Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing 2006
DOI: 10.1145/1146381.1146398
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial queuing on the multiple-access channel

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
72
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
5
4
1

Relationship

3
7

Authors

Journals

citations
Cited by 55 publications
(72 citation statements)
references
References 26 publications
0
72
0
Order By: Relevance
“…In general this depends on the protocol studied, on the size and topology of the network and on the maximum rate at which the adversary is allowed to inject packets into the network. We refer to [2][3][4][5][6][7][8][9][10][11][12][13] for some representative papers under this model. In the second model, a subset of the packets has to be dropped, due to some restriction.…”
Section: Related Workmentioning
confidence: 99%
“…In general this depends on the protocol studied, on the size and topology of the network and on the maximum rate at which the adversary is allowed to inject packets into the network. We refer to [2][3][4][5][6][7][8][9][10][11][12][13] for some representative papers under this model. In the second model, a subset of the packets has to be dropped, due to some restriction.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the theoretical work on the design of efficient MAC protocols has focused on random backoff protocols (e.g., [7,11,17,18,25,35]) that do not take jamming activity into account and therefore are not robust against it. MAC protocols have also been designed in the context of broadcasting (e.g., [12]) and clustering (e.g., [23]).…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, oblivious protocols in which the sequence of transmissions of a node is independent of the received messages have also been studied in [16,7,17]. There are also some other work focusing on dynamic packet arrivals, e.g., in a stochastic model [11], in adversarial queuing models [2,5,17], and message arrivals determined by an adversary [23].…”
Section: Related Workmentioning
confidence: 99%