2008 IEEE International Conference on Communications 2008
DOI: 10.1109/icc.2008.470
|View full text |Cite
|
Sign up to set email alerts
|

Vertical Handover Criteria and Algorithm in IEEE802.11 and 802.16 Hybrid Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
45
0
1

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(46 citation statements)
references
References 2 publications
0
45
0
1
Order By: Relevance
“…The authors in [10] proposed an interworking scheme between WiMAX and WLAN that takes advantage of the surplus WLAN capacity available in residential areas. Several papers discuss HO decision mechanisms to avoid performing unnecessary or unwise HOs [13], [14]. However, HO decision mechanisms are out of the scope of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [10] proposed an interworking scheme between WiMAX and WLAN that takes advantage of the surplus WLAN capacity available in residential areas. Several papers discuss HO decision mechanisms to avoid performing unnecessary or unwise HOs [13], [14]. However, HO decision mechanisms are out of the scope of this paper.…”
Section: Related Workmentioning
confidence: 99%
“…There are other works summary to improve handover decision making in heterogeneous system [10,22,9,30,6,29]. The proposed solutions for vertical handover decisions given in the previously indicated works, don't consider the interaction between a required context and a given class of service due to the dynamically change of application requirements in pervasive environment not forgotten the high level of complexity occupied by these proposed approaches.…”
Section: Related Workmentioning
confidence: 99%
“…In these solutions, user behaviors can be false, so the centralized manager can't maximize the utility function of the overall network [15].…”
Section: Related Workmentioning
confidence: 99%
“…In addition to the execution time and operating time, we must also know that the necessary time to exploit a channel (T. establishment) is 5s on average [14] [15].…”
Section: Comparison In Terms Of Efficiencymentioning
confidence: 99%