2010 IEEE International Conference on Communications 2010
DOI: 10.1109/icc.2010.5502114
|View full text |Cite
|
Sign up to set email alerts
|

Throughput Analysis of Two-Hop Wireless CSMA Network Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
17
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 6 publications
0
17
0
Order By: Relevance
“…From Equation (24), we can easily obtain the mean value of i n 0 th user's channel h i n 0 , .q/ h .i n 0 /. Now, we can calculate the expectation in Equation (19).…”
Section: Expectation-maximization-based Joint Channel Estimation and mentioning
confidence: 99%
See 2 more Smart Citations
“…From Equation (24), we can easily obtain the mean value of i n 0 th user's channel h i n 0 , .q/ h .i n 0 /. Now, we can calculate the expectation in Equation (19).…”
Section: Expectation-maximization-based Joint Channel Estimation and mentioning
confidence: 99%
“…In parallel to the studies on the cooperative diversity, studies on multi-hop communication systems have been presented in [16][17][18][19][20][21]. These kinds of systems are based on relaying data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…While it is clear that network coding opportunities in a wireless network significantly depend on the configuration of network parameters [17], [28], [29], the existing studies on random access based wireless networks [16], [17] do not explicitly exploit the interaction between network parameters and network coding (i.e., do not formulate and solve a joint problem).…”
Section: Introductionmentioning
confidence: 99%
“…Recently, the throughput performance of a two-hop relay network (i.e., three-node network) with network coding is studied in [28], [29]. The authors demonstrate that network coding opportunities significantly depend on the configuration of MAC parameters, although these works are limited to a two-hop relay network.…”
Section: Introductionmentioning
confidence: 99%