參考文獻 |
Mechanism for Power Saving in random-access Ad-Hoc Wireless Local Area
Networks,” in Proceedings of Mobile Multimedia Communications 1999, (San
Diego, CA, USA), pp. 114–123, Nov. 1999.
[2] R. Bruno, M. Conti, and E. Gregori, “Optimization of E ciency and Energy
Consumption in p-Persistent CSMA-Based Wireless LANs,” IEEE Transactions
on Mobile Computing, vol. 1, pp. 10–31, Jan.-Mar. 2002.
[3] E.-S. Jung and N. H. Vaidya, “An Energy E cient MAC Protocol for Wireless
LANs,” in Proceedings of INFOCOM 2002, (New York, NY, USA), pp. 1756–
1764, Jun. 2002.
[4] Y.-C. Tseng, C.-S. Hsu, and T.-Y. Hsieh, “Power-Saving Protocols for IEEE
802.11-Based Multi-Hop Ad Hoc Networks,” in Proceedings of INFOCOM 2002,
(New York, NY, USA), pp. 200–209, Jun. 2002.
[5] S.-L. Wu, Y.-C. Tseng, and J.-P. Sheu, “Intellegent Medium Access for Mobile
Ad Hoc Networks with Busy Tones and Power Control,” IEEE Journal on
Selected Areas in Communications, vol. 18, pp. 1647–1657, Sep. 2000.
[6] J. C. Cano and P. Manzoni, “Reducing Energy Consumption in a Clustered
MANET using the Intra Cluster Data-Dissemination Protocol (Icdp),” in Pro-
ceedings of the 10th. Euromicro Workshop on Parallel, Distributed and Networkbased
Processing, (Canary Islands, Spain), pp. 411–418, Jan. 2002.
[7] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: An Energy-
E cient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless
Networks,” in Proceedings of MOBICOM 2001, (Rome, Italy), pp. 85–96, Jul.
2001.
[8] Y. Xu, J. Heidemann, and D. Estrin, “Geography-informed Energy Conservation
for Ad Hoc Routing,” in Proceedings of MOBICOM 2001, (Rome, Italy),
pp. 70–84, Jul. 2001.
[9] S. Agrawal and S. Singh, “An Experimental Study of TCP’s Energy Consumption
over A Wireless Link,” in Proceedings of the 4th. European Personal Mobile
Communications Conference, (Vienna, Austria), Feb. 2001.
[10] M. Zorzi and R. R. Rao, “Is TCP Energy E cient?,” in Proceedings of Mobile
Multimedia Communications 1999, (San Diego, CA, USA), pp. 198–201, Nov.
1999.
[11] A. Kamerman and L. Monteban, “WaveLanII: A High-Performance Wireless
LAN for The Unilicensed Band,” Bell Labs Technical Journal, vol. 2, Summer
1997.
[12] IEEE 802.11 Standard (IEEE Computer Society LAN MAN Standards Committee),
Wireless LAN Medium Access Control and Physical Layer Specifications,
Aug. 1999.
[13] W. Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and 2. Third Edition,
pp. 33–34. Addison-Wesley, 1999.
[14] H. Garcia-Monina and D. Barbara, “How to Assign Votes in a Distributed
Systems,” Journal of the ACM, vol. 32, pp. 841–860, Oct. 1985.
[15] G. Ricart and A. K. Agrawala, “An Optimal Algorithm for Mutual Exclusion
in Computer Networks,” Communications of the ACM, vol. 24, pp. 9–17, Jan.
1981.
[16] M. Singhal and N. G. Shivaratri, Advanced Concepts in Operating Systems,
p. 345. McGraw-Hill, 1994.
[17] R. H. Thomas, “A Majority Consensus Approach to Concurrency Control,”
ACM Transaction on Database Systems, vol. 4, pp. 180–290, Jun. 1979.
[18] D. Agrawal and A. E. Abbadi, “An E cient and Fault-Tolerant Solution for Distributed
Mutual Exclusion,” ACM Transaction on Computer Systems, vol. 9,
pp. 1–20, Feb. 1991.
[19] S.-Y. Cheung, M. H. Ammar, and M. Ahamad, “The Grid Protocol: A High
Performance Scheme for Maintaining Replicated Data,” IEEE Transaction on
Knowledge and Data Engineering, vol. 4, pp. 582–592, Dec. 1992.
[20] M. Maekawa, “A pN Algorithm for Mutual Exclusion in Decentralized Systems,”
ACM Transaction on Computer Systems, vol. 3, pp. 145–159, May 1985.
[21] H. Chen and J. Tang, “An E cient Method for Mutual Exclusion in Truly
Distributed Systems,” in Proceedings of the 14th. International Conference on
Distributed Computing Systems, (Pozman, Poland), pp. 97–104, Jun. 1994.
[22] A. Kumar, “Hierarchical Quorum Consensus: A New Algorithm for Managing
Replicated Data,” IEEE Transaction on Computers, vol. 40, pp. 996–1004, Sep.
1991.
[23] Y.-C. Kuo and S.-T. Huang, “A Geometric Approach for Constructing Coteries
and k-Coteries,” IEEE Transaction on Parallel and Distributed Systems, vol. 8,
pp. 402–411, Apr. 1997.
[24] S. Lang and L. Mao, “A Comparison of Two Torus-Based K-Coteries,” in Proceedings
of the International Conference on Parallel and Distributed Systems,
(Tainan, Taiwan), pp. 300–306, Dec. 1998.
[25] W.-S. Luk and T.-T. Wong, “Two New Quorum Based Algorithms for Distributed
Mutual Exclusion,” in Proceedings of the 17th. International Conference
on Distributed Computing Systems, (Baltimore, MD, USA), pp. 95–99,
May 1997.
[26] Y.-T. Wu, Y.-J. Chang, S.-M. Yuan, and H.-K. Chang, “A New Quorum-Based
Replica Control Protocol,” in Proceedings of Pacific Rim International Symposium
on Fault-Torelant Systems, (Taipei, Taiwan), pp. 116–121, Dec. 1997.
[27] The Network Simulator - ns-2. http://www.isi.edu/nsnam/ns/.
[28] The CMU Monarch Project’s Wireless and Mobility Extensions to ns.
http://www.monarch.cs.cmu.edu/, Aug. 1998. |