|
[1] SNS Telecom & IT, “The wearable technology ecosystem: 2018 - 2030 - opportunities, challenges, strategies, industry verticals and forecasts,” Research and Markets, Apr. 2018. [2] “ISO/IEC/IEEE international standard - information technology – telecommunications and information exchange between systems – local and metropolitan area networks – specific requirements – part 15-6:Wireless body area network,” ISO/IEC/IEEE 8802-15-6:2017(E), pp. 1–274, Mar. 2018. [3] K. Prabh, F. Royo, S. Tennina, and T. Olivares, “BANMAC: An opportunistic MAC protocol for reliable communications in body area networks,” in Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2012. [4] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), 2002. [5] S. Galzarano, A. Liotta, and G. Fortino, “QL-MAC: A Q-learning based MAC for wireless sensor networks,” in Proceedings of International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), Springer International Publishing, 2013, pp. 267–275. [6] O. Omeni, A. C.W.Wong, A. J. Burdett, and C. Toumazou, “Energy efficient medium access protocol for wireless medical body area sensor networks,” IEEE Transactions on Biomedical Circuits and Systems, vol. 2, no. 4, pp. 251–259, Dec. 2008. [7] S. Marinkovic, E. Popovici, C. Spagnol, S. Faul, and W. Marnane, “Energy-efficient low duty cycle MAC protocol for wireless body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 6, pp. 915–925, 2009. [8] M. Ameen, J. Liu, S. Ullah, and K.-S. Kwak, “A power efficient MAC protocol for implant device communication in wireless body area networks,” in Proceedings of IEEE Consumer Communications and Networking Conference (CCNC), 2011. [9] B. Liu, Z. Yan, and C. W. Chen, “Medium access control for wireless body area networks with QoS provisioning and energy efficient design,” IEEE Transactions on Mobile Computing, vol. 16, no. 2, pp. 422–434, Feb. 2017. [10] G. Smart, N. Deligiannis, R. Surace, V. Loscri, G. Fortino, and Y. Andreopoulos, “Decentralized time-synchronized channel swapping for ad hoc wireless networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8538–8553, 2016. [11] M. Shu, D. Yuan, C. Zhang, Y. Wang, and C. Chen, “A MAC protocol for medical monitoring applications of wireless body area networks,” Sensors, vol. 15, no. 6, p. 12 906, 2015. [Online]. Available: http://www.mdpi.com/1424-8220/15/6/12906. [12] B. Liu, Z. Yan, and C. W. Chen, “MAC protocol in wireless body area networks for E-health: Challenges and a context-aware design,” IEEE Wireless Communications, vol. 20, no. 4, pp. 64–72, 2013. [13] G. T. Chen,W. T. Chen, and S. H. Shen, “2L-MAC: A MAC protocol with two-layer interference mitigation in wireless body area networks for medical applications,” in Proceedings of IEEE International Conference on Communications (ICC), 2014. [14] A. Schulman et al., “Bartendr: A practical approach to energy-aware cellular data scheduling,” in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), 2010. [15] Z. O. et al., “Utilize signal traces from others? A crowdsourcing perspective of energy saving in cellular data communication,” IEEE Transactions on Mobile Computing, vol. 14, no. 1, pp. 194–207, 2015. [16] R. T. Morris, J. C. Bicket, and J. C. Bicket, “Bit-rate selection in wireless networks,” Master’s thesis, MIT, Tech. Rep., 2005. [17] S. H. Y. Wong, H. Yang, S. Lu, and V. Bharghavan, “Robust rate adaptation for 802.11 wireless networks,” in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), 2006. [18] D. Halperin,W. Hu, A. Sheth, and D.Wetherall, “Predictable 802.11 packet delivery from wireless channel measurements,” in Proceedings of ACM International Conference of the Special Interest Group on Data Communication (SIGCOMM), 2010. [19] H. Rahul, F. Edalat, D. Katabi, and C. Sodini, “Frequency-aware rate adaptation and MAC protocols,” in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), 2009. [20] K. C.