2015 International Conference on Distributed Computing in Sensor Systems 2015
DOI: 10.1109/dcoss.2015.8
|View full text |Cite
|
Sign up to set email alerts
|

PREED: Packet REcovery by Exploiting the Determinism in Industrial WSN Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…On the other hand, [173] derives experimental based models by using curve fitting techniques and validation through extensive experiments. An adaptive algorithm was also proposed to adjust the coefficients of these models by introducing a learning phase without any explicit information about data traffic, network topology, and Contention-based Access [212], [213], [175], [174], [214], [129], [84], [107], [215], [173], [125] [166], [202], [194], [195], [216], [196], [217] [204], [211], [206], [207], [208], [209], [210] Schedule-based Access [126], [127], [176], [177], [178] [4], [190], [203], [202], [192], [193] [81], [218], [205], [62], [83] Physical Layer Extension [6], [87], [183], [219], [220], [221] --Network Resource Schedule Scheduling Algorithm …”
Section: Requirements System Parameters Scenarios Evaluation Communicmentioning
confidence: 99%
See 4 more Smart Citations
“…On the other hand, [173] derives experimental based models by using curve fitting techniques and validation through extensive experiments. An adaptive algorithm was also proposed to adjust the coefficients of these models by introducing a learning phase without any explicit information about data traffic, network topology, and Contention-based Access [212], [213], [175], [174], [214], [129], [84], [107], [215], [173], [125] [166], [202], [194], [195], [216], [196], [217] [204], [211], [206], [207], [208], [209], [210] Schedule-based Access [126], [127], [176], [177], [178] [4], [190], [203], [202], [192], [193] [81], [218], [205], [62], [83] Physical Layer Extension [6], [87], [183], [219], [220], [221] --Network Resource Schedule Scheduling Algorithm …”
Section: Requirements System Parameters Scenarios Evaluation Communicmentioning
confidence: 99%
“…Model-based parameter optimization mainly use theoretical or experimental-based derivations of the probability distribu- [125] 1-hop the/sim [173] 1-hop the/exp [129] 1-hop the/exp [174] 1-hop the/sim [175] multihop the/sim [126] 1-hop the/sim/exp [127] 1-hop the/sim/exp [176] 1-hop the [177] 1-hop sim [178] 1-hop exp [86] multihop the/sim [179] multihop the/sim [180], [181] multihop the/sim [182] multihop the/sim/exp [183] multihop the/exp [184] 1-hop the/sim [185] multihop the/exp [186] 1-hop the/sim/exp [87] 1-hop the/sim [187] multihop the/sim/exp [188] multihop the/sim [141], [142] multihop the/sim [138] multihop the/sim [6] 1-hop the/sim [102] multihop the/sim [18] multihop the/exp [189] multihop the/sim/exp [4] 1-hop the/sim [190] 1-hop the/sim [66] multihop the/sim [191] multihop the/sim [192], [193] 1-hop the/sim/exp [194], [195], [196] 1-hop the/sim [63] multihop sim/exp [197] multihop sim [107] 1-hop the/sim/exp [198] multihop the/sim…”
Section: A Interactive Design Approachmentioning
confidence: 99%
See 3 more Smart Citations