|
1.Lichun Bao and J. J. Garcia-Luna-Aceves, “Collision-free topology-dependent channel access scheduling,” Proceedings of the IEEE 21st Century Military Communications Conference (MILCOM), pp. 507-511, 2000. 2.Shailesh M. Birari, “Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers”, Master thesis, Kanwal Rekhi School of Information Technology, 2005. 3.Wen-Tsuen Chen, Te-Wei Ho and Yen-Cheng Chen, “An MAC Protocol for Wireless Ad-hoc Networks Using Smart Antennas,” Proceedings of the 11th IEEE International Conference on Parallel and Distributed Systems (ICPADS'05), pp. 446 – 452, 2005. 4.Chris Diorio and HAG Co-Chair, “Class-1 Generation 2 UHF RFID,” www.autoid.org/sc31/2004/dec/SG3_200411_430_Gen2Update.pdf, Dec. 2004. 5.Daniel W. Engels and Sanjay E. Sarma, “The reader collision problem,” Proceedings of the 2002 IEEE International Conference on Systems, Man and Cybernetics, pp. 6, 2002. 6.Lain-Jinn Hwang, Shiann-Tsong Sheu, Yun-Yen Shih and Yen-Chieh Cheng, “Grouping strategy for solving hidden node problem in IEEE 802.15.4 LR-WPAN,” Wireless Internet, 2005. Proceedings. First International Conference on , vol., no.pp. 26- 32, 10-14 July 2005. 7.Junius Ho, Daniel W. Engels and Sanjay E. Sarma, “HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem,” Proceedings of the International Symposium on Applications and the Internet Workshops (SAINTW'06), pp. 88-91, 2006. 8.Nitin Jain, Samir R. Das and Asis Nasipuri, “A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks,” Proceedings of the 10th IEEE International Conference on Computer Communications and Networks, pp.432 – 439, 2001. 9.Joongheon Kim, Sunhyoung Kim, Dongshin Kim, Wonjun Lee and Eunkyo Kim, “Low-Energy Localized Clustering: An Adaptive Cluster Radius Configuration Scheme for Topology Control in Wireless Sensor Networks,” Proceedings of the IEEE Vehicular Technology Conference (VTC), pp. 2546-2550, 2005. 10.Jerzy Konorski, “Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack,” Proceedings of the 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOYS'05), pp. 491–498, 2005. 11.Wen-Kuang Kuo and C.-C. Jay Kuo, “Enhanced backoff scheme in CSMA/CA for IEEE 802.11,” Proceedings of the 58th IEEE Vehicular Technology Conference, pp. 2809 – 2813, 2003. 12.S. Sandoval-Reyes and J. L. Soberanes Perez, “Mobile RFID Reader with Database Wireless Synchronization,” Proceedings of the 2nd IEEE International Conference on Electrical and Electronics Engineering, pp. 5 – 8, 2005. 13.Joao Luıs Sobrinho, Roland de Haan and Jose Manuel Brazio, “Why RTS-CTS is not your ideal wireless LAN multiple access protocol,” Proceedings of the IEEE Wireless Communications and Networking Conference, pp. 81 - 87, 2005. 14.James Waldrop, Daniel W. Engels and Sanjay E. Sarma, “Colorwave: an anticollision algorithm for the reader collision problem,” Proceedings of the IEEE International Conference on Communications, pp. 1206 - 1210, 2003. 15.Xin Wang and Koushik Kar, “Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks,” Proceedings of the 24th Annual Joint Conference on IEEE Computer and Communications Societies (INFOCOM 2005), pp. 23 – 34, 2005. 16.Tiantong You, Hossam Hassanein and Chi-Hsiang Yeh, “PIDC - Towards an Ideal MAC Protocol for Multi-hop Wireless LANs,” Proceedings of the IEEE International Conference on Wireless Networks, Communications and Mobile Computing, pp. 655 – 660, 2005. 17.European Telecommunications Standards Institute, “ETSI EN 302 208-1 v1.1.1,” www.RFIDc.com/pdfs_downloads/ETSI%20Standard%202.pdf, 2004.
|