• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 449
Next 10 →

Dynamic TDMA Slot Assignment in Ad Hoc Networks

by Akimitsu Kanzaki, Toshiaki Uemukai, Takahiro Hara, Shojiro Nishio - in Proc. of AINA ’03 , 2003
"... In this paper, we propose a TDMA slot assignment protocol to improve the channel utilization, which controls the excessive increase of unassigned slots by changing the frame length dynamically. Our proposed protocol assigns one of the unassigned slots to a node which joins the network. If there is n ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
In this paper, we propose a TDMA slot assignment protocol to improve the channel utilization, which controls the excessive increase of unassigned slots by changing the frame length dynamically. Our proposed protocol assigns one of the unassigned slots to a node which joins the network

A distributed TDMA slot assignment algorithm for wireless sensor networks

by Ted Herman, Sébastien Tixeuil , 2004
"... Wireless sensor networks benefit from communication protocols that reduce power requirements by avoiding frame collision. Time Division Media Access methods schedule transmission in slots to avoid collision, however these methods often lack scalability when implemented in ad hoc networks subject to ..."
Abstract - Cited by 69 (8 self) - Add to MetaCart
to node failures and dynamic topology. This paper reports a distributed algorithm for TDMA slot assignment that is self-stabilizing to transient faults and dynamic topology change. The expected local convergence time is O(1) for any size network satisfying a constant bound on the size of a node

Interference-Free TDMA Slot Allocation in Wireless Sensor Networks

by Mário Nunes, António Grilo - Proceedings of the 32nd IEEE Conference on Local Computer Networks (LCN 2007 , 2007
"... Abstract — This paper presents a distributed algorithm for efficient Time Division Multiple Access (TDMA) slot allocation in Wireless Sensor Networks, which is to be used in close association with a new TDMA-based MAC protocol called Latency-Energy Minimization Medium Access (LEMMA). Unlike most of ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Abstract — This paper presents a distributed algorithm for efficient Time Division Multiple Access (TDMA) slot allocation in Wireless Sensor Networks, which is to be used in close association with a new TDMA-based MAC protocol called Latency-Energy Minimization Medium Access (LEMMA). Unlike most

A Distributed TDMA Slot Scheduling Algorithm for Spatially Correlated Contention in WSNs

by Ashutosh Bhatia , R C Hansdah
"... In WSNs the communication traffic is often time and space correlated, where multiple nodes in a proximity start transmitting simultaneously. Such a situation is known as spatially correlated contention. The random access method to resolve such contention suffers from high collision rate, whereas th ..."
Abstract - Add to MetaCart
. Additionally, if an algorithm takes very long time to schedule, it will not only introduce additional delay in the data transfer but also consume more energy. In this paper, we present a distributed TDMA slot scheduling (DTSS) algorithm, which considerably reduces the time required to perform scheduling, while

Analysing TDMA with Slot Skipping

by Björn Andersson, Eduardo Tovar, Nuno Pereira, Björn Andersson, Eduardo Tovar, Nuno Pereira - In Proceedings of the 26th IEEE RealTime Systems Symposium , 2005
"... Distributed real-time systems in all their forms, for example in-vehicle electronics, factory-floor controls or wireless sensor systems, need to communicate with bounded delays. TDMA (time division multiple access) protocols solve this by assigning messages to time slots such that no two nodes trans ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
Distributed real-time systems in all their forms, for example in-vehicle electronics, factory-floor controls or wireless sensor systems, need to communicate with bounded delays. TDMA (time division multiple access) protocols solve this by assigning messages to time slots such that no two nodes

Multiuser OFDM with Adaptive Subcarrier, Bit, and Power Allocation

by Cheong Yui Wong, Roger S. Cheng, Khaled Ben Letaief , Ross D. Murch - IEEE JOURNAL ON SELECTED AREAS OF COMMUNICATIONS , 1999
"... Multiuser orthogonal frequency division multiplexing (OFDM) with adaptive multiuser subcarrier allocation and adaptive modulation is considered. Assuming knowledge of the instantaneous channel gains for all users, we propose a multiuser OFDM subcarrier, bit, and power allocation algorithm to minimiz ..."
Abstract - Cited by 360 (3 self) - Add to MetaCart
delay spread values and various numbers of users. The results show that our proposed algorithm outperforms multiuser OFDM systems with static time-division multiple access (TDMA) or frequency-division multiple access (FDMA) techniques which employ fixed and predetermined time-slot or subcarrier

Exact Analysis of TDMA with Slot Skipping

by Nuno Pereira, Björn Andersson, See Profile, Nuno Pereira, Eduardo Tovar, Björn Andersson - 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007). IEEE Computer Society , 2007
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.

Minimizing Interference in TDMA MAC Protocols for WSN Operating in Shadow-fading Channels

by unknown authors
"... Abstract — This paper presents an analysis of the impact of shadow fading on the performance of TDMA slot allocation, with latter being measured in terms of the resultant in-network interference versus spatial reutilization. Simulations are presented which demonstrate that for Wireless Sensor Networ ..."
Abstract - Add to MetaCart
Abstract — This paper presents an analysis of the impact of shadow fading on the performance of TDMA slot allocation, with latter being measured in terms of the resultant in-network interference versus spatial reutilization. Simulations are presented which demonstrate that for Wireless Sensor

Z-MAC: a Hybrid MAC for Wireless Sensor Networks

by Ajit Warrier, Jeongki Min, Injong Rhee , 2005
"... Z-MAC is a hybrid MAC protocol for wireless sensor networks. It combines the strengths of TDMA and CSMA while offsetting their weaknesses. Nodes are assigned time slots using a distributed implementation of RAND. Unlike TDMA where a node is allowed to transmit only during its own assigned slots, a n ..."
Abstract - Cited by 296 (7 self) - Add to MetaCart
Z-MAC is a hybrid MAC protocol for wireless sensor networks. It combines the strengths of TDMA and CSMA while offsetting their weaknesses. Nodes are assigned time slots using a distributed implementation of RAND. Unlike TDMA where a node is allowed to transmit only during its own assigned slots, a

Practical TDMA for Datacenter Ethernet

by Bhanu C. Vattikonda, George Porter, Amin Vahdat, Alex C. Snoeren
"... Cloud computing is placing increasingly stringent demands on datacenter networks. Applications like MapReduce and Hadoop demand high bisection bandwidth to support their all-to-all shuffle communication phases. Conversely, Web services often rely on deep chains of relatively lightweight RPCs. While ..."
Abstract - Cited by 13 (6 self) - Add to MetaCart
of the datacenter environment to apply time-division multiple access (TDMA). We design and implement a TDMA MAC layer for commodity Ethernet hardware that allows end hosts to dispense with TCP’s reliability and congestion control. We evaluate the practicality of our approach and find that TDMA slots as short as 100
Next 10 →
Results 1 - 10 of 449
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University