Results 1 - 10
of
434
An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network17 An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL N
"... When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it overflows. In backpressure algo-rithm suitable for low traffic [1], it prevents buffer overflows. In backoff time in leaky bucket over traf-fic policing mechanism suitable for high traff ..."
Abstract
- Add to MetaCart
When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it overflows. In backpressure algo-rithm suitable for low traffic [1], it prevents buffer overflows. In backoff time in leaky bucket over traf-fic policing mechanism suitable for high
Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 2000
"... In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically ..."
Abstract
-
Cited by 445 (13 self)
- Add to MetaCart
algorithm can drive the IEEE 802.11 protocol close to the theoretical throughput limit. Hence we propose a distributed algorithm that enables each station to tune its backoff algorithm at run-time. The performances of the IEEE 802.11 protocol, enhanced with our algorithm, are extensively investigated
Scalable Backoff Language Models
- In Proceedings of ICSLP
, 1996
"... When a trigram backoff language model is created from a large body of text, trigrams and bigrams that occur few times in the training text are often excluded from the model in order to decrease the model size. Generally, the elimination of n-grams with very low counts is believed to not significantl ..."
Abstract
-
Cited by 64 (1 self)
- Add to MetaCart
When a trigram backoff language model is created from a large body of text, trigrams and bigrams that occur few times in the training text are often excluded from the model in order to decrease the model size. Generally, the elimination of n-grams with very low counts is believed
Stability Of Binary Exponential Backoff
, 1988
"... Binary exponential backoff is a randomized protocol for regulating transmissions on a multiple access broadcast channel. Ethernet, a local area network, is built upon this protocol. The fundamental theoretical issue is stability: does the backlog of packets awaiting transmission remain bounded in ti ..."
Abstract
-
Cited by 55 (0 self)
- Add to MetaCart
in time, provided the rates of new packet arrivals are small enough? It is assumed n 2 stations share the channel, each having an infinite buffer where packets accumulate while the station attempts to transmit the first from the buffer. Here, it is established that binary exponential backoff is stable
Scalable Backoff Language Models
, 1996
"... When a trigram backoff language model is created from a large body of text, trigrams and bigrams that occur few times in the training text are often excluded from the model in order to decrease the model size. Generally, the elimination of n-grams with very low counts is believed to not significantl ..."
Abstract
- Add to MetaCart
When a trigram backoff language model is created from a large body of text, trigrams and bigrams that occur few times in the training text are often excluded from the model in order to decrease the model size. Generally, the elimination of n-grams with very low counts is believed
On Backoff in Fading Wireless Channels?
"... Abstract. We consider the impact of transmission errors on the backoff algorithm behavior in the IEEE 802.11 protocol. Specifically, since the backoff algorithm assumes that all packet losses are due to collisions, it unnecessarily backs off when a packet is lost due to a transmission error. Two per ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. We consider the impact of transmission errors on the backoff algorithm behavior in the IEEE 802.11 protocol. Specifically, since the backoff algorithm assumes that all packet losses are due to collisions, it unnecessarily backs off when a packet is lost due to a transmission error. Two
The Effectiveness of the Programmed Backoff Method in the Presence of Background Traffic
, 1999
"... In many parallel processing applications, several nodes will complete a task at approximately the same time. If the application is run on an Ethernet, the near-simultaneity of the task completion times implies that when the tasks attempt to communicate with some central task manager, they will bump ..."
Abstract
- Add to MetaCart
into each other. This in turn can cause a major slowdown in communication, as the Ethernet hardware generates unnecessarily long backoff times. A solution to this problem, called programmed backoff, has been proposed earlier and shown to work well on Ethernets which are dedicated to the particular
No time to countdown: migrating backoff to the frequency domain
- In ACM MobiCom
, 2011
"... Conventional WiFi networks perform channel contention in time domain. This is known to be wasteful because the chan-nel is forced to remain idle while all contending nodes are backing off for multiple time slots. This paper proposes to break away from convention and recreate the backing off op-erati ..."
Abstract
-
Cited by 16 (0 self)
- Add to MetaCart
-eration in the frequency domain. Our basic idea leverages the observation that OFDM subcarriers can be treated as integer numbers. Thus, instead of picking a random backoff duration in time, a contending node can signal on a randomly cho-sen subcarrier. By employing a second antenna to listen to all the subcarriers, each
Scalable Trigram Backoff Language Models
, 1996
"... When a trigram backoff language model is created from a large body of text, trigrams and bigrams that occur few times in the training text are often excluded from the model in order to decrease the model size. Generally, the elimination of n-grams with very low counts is believed to not significantl ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
When a trigram backoff language model is created from a large body of text, trigrams and bigrams that occur few times in the training text are often excluded from the model in order to decrease the model size. Generally, the elimination of n-grams with very low counts is believed
A Backoff Algorithm for Improving Saturation Throughput in IEEE 802.11 DCF
"... Abstract — The medium access control (MAC) protocol is the main element which determines the system throughput in wireless local area networks. The MAC technique of the IEEE 802.11 protocol is called Distributed Coordination Function (DCF). However, in the DCF access procedure, the system throughput ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
to the packet just prior to transmission. When a station hears packets which have older finish tags than the station, the station increases its backoff time counter. Therefore, the backoff time counter depends on the number of active stations in a wireless network; the more stations there are, the larger
Results 1 - 10
of
434