-J. Lin, N. Kushman, and D. Katabi, “Ziptx: Harnessing partial packets in 802.11 networks,” in Proceedings of ACM International Conference on Mobile Computing and Networking (MobiCom), 2008. [21] M. Vutukuru, H. Balakrishnan, and K. Jamieson, “Cross-layer wireless bit rate adaptation,” in Proceedings of ACM International Conference of the Special Interest Group on Data Communication (SIGCOMM), 2009. [22] S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith, and A. Jamalipour, “Wireless body area networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1658–1686, 2014. [23] S. Movassaghi, M. Abolhasan, and D. Smith, “Smart spectrum allocation for interference mitigation in wireless body area networks,” in Proceedings of IEEE International Conference on Communications (ICC), 2014. [24] S. Movassaghi, M. Abolhasan, D. Smith, and A. Jamalipour, “Aim: Adaptive internetwork interference mitigation amongst co-existing wireless body area networks,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), 2014. [25] S. Movassaghi, M. Abolhasan, and D. Smith, “Cooperative scheduling with graph coloring for interference mitigation in wireless body area networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), 2014. [26] S. Movassaghi et al., “Exploiting unknown dynamics in communications amongst coexisting wireless body area networks,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), 2015. [27] S. Movassaghi, A. Majidi, A. Jamalipour, D. Smith, and M. Abolhasan, “Enabling interference-aware and energy-efficient coexistence of multiple wireless body area networks with unknown dynamics,” IEEE Access, vol. 4, pp. 2935–2951, 2016. [28] M. N. Anjum and H.Wang, “Optimal resource allocation for deeply overlapped selfcoexisting WBANs,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), 2016. [29] M. Li, J. Liu, Z. Ma, C. Yuan, and B. Yuan, “Throughput optimization with fairness consideration for coexisting WBANs,” in Proceedings of IEEE International Conference on Communications (ICC), IEEE, 2015. [30] S. H. Cheng and C. Y. Huang, “Coloring-based inter-WBAN scheduling for mobile wireless body area networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 2, pp. 250–259, 2013. [31] L. Zou, B. Liu, C. Chen, and C. W. Chen, “Bayesian game based power control scheme for inter-WBAN interference mitigation,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), 2014. [32] X. Zhao, B. Liu, C. Chen, and C. W. Chen, “QoS-driven power control for inter-WBAN interference mitigation,” in Proceedings of IEEE Global Communications Conference (GLOBECOM), 2015. [33] Y. Yang and D. B. Smith, “Wireless body area networks: Energy-efficient, provably socially-efficient, transmit power control,” in Proceedings of IEEE International Conference on Communications (ICC), 2017. [34] J. Shao, “A CSMA/CA based MAC layer solution for inter-WBAN interference and starvation,” Master’s thesis, University of Waterloo, Canada, 2015. [Online]. Available: http://hdl.handle.net/10012/9555. [35] B. Yuan, J. Liu, W. Liu, and S. Zheng, “DIM: A novel decentralized interference mitigation scheme in WBAN,” in Proceedings of IEEE International Conference on Wireless Communications Signal Processing (WCSP), 2015, pp. 1–5. [36] S. Kim, S. Kim, J.-W. Kim, and D.-S. Eom, “Flexible beacon scheduling scheme for interference mitigation in body sensor networks,” in Proceedings of IEEE International Conference on Sensing, Communication and Networking (SECON), 2012. [37] W. Huang and T. Q. S. Quek, “Adaptive CSMA/CA MAC protocol to reduce inter-WBAN interference for wireless body area networks,” in Proceedings of IEEE International Conference on Wearable and Implantable Body Sensor Networks (BSN), 2015. [38] W. Sun, Y. Ge, and W.-C. Wong, “A lightweight distributed scheme for mitigating inter-user interference in body sensor networks,” Computer Networks, vol. 57, no. 18, pp. 3885–3896, 2013. [39] P. R. Grassi, V. Rana, I. Beretta, and D. Sciuto, “B2IRS: A technique to reduce BAN-BAN interferences in wireless sensor networks,” in Proceedings of IEEE International Conference on Wearable and Implantable Body Sensor Networks (BSN), 2012. [40] C. Li, B. Zhang, X. Yuan, S. Ullah, and A. V. Vasilakos, “MC-MAC: A multi-channel based MAC scheme for interference mitigation in wbans,” Wireless Networks, pp. 1–15, 2016. [41] S. Liang, Y. Ge, S. Jiang, and H. P. Tan, “A lightweight and robust interference mitigation scheme for wireless body sensor networks in