Results 21 to 30 of about 678,028 (273)
New contention resolution schemes for WiMAX [PDF]
—The use of Broadband Wireless Access (BWA) technology is increasing due to the use of Internet and multimedia applications with strict requirements of end–to–end delay and jitter, through wireless devices.
Delicado, FM +3 more
core +1 more source
This article inquires into the specificity of Jewish attitudes toward Christian power in the Grand-Duchy of Tuscany and is meant to reconstruct the history of legal contentions between Jews and Christians during the second half of the 18th century ...
Davide Mano
doaj +1 more source
A Q-Learning-Based Adaptive MAC Protocol for Internet of Things Networks
In Internet of Things (IoT) applications, sometimes the quality of service (QoS) of throughput for transmitting video or the QoS of bounded delay for control of a sensor node is required.
Chien-Min Wu +4 more
doaj +1 more source
Random Access Game and Medium Access Control Design [PDF]
Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (
Chen, Lijun +2 more
core +3 more sources
Study of some contention techniques for gathering tarantula venom [PDF]
The study of various types of venom has become a priority in the last years for medical sciences and biology Tarantula venoms represent a natural wealth of combinations of chemical compounds that attract more and more attention of pharmacologists.
Diana Cimpian +2 more
doaj
IEEE 802.15.4 standard is specifically designed for a low-rate and low-processing Internet of things (IoT) applications and offers guaranteed time slots.
Sangrez Khan +5 more
doaj +1 more source
Women's human rights in Russia: outmoded battlegrounds, or new sites of contentious politics? [PDF]
This article draws on three pieces of qualitative research conducted with women in provincial Russia over the last 10 years. The first section analyses women's discussions of their everyday rights claims and their engagement in “consentful” forms of ...
Turbine, Vikki
core +1 more source
Hidden Terminal-Aware Contention Resolution with an Optimal Distribution [PDF]
Achieving low-power operation in wireless sensor networks with high data load or bursty traffic is challenging. The hidden terminal problem is aggravated with increased amounts of data in which traditional backoff-based contention resolution mechanisms ...
Ghadimi, Euhanna +4 more
core +2 more sources
J'ai pu constater au sein de mon équipe, que la contention physique passive, est une proposition quasi systématique evoqué par l'equipe pour répondre aux problèmes de chutes causés par la perte d'autonomie.
Magnolia Ouriques de Oliveira
doaj +1 more source
ALOHA Random Access that Operates as a Rateless Code [PDF]
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices.
Popovski, Petar, Stefanovic, Cedomir
core +2 more sources

