메뉴 건너뛰기




Volumn 15, Issue 17, 2015, Pages 2111-2124

Optimized bandwidth allocation in broadband wireless access networks

Author keywords

mobile WiMAX; optimization; QoS; resource allocation; utility functions

Indexed keywords

BANDWIDTH; BLOCKING PROBABILITY; BROADBAND NETWORKS; IEEE STANDARDS; INTEROPERABILITY; LONG TERM EVOLUTION (LTE); MOBILE TELECOMMUNICATION SYSTEMS; OPTIMIZATION; QUALITY OF SERVICE; RESOURCE ALLOCATION; TREES (MATHEMATICS);

EID: 84944454973     PISSN: 15308669     EISSN: 15308677     Source Type: Journal    
DOI: 10.1002/wcm.2479     Document Type: Article
Times cited : (4)

References (28)
  • 12
    • 57849127798 scopus 로고    scopus 로고
    • CAC and packet scheduling using token bucking for IEEE 802.16 networks
    • Tsai T, Jiang C, Wang C,. CAC and packet scheduling using token bucking for IEEE 802.16 networks. IEEE Journal of Communications 2006; 1 (2): 30-37.
    • (2006) IEEE Journal of Communications , vol.1 , Issue.2 , pp. 30-37
    • Tsai, T.1    Jiang, C.2    Wang, C.3
  • 18
    • 17444425737 scopus 로고    scopus 로고
    • Robotics based location sensing using wireless ethernet
    • Ladd AM, Bekris KE, Rudys A, Kavraki LE,. Robotics based location sensing using wireless ethernet. Wireless Networks 2005; 11 (1): 189-204.
    • (2005) Wireless Networks , vol.11 , Issue.1 , pp. 189-204
    • Ladd, A.M.1    Bekris, K.E.2    Rudys, A.3    Kavraki, L.E.4
  • 19
    • 33645212706 scopus 로고    scopus 로고
    • Analysis of hyperbolic and circular positioning algorithms using stationary signal-strengh-difference measurements in wireless communications
    • Liu B, Lin K, Wu J,. Analysis of hyperbolic and circular positioning algorithms using stationary signal-strengh-difference measurements in wireless communications. IEEE Transaction on Vehicular Technology 2006; 55 (2): 499-509.
    • (2006) IEEE Transaction on Vehicular Technology , vol.55 , Issue.2 , pp. 499-509
    • Liu, B.1    Lin, K.2    Wu, J.3
  • 22
    • 68949138994 scopus 로고    scopus 로고
    • Insider attack attribution using signal strength based hyperbolic location estimation
    • Laurendeau C, Barbeau M,. Insider attack attribution using signal strength based hyperbolic location estimation. Security and Communication Networks 2008; 1 (4): 337-349.
    • (2008) Security and Communication Networks , vol.1 , Issue.4 , pp. 337-349
    • Laurendeau, C.1    Barbeau, M.2
  • 24
    • 0347337885 scopus 로고    scopus 로고
    • A framework for bandwidth degradation and call admission control schemes for multiclass traffic in next-generation wireless networks
    • Das S, Sen S, Basu K,. A framework for bandwidth degradation and call admission control schemes for multiclass traffic in next-generation wireless networks. IEEE Journal on Selected Areas of Communication 2003; 21 (10): 1790-1802.
    • (2003) IEEE Journal on Selected Areas of Communication , vol.21 , Issue.10 , pp. 1790-1802
    • Das, S.1    Sen, S.2    Basu, K.3
  • 25
    • 29344443256 scopus 로고    scopus 로고
    • Efficient QoS provisioning for adaptive multimedia in mobile communication networks by reinforcement learning
    • Fei Y, Wong V, Leung V,. Efficient QoS provisioning for adaptive multimedia in mobile communication networks by reinforcement learning. Mobile Networks and Applications 2006; 11 (1): 101-110.
    • (2006) Mobile Networks and Applications , vol.11 , Issue.1 , pp. 101-110
    • Fei, Y.1    Wong, V.2    Leung, V.3
  • 26
    • 0035444067 scopus 로고    scopus 로고
    • A utility-based approach for quantitative adaptation in wireless packet networks
    • Liao RRF, Campbell AT,. A utility-based approach for quantitative adaptation in wireless packet networks. Wireless Networks 2001; 7 (5): 541-557.
    • (2001) Wireless Networks , vol.7 , Issue.5 , pp. 541-557
    • Liao, R.R.F.1    Campbell, A.T.2
  • 27
    • 1642364131 scopus 로고    scopus 로고
    • Available
    • Network Simulator 2, 2008. Available: http://www.isi.edu/nsnam/ns.
    • (2008) Network Simulator 2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.