realistic environments,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), 2014. [42] B. Cao, Y. Ge, C. W. Kim, G. Feng, H. P. Tan, and Y. Li, “An experimental study for inter-user interference mitigation in wireless body sensor networks,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3585–3595, 2013. [43] S. Andreev, A. Pyattaev, K. Johnsson, O. Galinina, and Y. Koucheryavy, “Cellular traffic offloading onto network-assisted device-to-device connections,” IEEE Communications Magazine, vol. 52, no. 4, pp. 20–31, Apr. 2014. [44] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, “Device-to-device communications underlaying cellular networks,” IEEE Transactions on Communications, vol. 61, no. 8, pp. 3541–3551, Aug. 2013. [45] Z. S. Syu and C. H. Lee, “Spatial constraints of device-to-device communications,” in Proceedings of IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 2013, pp. 94–98. [46] X. Lin, J. G. Andrews, and A. Ghosh, “Spectrum sharing for device-to-device communication in cellular networks,” IEEE Transactions on Wireless Communications, vol. 13, no. 12, pp. 6727–6740, Dec. 2014. [47] T. Bansal, K. Sundaresan, S. Rangarajan, and P. Sinha, “R2D2: Embracing device-to-device communication in next generation cellular networks,” in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), 2014, pp. 1563–1571. [48] Z. Shen, A. Papasakellariou, J. Montojo, D. Gerstenberger, and F. Xu, “Overview of 3GPP LTE-Advanced carrier aggregation for 4G wireless communications,” IEEE Communications Magazine, vol. 50, no. 2, pp. 122–130, Feb. 2012. [49] S. Wang and J. S. Thompson, “Signal processing implementation of virtual carrier for supporting M2M systems based on LTE,” in Proceedings of IEEE Vehicular Technology Conference (VTC-Spring), May 2015, pp. 1–5. [50] D. Korpi, J. Tamminen, M. Turunen, T. Huusari, Y. S. Choi, L. Anttila, S. Talwar, and M. Valkama, “Full-duplex mobile device: Pushing the limits,” IEEE Communications Magazine, vol. 54, no. 9, pp. 80–87, Sep. 2016. [51] Y.-W. P. Hong, W.-J. Huang, and C.-C. J. Kuo, Cooperative communications and networking: Technologies and system design. Springer Science & Business Media, 2010. [52] B. Talha and M. Pätzold, “Channel models for mobile-to-mobile cooperative communication systems: A state of the art review,” IEEE Vehicular Technology Magazine, vol. 6, no. 2, pp. 33–43, Jun. 2011. [53] Z. Yi and I. M. Kim, “Diversity order analysis of the decode-and-forward cooperative networks with relay selection,” IEEE Transactions onWireless Communications, vol. 7, no. 5, pp. 1792–1799, May 2008. [54] S. Narayanan, M. D. Renzo, F. Graziosi, and H. Haas, “Distributed spatial modulation: A cooperative diversity protocol for half-duplex relay-aided wireless networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 2947–2964, May 2016. [55] R. Mesleh, S. S. Ikki, E.-H. M. Aggoune, and A. Mansour, “Performance analysis of space shift keying (SSK) modulation with multiple cooperative relays,” EURASIP Journal on Advances in Signal Processing, vol. 2012, no. 1, p. 201, 2012. [56] F. Xia and A. Rahim, MAC Protocols for Cyber-Physical Systems. Springer Publishing Company, Incorporated, 2015. [57] B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,” Communications of the ACM, vol. 13, no. 7, pp. 422–426, 1970. [58] F. Daneshgaran, M. Laddomada, F. Mesiti, and M. Mondin, “Unsaturated throughput analysis of IEEE 802.11 in presence of non ideal transmission channel and capture effects,” IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp. 1276–1286, 2008. [59] D. Malone, K. Duffy, and D. Leith, “Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions,” IEEE/ACM Transactions on Networking, vol. 15, no. 1, pp. 159–172, 2007. [60] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535–547, 2000. [61] S. J. Swamidass and P. Baldi, “Mathematical correction for fingerprint similarity measures to improve chemical retrieval,” Journal of chemical information and modeling, 2007. [62] TI CC2640 SimpleLinkTM Bluetooth R wireless MCU datasheet (Rev. B), 2016. [Online]. Available: https://goo.gl/FzyVCA. [63] R. Jain, D.