognitive networks
(Elsevier, 2016-01)
This paper presents a new, joint Markov chain model for the primary and secondary traffic in a cognitive radio network to assess the feasibility of opportunistic spectrum access for different operational scenarios, validated ...
Share this page