Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 282-286.
• Network & Communication • Previous Articles Next Articles
LIU Sheng-bo1,2,3, FU Li-qun4
CLC Number:
[1]JAIN M,CHOI J I,KIM T,et al.Practical,real-time,full duplex wireless[C]∥Proceedings of the 17th Annual International Conference on Mobile Computing and Networking.ACM,2011:301-312. [2]CHOI J I,JAIN M,SRINIVASAN K,et al.Achieving single channel,full duplex wireless communication[C]∥Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking.ACM,2010:1-12. [3]BHARADIA D,MCMILIN E,KATTI S.Full duplex radios[J].ACM SIGCOMM Computer Communication Review,2013,43(4):375-386. [4]KIM D,LEE H,HONG D.A survey of in-band full-duplex transmission:From the perspective of PHY and MAC layers[J].IEEE Communications Surveys & Tutorials,2015,17(4):2017-2046. [5]孙彦景,左海维,李松.带内全双工无线通信自干扰消除及 MAC 调度研究综述[J].电子科技大学学报,2016,45(6):873-887. [6]SONG L,LIAO Y,BIAN K,et al.Cross-layer protocol design for CSMA/CD in full-duplex WiFi networks[J].IEEE Communications Letters,2016,20(4):792-795. [7]TOBAGI F,KLEINROCK L.Packet switching in radio chan-nels:part II--the hidden terminal problem in carrier sense multiple-access and the busy-tone solution[J].IEEE Transactions on Communications,1975,23(12):1417-1433. [8]WU C,LI V.Receiver-initiated busy-tone multiple access in packet radio networks[C]∥ACM SIGCOMM Computer Communication Review.ACM,1987:336-342. [9]HAAS Z J,DENG J.Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks[J].IEEE Transactions on Communications,2002,50(6):975-985. [10]KARN P.MACA-a new channel access method for packet radio[C]∥Amateur Radio 9th Computer Networking Conference.1990:134-140. [11]BHARGHAVAN V,DEMERS A,SHENKER S,et al.MA-CAW:a media access protocol for wireless LAN’s[J].ACM SIGCOMM Computer Communication Review,1994,24(4):212-225. [12]XU K,GERLA M,BAE S.How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks[C]∥Global Telecommunications Conference.2002,1:72-76. [13]YANG X,HUANG Y F,YANG W,et al.A dual channel MAC protocol for providing high spatial reuse and channel efficiency[C]∥2009 1st International Conference on Information Science and Engineering (ICISE).IEEE,2009:3930-3935. [14]MUQATTASH A,KRUNZ M.Power controlled dual channel (PCDC) medium access protocol for wireless ad hoc networks[C]∥INFOCOM 2003.Twenty-Second Annual Joint Confe-rence of the IEEE Computer and Communications.IEEE Societies,2003:470-480. [15]JIANG L B,LIEW S C.Improving throughput and fairness by reducing exposed and hidden nodes in 802.11 networks[J].IEEE Transactions on Mobile Computing,2008,7(1):34-49. [16]FU L,LIEW S C,HUANG J.Effective carrier sensing in CSMA networks under cumulative interference[J].IEEE Transactions on Mobile Computing,2013,12(4):748-760. [17]TAMAKI K,RAPTINO H A,SUGIYAMA Y,et al.Full du-plex media access control for wireless multi-hop networks[C]∥2013 IEEE 77th Vehicular Technology Conference (VTC Spring).IEEE,2013:1-5. [18]The Network Simulator:ns3[OL].http://www.nsnam.org. [19]JIANG L B,LIEW S C.Removing hidden nodes in IEEE 802.11 wireless networks[J].IEEE Vehicular Technology Conference,2005,62(2):1127-1131. [20]GOYAL S,LIU P,GURBUZ O,et al.A distributed MAC protocol for full duplex radio[C]∥2013 Asilomar Conference on Signals,Systems and Computers.IEEE,2013:788-792. [21]CHENG W,ZHANG X,ZHANG H.RTS/FCTS mechanism based full-duplex MAC protocol for wireless networks[C]∥Globecom Workshops (GC Wkshps).2013:5017-5022. [22]THILINA K M,TABASSUM H,HOSSAIN E,et al.Medium access control design for full duplex wireless systems:challenges and approaches[J].IEEE Communications Magazine,2015,53(5):112-120. [23]CHOI W,LIM H,SABHARWAL A.Power-controlled medium access control protocol for full-duplex WiFi networks[J].IEEE Transactions on Wireless Communications,2015,14(7):3601-3613. |
[1] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[4] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[5] | LI Zong-min, ZHANG Yu-peng, LIU Yu-jie, LI Hua. Deformable Graph Convolutional Networks Based Point Cloud Representation Learning [J]. Computer Science, 2022, 49(8): 273-278. |
[6] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[7] | SHAN Yong-feng, JIANG Rui, XU You-yun, LI Da-peng. Power Consumption Scheme Oriented to Full-duplex Multi-relay Cooperative SWIPT Networks [J]. Computer Science, 2022, 49(7): 280-286. |
[8] | PAN Zhi-yong, CHENG Bao-lei, FAN Jian-xi, BIAN Qing-rong. Algorithm to Construct Node-independent Spanning Trees in Data Center Network BCDC [J]. Computer Science, 2022, 49(7): 287-296. |
[9] | WANG Jian-ming, CHEN Xiang-yu, YANG Zi-zhong, SHI Chen-yang, ZHANG Yu-hang, QIAN Zheng-kun. Influence of Different Data Augmentation Methods on Model Recognition Accuracy [J]. Computer Science, 2022, 49(6A): 418-423. |
[10] | SUN Jie-qi, LI Ya-feng, ZHANG Wen-bo, LIU Peng-hui. Dual-field Feature Fusion Deep Convolutional Neural Network Based on Discrete Wavelet Transformation [J]. Computer Science, 2022, 49(6A): 434-440. |
[11] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[12] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[13] | XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223. |
[14] | LUO Jun-ren, ZHANG Wan-peng, LU Li-na, CHEN Jing. Survey on Online Adversarial Planning for Real-time Strategy Game [J]. Computer Science, 2022, 49(6): 287-296. |
[15] | YANG Tao-yu, XU Yuan-yuan, TAN Zeng-jie. Tile Partition Optimized Omnidirectional Video Coding for 6G Network [J]. Computer Science, 2022, 49(6): 66-72. |
|