Results 1 - 10
of
310
Performance evaluation of an adaptive backoff scheme for WLAN
- Wireless Communications and Mobile Computing
, 2004
"... In this paper, a simple self-adaptive contention window adjustment algorithm for 802.11 WLAN is proposed and analyzed. Numerical results show that the new algorithm outperforms the standard 802.11 window adjustment algorithm. Compared with the standard and previously proposed enhancement algorithms, ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
, a salient feature of our algorithm is that it performs well in both heavy and light contention cases regardless of the packet sizes and physical versions. Moreover, the adaptive window adjustment algorithm is simpler than previously proposed schemes in that no live measurement of the WLAN traffic
A model of Fuzzy Control Backoff Schemes in Telecommunication Networks
"... Abstract:- Fuzzy control is based on fuzzy logic, which provides an efficient method to handle inexact information as a basis of reasoning. With fuzzy logic it is possible to convert knowledge, which is expressed in an uncertain form, to an exact algorithm. In fuzzy control, the controller can be re ..."
Abstract
- Add to MetaCart
be represented with if-then rules. The interpretation of the controller is fuzzy but the controller is processing exact input-data and is producing exact output-data in a deterministic way. However, Backoff time computation schemes, namely: pseudorandom backoff (PB) time, exponential backoff (EB) time and random
Evaluation of Adaptive Fuzzy Control Backoff Schemes in Policing Mechanisms
"... Fuzzy controllers are the most important applications of fuzzy theory, which provides an efficient method to handle inexact information as a basic of reasoning. Fuzzy logic converts knowledge which is expressed in an uncertain form to an exact algorithm. In fuzzy control, the controller can be repre ..."
Abstract
- Add to MetaCart
be represented by if-then-else rules. The controller is processing exact input data and is producing exact output data in a deterministic way. However, Backoff time computation schemes, namely: pseudorandom backoff (PB) time, exponential backoff (EB) time and random backoff (RB) time that are applicable
DRMA with Multiple Slots Reservation and Retransmission Algorithm Using Exponential Backoff Scheme
, 2000
"... Dynamic reservation multiple access (DRMA) has been proposed to improve the spectrum efficiency of the integrated voice and data services. In that protocol, although the fixed reservation overhead is avoidable, a data terminal that transmits a data message with multiple packets has to reserve a slot ..."
Abstract
- Add to MetaCart
exponential backoff scheme as the proposed-2 DRMA to further improve the data message delay. By the performance evaluation using computer simulations, weshow that the proposed schemes reduce the data message delay without degrading the voice packet loss probability comparing to the conventional DRMA. 1
NOVEL CI-BACKOFF SCHEME FOR REAL-TIME EMBEDDED SPEECH RECOGNITION
"... A new method for reduction of computation and memory bandwidth for embedded large vocabulary continuous speech recognition is presented. During the Hidden Markov model state likelihood computation, scores for selected context-dependent (triphone) model states are computed for several frames in advan ..."
Abstract
- Add to MetaCart
A new method for reduction of computation and memory bandwidth for embedded large vocabulary continuous speech recognition is presented. During the Hidden Markov model state likelihood computation, scores for selected context-dependent (triphone) model states are computed for several frames in advance. Scores that are subsequently needed for Viterbi search but not found in the buffer are replaced by the scores for associated context independent (monophone) models. On the Wall Street Journal 20,000 word continuous speech recognition task, an overall reduction of 58 % memory bandwidth and decrease of 23% execution time is achieved relative to an assembly optimized implementation of Sphinx 3. Recognition accuracy is reduced by <1 % while recognition latency is increased by 30 milliseconds. Index Terms — speech recognition, acoustic modeling,
Effect of Exponential Backoff Scheme and Retransmission Cutoff on the Stability of Frequency-Hopping Slotted ALOHA Systems
, 2003
"... The combinatorial effect of an exponential backoff scheme and retransmission cutoff on the stability of frequency-hopping slotted ALOHA systems with finite population is investigated in terms of the catastrophe theory. In the systems, the packet retransmission probabilities are geometrically distrib ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The combinatorial effect of an exponential backoff scheme and retransmission cutoff on the stability of frequency-hopping slotted ALOHA systems with finite population is investigated in terms of the catastrophe theory. In the systems, the packet retransmission probabilities are geometrically
416 Energy Efficiency Analysis of Link Layer Backoff Schemes on Point-to-Point Markov Fading Links
"... Backoff algorithms are traditionally employed in multiple access networks, like Ethernet, to recover from packet collisions. In this paper, we propose and carry out the analysis for three types of link layer backoff schemes-linear, binary exponential, geometn'c-on point-to-point wireless fading ..."
Abstract
- Add to MetaCart
Backoff algorithms are traditionally employed in multiple access networks, like Ethernet, to recover from packet collisions. In this paper, we propose and carry out the analysis for three types of link layer backoff schemes-linear, binary exponential, geometn'c-on point-to-point wireless
Energy Efficiency Analysis of Link Layer Backoff Schemes on Point-to-Point Markov Fading Links
- in Proc. PIMRC’2000
, 2000
"... Backoff algorithms are traditionally employed in multiple access networks, like Ethernet, to recover from packet collisions. In this paper, we propose and carry out the analysis for three types of link layer backoff schemes--linear, binary exponential, geometric--on point-to-point wireless fading l ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Backoff algorithms are traditionally employed in multiple access networks, like Ethernet, to recover from packet collisions. In this paper, we propose and carry out the analysis for three types of link layer backoff schemes--linear, binary exponential, geometric--on point-to-point wireless fading
Analysis of Link Layer Backoff Schemes on Point-to-Point Markov Fading Links
- IEEE Trans. on Commun. http://ece.iisc.ernet.in/achockal/aboutme/node7.html
, 2000
"... Backoff algorithms are typically employed in multiple access networks (e.g., Ethernet) to recover from packet collisions. In this paper, we propose and carry out the analysis for three types of link layer backoff schemes--linear, binary exponential, geometric--on point-to-point wireless fading li ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Backoff algorithms are typically employed in multiple access networks (e.g., Ethernet) to recover from packet collisions. In this paper, we propose and carry out the analysis for three types of link layer backoff schemes--linear, binary exponential, geometric--on point-to-point wireless fading
Modified Backoff Scheme for MAC Performance Enhancement in IEEE 802.15.4 Sensor Network
"... Abstract:- WPAN is a low rate and low power networking technology for short range communications, and it currently uses IEEE 802.15.4 MAC and PHY layers. The technology employs special CSMA/CA to save power consumption and collision avoidance for small or portable WPAN-enabled devices. However, ther ..."
Abstract
- Add to MetaCart
, there are no quality of service guarantees. We propose a modified backoff scheme to reduce the collisions and enhance the throughput. Simulation results show that the proposed scheme is a good candidate for backoff scgeme in wireless sensor networks. Keywords- wireless sensor network; 802.15.4; Backoff
Results 1 - 10
of
310