Carrier-sense multiple access with collision avoidance

Results: 81



#Item
11Opening the Sensornet Black Box Technical Report SINGJung Il Choi, Jung Woo Lee, Megan Wachs, and Philip Levis Computer Systems Laboratory Stanford University

Opening the Sensornet Black Box Technical Report SINGJung Il Choi, Jung Woo Lee, Megan Wachs, and Philip Levis Computer Systems Laboratory Stanford University

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:11
12Opening the Sensornet Black Box Jung Il Choi, Jung Woo Lee, Megan Wachs, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA 94305

Opening the Sensornet Black Box Jung Il Choi, Jung Woo Lee, Megan Wachs, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA 94305

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:15
13Multiple Access Interference Mitigation Through Multi-Level Locally Orthogonal FH-CDMA Jens Elsner, Ralph Tanbourgi and Friedrich K. Jondral Karlsruhe Institute of Technology, Germany {jens.elsner, ralph.tanbourgi, fried

Multiple Access Interference Mitigation Through Multi-Level Locally Orthogonal FH-CDMA Jens Elsner, Ralph Tanbourgi and Friedrich K. Jondral Karlsruhe Institute of Technology, Germany {jens.elsner, ralph.tanbourgi, fried

Add to Reading List

Source URL: www.cel.kit.edu

Language: English - Date: 2011-08-01 01:38:43
14Real-Time Data Aggregation in Contention-Based Wireless Sensor Networks JUN ZHANG and XIAOHUA JIA City University of Hong Kong and GUOLIANG XING

Real-Time Data Aggregation in Contention-Based Wireless Sensor Networks JUN ZHANG and XIAOHUA JIA City University of Hong Kong and GUOLIANG XING

Add to Reading List

Source URL: www.cs.cityu.edu.hk

Language: English - Date: 2010-08-17 22:55:34
15Energy Efficient MAC for Cellular-Based M2M Communications Amin Azari and Guowang Miao KTH Royal Institute of Technology  Abstract—In Machine-to-Machine (M2M) networks, an energy

Energy Efficient MAC for Cellular-Based M2M Communications Amin Azari and Guowang Miao KTH Royal Institute of Technology Abstract—In Machine-to-Machine (M2M) networks, an energy

Add to Reading List

Source URL: wireless.kth.se

Language: English - Date: 2014-10-08 02:59:41
16Delft University of Technology Master’s Thesis in Electrical Engineering A Comprehensive Study of Passive Wake-up Radio in Wireless Sensor Networks Liang Huo

Delft University of Technology Master’s Thesis in Electrical Engineering A Comprehensive Study of Passive Wake-up Radio in Wireless Sensor Networks Liang Huo

Add to Reading List

Source URL: www.es.ewi.tudelft.nl

Language: English - Date: 2014-09-12 04:42:02
17The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks Yan Gao, Dah-Ming Chiu Department of Information Engineering The Chinese University of Hong Kong Email: {ygao4, dmchiu}@ie.cuhk.edu.hk

The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks Yan Gao, Dah-Ming Chiu Department of Information Engineering The Chinese University of Hong Kong Email: {ygao4, dmchiu}@ie.cuhk.edu.hk

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-12-13 10:43:26
18Countering Selfish Misbehavior in Multi-channel MAC Protocols Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona Email: ,  Abstr

Countering Selfish Misbehavior in Multi-channel MAC Protocols Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona Email: , Abstr

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English
19Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks Jaein Jeong David E. Culler Jae-Hyuk Oh

Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks Jaein Jeong David E. Culler Jae-Hyuk Oh

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2005-11-22 01:47:03
20Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasures Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona Email: ,

Vulnerabilities of Cognitive Radio MAC Protocols and Countermeasures Yan Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona Email: ,

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2013-03-07 17:47:49