2009 IEEE Wireless Communications and Networking Conference 2009
DOI: 10.1109/wcnc.2009.4917590
|View full text |Cite
|
Sign up to set email alerts
|

An Optimization Framework for Heterogeneous Access Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…According to many researchers such as [3] and [5], RATs can be largely characterized into two categories based on means to share their channels: interference constrained RATs and orthogonal RATs. In this paper, we focuse on interference constrained RATs.…”
Section: B Wireless Network Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…According to many researchers such as [3] and [5], RATs can be largely characterized into two categories based on means to share their channels: interference constrained RATs and orthogonal RATs. In this paper, we focuse on interference constrained RATs.…”
Section: B Wireless Network Modelmentioning
confidence: 99%
“…For simplicity, interface constrained RATs such UMTS are only considered. Unless specified, network parameters are given form [5]. Figure 4 compares the execution time between the mobile and the cloud by applying to three different vehicular sensing applications: A1-A3, while Figure 5 compares energy consumption in the same settings.…”
Section: B Location-aware Publish-subscribe Servicementioning
confidence: 99%
“…According to many researchers such as [12] and [11], RATs can be largely characterized into two categories based on means to share their channels: interference constrained RATs and orthogonal RATs [12].. In this paper, we only consider the latter.…”
Section: Wireless Network Modelmentioning
confidence: 99%
“…For simplicity, orthogonal-based WLAN and TDMA-based GSM are only considered. Unless specified, the network selection follows a strategy given in Equation 6 and network parameters form [11]. We assume that each BS knows its accurate geographic coordinate and thus can dynamically change their associated BS without any errors (e.g., no bouncing at the boundary).…”
Section: Evaluating Cloud Serversmentioning
confidence: 99%