-M. Chiu, and W. R. Hawe, A quantitative measure of fairness and discrimination for resource allocation in shared computer system. Eastern Research Laboratory, Digital Equipment Corporation Hudson, MA, 1984. [64] M. Shu, D. Yuan, C. Zhang, Y. Wang, and C. Chen, “A MAC protocol for medical monitoring applications of wireless body area networks,” Sensors, vol. 15, no. 6, pp. 12 906–12 931, 2015. [65] D. B. Smith and L.W. Hanlen, “Channel modeling for wireless body area networks,” in Ultra-Low-Power Short-Range Radios. Springer International Publishing, 2015, pp. 25–55. [Online]. Available: https://doi.org/10.1007/978-3-319-14714-7_2. [66] S. L. Cotton andW. G. Scanlon, “An experimental investigation into the influence of user state and environment on fading characteristics in wireless body area networks at 2.45 GHz,” IEEE Transactions on Wireless Communications, vol. 8, no. 1, pp. 6–12, 2009. [67] Q. Wang, M. Hempstead, and W. Yang, “A realistic power consumption model for wireless sensor network devices,” in Proceedings of IEEE International Conference on Sensing, Communication and Networking (SECON), 2006. [68] J. Vazifehdan, R. V. Prasad, M. Jacobsson, and I. Niemegeers, “An analytical energy consumption model for packet transfer over wireless links,” IEEE Communications Letters, vol. 16, no. 1, pp. 30–33, 2012. [69] C. Bisdikian, J. Lew, and A. Tantawi, “The generalized D[X]/D/1 queue: A flexible computer communications model,” Telecommunication Systems, vol. 6, no. 1, pp. 127–146, 1996, ISSN: 1018-4864. [Online]. Available: http://dx.doi.org/10.1007/BF02114290. [70] “CC2540 2.4 GHz Bluetooth low energy system-on-chip,” Product specification, Texas Instruments, p. 38, 2011. [71] L. Liu, R. D’Erico, L. Ouvery, L. Ouvry, and C. Oestges, “Dynamic channel modeling at 2.4 GHz for on-body area networks,” Advances in Electronics and Telecommunications, vol. 2, no. 4, 2011. [72] R. Fu, Y. Ye, N. Yang, and K. Pahlavan, “Doppler spread analysis of human motions for body area network applications,” in Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2011. [73] R. S. Sinha, Y. Wei, and S.-H. Hwang, “A survey on LPWA technology: Lora and nb-iot,” ICT Express, vol. 3, no. 1, pp. 14–21, 2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S2405959517300061. [74] S. Jung and J. Kim, “A new way of extending network coverage: Relay-assisted D2D communications in 3GPP,” ICT Express, vol. 2, no. 3, pp. 117–121, 2016, Special Issue on ICT Convergence in the Internet of Things (IoT). [Online]. Available: http://www.sciencedirect.com/science/article/pii/S240595951630073X. [75] L. Wei, R. Q. Hu, Y. Qian, and G. Wu, “Enable device-to-device communications underlaying cellular networks: Challenges and research aspects,” IEEE Communications Magazine, vol. 52, no. 6, pp. 90–96, Jun. 2014. [76] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 3rd. The MIT Press, 2009, ISBN: 9780262033848. [77] P. M. Pardalos and G. Schnitger, “Checking local optimality in constrained quadratic programming is NP-hard,” Operations Research Letters, vol. 7, pp. 33–35, Nov. 1978. [78] K. G. Murty and S. N. Kabadi, “Some NP-Complete problems in quadratic and nonlinear programming,” Mathematical programming, vol. 39, no. 1, pp. 117–129, Mar. 1987. [79] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, “An analysis of approximations for maximizing submodular set functions—I,” Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978. [80] M. L. Fisher, G. L. Nemhauser, and L. A.Wolsey, An analysis of approximations for maximizing submodular set functions—II, M. L. Balinski and A. J. Hoffman, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 1978, pp. 73–87. [81] H. S. Liao, P. Y. Chen, and W. T. Chen, “An efficient downlink radio resource allocation with carrier aggregation in LTE-Advanced networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 10, pp. 2229–2239, Oct. 2014. [82] M. Condoluci, L. Militano, A. Orsino, J. Alonso-Zarate, and G. Araniti, “LTE-direct vs.WiFi-direct for machine-type communications over LTE-A systems,” in Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2015, pp. 2298–2302. [83] Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall Description; Stage 2 (Release 12). Dec. 2014.
|