A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Channel probing for opportunistic access with multi-channel sensing
2008
2008 42nd Asilomar Conference on Signals, Systems and Computers
Index Terms-Multi-channel opportunistic access, restless multi-armed bandit, Whittle's index, indexability ...
We consider an opportunistic communication system consisting of multiple independent channels with time-varying states. ...
MULTI-CHANNEL OPPORTUNISTIC ACCESS AND RESTLESS BANDIT FORMULATION Consider N independent Gilbert-Elliot channels, each with transmission rate B i (i = 1, · · · , N ). ...
doi:10.1109/acssc.2008.5074369
fatcat:avirl4a42fh2pezm4flqnf6ejq
Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain?
2013
IEEE Journal on Selected Areas in Communications
Abstract: We evaluate the performance of an opportunistic multi-channel medium access control protocol and compare it to that of the corresponding single-channel MAC (S-MAC) and a nonopportunistic multi-channel ...
We do this in three different settings: (1) an ideal scenario where no control channel is used and no sensing delay is incurred, (2) a more realistic scheme where users compete for access on a control ...
This means that a user only needs to reserve the control channel for channel sensing/probing purposes but not for data transmission. ...
doi:10.1109/jsac.2013.131122
fatcat:eqdszy5omvaarmdv2e2yqksyny
Online Sequential Channel Accessing Control: A Double Exploration vs. Exploitation Problem
2015
IEEE Transactions on Wireless Communications
Assuming perfect channel statistics, several studies have applied optimal stopping theory to derive control strategy for sequential sensing/probing based opportunistically accessing (s-SPA), exploiting ...
In opportunistic channel access, the user needs to make real time decisions on when and which channel to access with uncertainty. ...
accessing rule for opportunistic channel accessing. ...
doi:10.1109/twc.2015.2424413
fatcat:75rzqtdjajhwbk3g2o4rhdhf24
A Restless Bandit Formulation of Opportunistic Access: Indexablity and Index Policy
2008
2008 5th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops
With limited sensing, a user can only sense and access a subset of channels and accrue rewards determined by the state of the sensed channels. ...
Index Terms-Opportunistic access, optimal channel probing, restless multi-armed bandit, Whittle's index policy, indexability. 978-1-4244-2563-1/08/$25.00 ©2008 IEEE Authorized licensed use limited to: ...
Theorems 1-3 given below summarize the results on the indexability and Whittle's index policy for multi-channel opportunistic access. ...
doi:10.1109/sahcnw.2008.12
fatcat:iflmbf2fivgave3atqsacvejya
Opportunistic packet Scheduling and Media Access control for wireless LANs and multi-hop ad hoc networks
2004
2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733)
In the wireless LANs or mobile ad hoc networks, a node with multi-packets in its queue waiting for delivery to several neighboring nodes may choose to schedule a candidate receiver with good channel condition ...
Motivated by this observation, we introduce the Opportunistic packet Scheduling and Media Access control (OSMA) protocol to exploit high quality channel condition under certain fairness constraints. ...
Framework of OSMA In this section, we provide a general framework for opportunistic packet scheduling and media access control with imperfect channel information. ...
doi:10.1109/wcnc.2004.1311365
dblp:conf/wcnc/WangZF04
fatcat:msvrdtf6gbeafeliwa5kimlt6q
Distributed Cognitive Sensing for Time Varying Channels: Exploration and Exploitation
2010
2010 IEEE Wireless Communication and Networking Conference
Spectrum under-utilization calls for the open and dynamic spectrum access mechanism, which allows the unlicensed user equipped with cognitive radios to opportunistically sense and access the spectrum that ...
A coordination scheme for the multi-user case is also presented and the effectiveness is also demonstrated by the simulation results. ...
In [10] , a distributed channel sensing and access policy base on multi-armed bandit problem is presented for cognitive users to opportunistically exploit the available channels under statistical assumption ...
doi:10.1109/wcnc.2010.5506393
dblp:conf/wcnc/GaoQVH10
fatcat:m7djoqyifzdyjpi7ntazn6le5i
Concurrent-MAC
2013
Proceedings of the 19th annual international conference on Mobile computing & networking - MobiCom '13
A station gaining access to the channel, schedules a set of its neighbors for concurrent transmissions. ...
This paper presents the design and performance evaluation of Concurrent-MAC, a MAC protocol for increasing concurrent transmissions in multi-AP wireless LANs. ...
Probe Phase
Enabling Concurrent Transmissions Channel access mechanism of Concurrent-MAC is shown in Figure 2 . ...
doi:10.1145/2500423.2504582
dblp:conf/mobicom/HosseinabadiV13
fatcat:u2xutvqblbhslmsbwqcqsucjsi
Cooperative and opportunistic transmission for wireless ad hoc networks
2007
IEEE Network
In ad hoc networks fading environments provide the opportunity to exploit variations in channel conditions, and transmit to the user with the currently "best" channel. ...
