Results 301 to 310 of about 7,625,232 (365)
Some of the next articles are maybe not open access.
Game-Based Channel Access for AoI-Oriented Data Transmission Under Dynamic Attack
IEEE Internet of Things Journal, 2022Efficient grant-free uplink transmission is critical in minimizing Age of Information (AoI) in multichannel Internet of Things (IoT) networks. But less attention has been paid to this topic especially when dynamic channel access attacks (DCAAs) exist. To
Yaoqi Yang +4 more
semanticscholar +1 more source
AoI Optimization for UAV-aided MEC Networks under Channel Access Attacks: A Game Theoretic Viewpoint
ICC 2022 - IEEE International Conference on Communications, 2022As a promising enabler for edge intelligence, Unmanned Aerial Vehicles (UAVs) are playing a more and more important role in Mobile Edge Computing Networks (MECN), such as ground sensor communication assistance, user data collection, edge computation ...
Yaoqi Yang +6 more
semanticscholar +1 more source
Mutli-Link Channel Access Schemes for IEEE 802.11be Extremely High Throughput
IEEE Communications Standards Magazine, 2022Multi-link Operation (MLO) was introduced into 802.11be as a promising technology to improve throughput and provide Quality of Services (QoS) guarantees. In this article, we start by introducing the multi-link transmission issues for MLO.
Kaiwen Huang +6 more
semanticscholar +1 more source
Scheduling Channel Access Based on Target Wake Time Mechanism in 802.11ax WLANs
IEEE Transactions on Wireless Communications, 2021Trend of dense deployment of 802.11 WLANs makes it urgent to design effective and efficient channel access schemes. IEEE 802.11ax standard for the next generation WLAN introduces the orthogonal frequency division multiple access (OFDMA) mechanism that ...
Qinghua Chen, Yi-hua Zhu
semanticscholar +1 more source
PolarTracker: Attitude-aware Channel Access for Floating Low Power Wide Area Networks
IEEE Conference on Computer Communications, 2021Low Power Wide Area Networks (LPWAN) such as Long Range (LoRa) show great potential in emerging aquatic IoT applications. However, our deployment experience shows that the floating LPWAN suffer significant performance degradation, compared to the static ...
Yuting Wang +3 more
semanticscholar +1 more source
Energy-Efficient Channel Access and Data Offloading Against Dynamic Jamming Attacks
IEEE Transactions on Green Communications and Networking, 2021Multi-access edge computing (MEC) system is developing to take advantage of the adjacent computation devices to reach better performance for IoT networks, and has to fight against malicious jamming attacks and heavy co-channel interference.
Yifan Xu +7 more
semanticscholar +1 more source
Channel configuration of multiple-access channel
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., 2004This paper investigates the channel configuration of multiple-access channel (MAC) by decomposing the MAC into finite subMAC and also proves that there exists an input probability that achieves boundary of a capacity region and the total capacity of the original MAC.
Yoichiro Watanabe, Koichi Kamoi
openaire +1 more source
Channel-hopping multiple access
2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record, 2000The medium-access control (MAC) protocols for wireless networks proposed or implemented to date based on collision-avoidance handshakes between the sender and receiver either require carrier sensing or the assignment of unique codes to nodes to ensure that intended receivers hear data packets without interference from hidden sources.
Asimakis Tzamaloukas +1 more
openaire +1 more source
Cognitive access algorithms for multiple access channels
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2013This paper considers a multiple access fading channel where each terminal has a different belief about the channel states and adapts its transmission policy to the belief. In this setting, frequency division multiple access (FDMA) and channel aware random access (RA) are two special cases.
Yichuan Hu, Alejandro Ribeiro
openaire +1 more source
An Optimal Policy for Hybrid Channel Access in Cognitive Radio Networks With Energy Harvesting
IEEE Transactions on Vehicular Technology, 2020In this aticle, an optimal policy is presented to maximize the secondary user's (SU's) throughput in an energy harvesting cognitive radio network with multiple SUs and single primary user (PU).
Ahmed F. Tayel +3 more
semanticscholar +1 more source

