2004
DOI: 10.1016/j.peva.2004.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Robustness of Q-ary collision resolution algorithms in random access systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…RAP are inherently unstable, so stabilization procedures must be seriously considered before being used in practical implementations. The stabilization procedure for RAP is implemented by combining two types of protocols or algorithms, channel access algorithms (CAA) and contention resolution algorithms (CRA) [14]. According to [15], they can also be characterized as global and local strategies, respectively.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…RAP are inherently unstable, so stabilization procedures must be seriously considered before being used in practical implementations. The stabilization procedure for RAP is implemented by combining two types of protocols or algorithms, channel access algorithms (CAA) and contention resolution algorithms (CRA) [14]. According to [15], they can also be characterized as global and local strategies, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the proposed analytical models assume a perfect channel with no errors, negligible propagation delay, and no capture effect when a collision occurs. Also, an instantaneous ternary (E/S/C, E:empty, S:success, C:collision) or binary (C/No C, S/No S) feedback is quite often assumed [14]. With respect to the arrival process, for tractability, the standard approach is to assume a Poisson (Bernoulli) arrival process for infinite (finite) number of devices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Typical applications of tree-like processes include single server queues with a LIFO service discipline [36,27,14,13]. In [29,34,31] tree-like processes were used to analyze a set of well-known random access algorithms, called tree or splitting algorithms. Some recent work also indicates that tree-like processes can be used to study priority queues [32].…”
Section: Introductionmentioning
confidence: 99%
“…This class of arrival processes is known to lend itself very well to modeling bursty and correlated arrival processes commonly arising in computer and communication applications [4,16,20,31,25]. Recently, Van Houdt and Blondia [30] studied the impact of introducing D-BMAPs arrivals on the stability of CTMV type random access systems with blocked and grouped access. In [29] Van Houdt and Blondia demonstrated that the basic binary CTMV algorithm with free access (see Section 2 for a description) can be studied, using matrix analytical methods, by constructing a tree structured Markov chain of the Quasi-Birth-Death (QBD) type (see Section 4).…”
mentioning
confidence: 99%