Have a personal or library account? Click to login
Efficient MAC protocol for IEEE 802.11 wireless LANs with obstructing objects Cover

Efficient MAC protocol for IEEE 802.11 wireless LANs with obstructing objects

Open Access
|Dec 2019

References

  1. [1] J. Wilson and N. Patwari, “See-Through Walls: Motion Tracking Using Variance-Based Radio Tomography Networks”, <em>IEEE Transactions on Mobile Computing</em>, vol. 10, no. 5, pp. 612-621, 2011.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TMC.2010.175" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TMC.2010.175</a></dgdoi:pub-id>
  2. [2] C. Wu <em>et al</em>, “Non-Invasive Detection of Moving and Stationary Human with WiFi”, <em>IEEE Journal on Selected Areas in Communications</em>, vol. 33, no. 11, pp. 2329-2342, 2015.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/JSAC.2015.2430294" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/JSAC.2015.2430294</a></dgdoi:pub-id>
  3. [3] <em>IEEE Wireless LAN Edition</em>, IEEE Press, New York, NY, USA, 2003.
  4. [4] W.Y. Choi and M. Chatterjee, “Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs”, <em>Frequenz</em>, vol. 69, no. 3/4, pp. 141-147, 2015.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1515/freq-2014-0104" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1515/freq-2014-0104</a></dgdoi:pub-id>
  5. [5] W. -y Choi, “Hybrid MAC protocol for IEEE 802. 11 wireless LANs with Hidden Node Problem”, <em>Journal of Electrical Engineering</em>, vol. 69, no. 4, pp. 323-325, 2018.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.2478/jee-2018-0046" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2478/jee-2018-0046</a></dgdoi:pub-id>
  6. [6] C. Sarr, C. Chaudet, G. Chelius, and I. G. Lassous, “Bandwidth Estimation for IEEE 802. 11-based Ad Hoc Networks”, <em>IEEE Transactions onMobile Computing</em>, vol. 7, no. 10, pp. 1228-1241, 2008.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TMC.2008.41" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TMC.2008.41</a></dgdoi:pub-id>
  7. [7] T. J. Kenney and E. Perahia, “Wireless Device Method for Low Power Low Data Rate Operation”, <em>United States Patent</em> US 9712362 2017.
DOI: https://doi.org/10.2478/jee-2019-0082 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 486 - 488
Submitted on: Jul 23, 2019
Published on: Dec 31, 2019
Published by: Slovak University of Technology
In partnership with: Paradigm Publishing Services
Publication frequency: 6 times per year

© 2019 Woo-Yong Choi, published by Slovak University of Technology
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.