For opportunistic transmission that exploits time diversity, it is observed that the inequality in channel contention due to the hidden terminal phenomenon tends to result in energy inefficiency. ...
Opportunistic Scheduling with Multi-User Diversity The fundamental rationality for leveraging multi-user diversity lies in that, in practice, the channel between any senderreceiver pair is independent ...
doi:10.1109/mnet.2007.314533
fatcat:tpbqvhfinba2dm33pm4hcimm4y
Adaptive cross-layer protocol design for opportunistic WLANs over TVWS
2014
2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN)
In this paper, we propose a QoS-aware parallel sensing/probing architecture, called QASPA, which exploits inherent channel and user diversities exhibited by the wireless system. ...
This is due to the unpredictable nature of spectrum availability combined with the fluctuations of channel quality. ...
Scheduling of Sensing/Probing Processes for HP Flows In [2] , an access point and spectral band selection scheme, called MAWS, is proposed. ...
doi:10.1109/dyspan.2014.6817835
dblp:conf/dyspan/Abdel-RahmanSK14
fatcat:qu3vb3goybdrnop3opbye5bs6y
Throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors
2009
Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09
In this paper, we exploit channel diversity for opportunistic spectrum access (OSA). ...
Our approach uses channel quality as a second criterion (along with the idle/busy status of the channel) in selecting channels to use for opportunistic transmission. ...
Thus, it is possible for a CR to exploit this multi-channel diversity by opportunistically selecting a good channel for transmission. ...
doi:10.1145/1614320.1614325
dblp:conf/mobicom/ShuK09
fatcat:bir3wdlnmzdgvhr3acvv2ryspm
Observation vs statistics: Near optimal online channel access in cognitive radio networks
2012
2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)
Further, we design a computational efficient channel access policy, integrating optimal stopping theory and multi-armed bandit policy effectively. ...
The computational complexity is reduced from O(KN K ) to O(K), where N is the number of channels, and K is the maximum number of sensing/probing times in each procedure. ...
With appropriate sensing order, observations can be leveraged for opportunistic access and reduce the computational overhead. ...
doi:10.1109/mass.2012.6502548
dblp:conf/mass/LiYWWLL12
fatcat:kmy2he5wivgkvnnzg65wyszdka
Multi-user Diversity for IEEE 802.11 Infrastructure Wireless LAN
[chapter]
2006
Lecture Notes in Computer Science
Multi-user diversity based opportunistic scheduling is a modern view communication over fading wireless channels, whereby, unlike rate adaptation based schemes, channel variations are exploited rather ...
This paper proposes a multi-user diversity scheme for IEEE 802.11 infrastructure wireless LAN to enhance the throughput. ...
The channel access number of the opportunistic mode divided by total channel access number in the proposed method is compared with FAIR in Fig. 5 . ...
doi:10.1007/11802167_23
fatcat:vefzejo2u5hyrfpof7mfbjbw74
Sequential opportunistic spectrum access with imperfect channel sensing
2013
Ad hoc networks
In this paper, we exploit channel diversity for opportunistic spectrum access (OSA). ...
Our approach uses instantaneous channel quality as a second criterion (along with the idle/busy status of the channel) in selecting channels to use for opportunistic transmission. ...
Thus, it is possible for a CR to exploit this multi-channel diversity by opportunistically selecting a good channel for transmission 1 . ...
doi:10.1016/j.adhoc.2012.09.004
fatcat:ynk5zx5d2rayrnl7kxpnqfelxq
To stay or to switch: Multiuser dynamic channel access
2013
2013 Proceedings IEEE INFOCOM
However, unlikely many prior works in this area, including channel probing and switching policies for a single user to exploit spectral diversity, and probing and access policies for multiple users over ...
In this paper we study opportunistic spectrum access (OSA) policies in a multiuser multichannel random access setting, where users perform channel probing and switching in order to obtain better channel ...
access network like IEEE 802.11, with the following modifications related to dynamic and opportunistic channel access. ...
doi:10.1109/infcom.2013.6566917
dblp:conf/infocom/LiuL13
fatcat:dxz43gp2szagjjtosqktrsagke
Resource Allocation in Spectrum Deployment for Cognitive Third-party Users
2021
International Journal of Advanced Computer Science and Applications
Jamming approach generates a periodic jamming signal for TSU in sensing of free spectrum. ...
The spectrum sharing and utilization of other user available spectrum is an optimal solution, which has outcome with a new mode of communication called cognitive network. ...
In [15] Formal paraphrase the sensing of opportunistic spectrum by a primary user in the mobility scenario is presented with authentic access to spectrum usage. ...
doi:10.14569/ijacsa.2021.0121164
fatcat:skc4qkoxbjdfdomu6pwn2zjj3q
« Previous
Showing results 1 — 15 out of 5,727 results