2007
DOI: 10.1109/twc.2007.04793
|View full text |Cite
|
Sign up to set email alerts
|

The Guard Zone in Wireless Ad hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
237
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 266 publications
(240 citation statements)
references
References 34 publications
3
237
0
Order By: Relevance
“…In this way, the problem of storage limitation can be solved as well [6]. Typically there are three types of mobile cloud architectures, namely the traditional centralized cloud [7], the recently emerged cloudlet [8] and the peer-based ad hoc mobile cloud [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this way, the problem of storage limitation can be solved as well [6]. Typically there are three types of mobile cloud architectures, namely the traditional centralized cloud [7], the recently emerged cloudlet [8] and the peer-based ad hoc mobile cloud [9].…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, with the increasing processing capacity of modern UEs, peerassisted computing is also an emerging topic that attracts growing attention in the research community. This paradigm regards users in vicinity as an ad hoc mobile cloud [9], where neighboring UEs are able to utilize and share resources in a cooperative manner. Such a mechanism provides an advantage of having less ofoad latency and bandwidth consumption as compared to traditional cloud computing, since mobile devices could communicate with each other via device-to-device (D2D) connections.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [34] characterized the interference distribution in Poisson networks, both in the absence and in the presence of fading. In [35], the CSMA protocol was modeled by excluding interference from a guard zone around the typical receiver in a Poisson model. The authors in [36] provided a Taylor-series type expansion of functions to approximate the interference and illustrated that the approach could be used to find outage probability in both Poisson and non-Poisson wireless networks.…”
Section: Mean Probability Of Successful Reception and Transmission Camentioning
confidence: 99%
“…The idea is similar to allocating resources to the best link in multi-user networks to retrieve multi-user diversity gain. Another improvement introduces the concept of a guard zone [73] to prohibit the presence of simultaneous interfering transmissions in proximity. The resulting active small cells can be modeled by a hard-core point process [62], where each point of the process is the center of a disc that contains no other points except itself.…”
Section: Random Accessmentioning
confidence: 99%