2007
DOI: 10.1504/ijmndi.2007.017324
|View full text |Cite
|
Sign up to set email alerts
|

Self-similar simulation of IP traffic for wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Section 3.2 describes a theoretical method to synthesize self-similar discrete sequences using Haar wavelet-based decomposition. Although Daubechies wavelet-(DW-) based approximations are better in mean and variance, the Haar-based method generates a self-similar sequence of specified Hurst index from practically any given sequence, regardless of whether it is self-similar or not if some conditions are met [19]. For other applications, DW are preferred; see [20] as an example.…”
Section: Discrete Time Self-similaritymentioning
confidence: 99%
See 2 more Smart Citations
“…Section 3.2 describes a theoretical method to synthesize self-similar discrete sequences using Haar wavelet-based decomposition. Although Daubechies wavelet-(DW-) based approximations are better in mean and variance, the Haar-based method generates a self-similar sequence of specified Hurst index from practically any given sequence, regardless of whether it is self-similar or not if some conditions are met [19]. For other applications, DW are preferred; see [20] as an example.…”
Section: Discrete Time Self-similaritymentioning
confidence: 99%
“…Expressions (43) and (19) imply that the variance of the th component (̂, , ) (computed using formula (35)), which has also finite length, is…”
Section: Statistics Of the Orthogonal Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…Traffic. Since the seminal work of Leland et al [4], extensive studies have shown that self-similarity manifests in communications traffic in diverse contexts, from local area networks to wide area networks, from wired to wireless applications [5][6][7][8]. In this paper, we consider opportunistic spectrum access in self-similar primary traffic processes with long-range dependency.…”
Section: Opportunistic Spectrum Access In Self-similar Primarymentioning
confidence: 99%