12.07.2015 Views

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

Wireless Ad Hoc and Sensor Networks

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index 499tree topology, 450, 452wireless ad hoc networks, DPC, 233, 235Jagannathan <strong>and</strong> Talluri studiesadaptive ARMAX method, 94–95admission, 161ATM network congestion control, 81end-to-end congestion controller design,109–110network modeling, 87traffic sources, 165VBR sources, 96weight initialization <strong>and</strong> onlinelearning, 90Jagannathan <strong>and</strong> Tohmaz studies, 81Jagannathan <strong>and</strong> Yesilderek, Lewis, studies,51–53, 57, 67Jagannathan studiesadapative scheme development, 221adaptive backoff interval selection,444, 446admission control, 161, 163admission controller design, 149ATM network congestion control, 81backoff interval selection, 442constrained second-order power control,183decentralized adapative power control,467–468distributed adaptive power control,237–238distributed power control, 178–179, 234,239DPC scheme development, 214dynamical systems, 57end-to-end congestion controller design,109energy-aware MAC protocol, 340error dynamics, SIR, 215excitation condition persistence, 175fading channels, 212hardware implementation, DPC, 283neural network model, 93neural networks <strong>and</strong> approximationproperty, 82nonlinear stability analysis <strong>and</strong> controlsdesign, 61prediction congestion control, 430stability, 83, 116uplink transmitter power control, 190weight updates <strong>and</strong> QoS, 119Jain studiesadmission controller design, 147, 149ATM network congestion control, 81end-to-end congestion controller design,109fair scheduling <strong>and</strong> quality of service, 304network modeling, 84, 94, 111, 150throughput/average delay, 376Jamin studies, 147–148Jantti <strong>and</strong> Kim studiesconstrained second-order power control,182–183, 190distribured adaptive power control, 237distributed power control, 178–179DPC scheme development, 215fading channels, 212Johari <strong>and</strong> Tan studies, 110Johnson studies, 359JOIN packets, 387Jung <strong>and</strong> Vaidya studiesdecentralized adaptive power control,468distributed power control, 234–235hidden-terminal problem, 244, 347power control MAC protocol, 243KKahn studies, 39Kaiser, Pottie <strong>and</strong>, studies, 39Kalkkuhl <strong>and</strong> Hunt studies, 50–51Kamerman <strong>and</strong> Monteban studies, 254–258,282K<strong>and</strong>ukuri, Bambos <strong>and</strong>, studies, 256Karn studies, 234–235Karthaus <strong>and</strong> Fischer studies, 462Kelly studies, 80, 109Kim, Jantti <strong>and</strong>, studiesconstrained second-order power control,182–183, 190distribured adaptive power control, 237distributed power control, 178–179DPC scheme development, 215fading channels, 212Knightly, Kuzmanovic <strong>and</strong>, studies, 110Kumar, Yee <strong>and</strong>, studies, 364Kumar studies, 32Kuo <strong>and</strong> Kuo studies, 431–432Kuzmanovic <strong>and</strong> Knightly studies, 110LLakshman studies, 81, 109, 112, 147, 165Lam, Sastry <strong>and</strong>, studies, 110–111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!