Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch.
Loading Scinapse...
Published on Oct 1, 2007 in ACM Special Interest Group on Data Communication
Sachin Katti39
Estimated H-index: 39
(Massachusetts Institute of Technology),
Shyamnath Gollakota27
Estimated H-index: 27
(Massachusetts Institute of Technology),
Dina Katabi57
Estimated H-index: 57
(Massachusetts Institute of Technology)
Traditionally, interference is considered harmful. Wireless networks strive to avoid scheduling multiple transmissions at the same time in order to prevent interference. This paper adopts the opposite approach; it encourages strategically picked senders to interfere. Instead of forwarding packets, routers forward the interfering signals. The destination leverages network-level information to cancel the interference and recover the signal destined to it. The result is analog ...
1,078 Citations Source Cite
Published on Aug 11, 2006 in ACM Special Interest Group on Data Communication
Sachin Katti39
Estimated H-index: 39
(Massachusetts Institute of Technology),
Hariharan Rahul14
Estimated H-index: 14
(Massachusetts Institute of Technology)
+ 3 AuthorsJon Crowcroft73
Estimated H-index: 73
(University of Cambridge)
This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that intelligently mixing packets increases network throughput. Our design is rooted in the theory of network coding. Prior work on network coding is mainly theoretical and focuses on multicast traffic. This paper aims to bridge theory...
1,961 Citations Source Cite
Published on Sep 23, 2002 in ACM/IEEE International Conference on Mobile Computing and Networking
David Kotz59
Estimated H-index: 59
(Dartmouth College),
Kobby Essien8
Estimated H-index: 8
(Dartmouth College)
Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace of network activity in a large, production wireless LAN. For eleven weeks we traced the activity of nearly two thousand users drawn from a general campus popul...
418 Citations Source Cite
Published on Mar 1, 2015 in Wireless Communications and Networking Conference
Xu Li3
Estimated H-index: 3
(University of Science and Technology of China),
Dongning Guo32
Estimated H-index: 32
(Northwestern University)
+ 1 AuthorsGuo Wei12
Estimated H-index: 12
(University of Science and Technology of China)
A nationwide interoperable public safety wireless broadband network is being planned by the First Responder Network Authority (FirstNet) under the auspices of the United States government. The public safety network shall provide the needed wireless coverage in the wake of an incident or a disaster. This paper proposes a drone-assisted multi-hop device-to-device (D2D) communication scheme as a means to extend the network coverage over regions where it is ...
22 Citations Source Cite
Published on May 1, 2017 in International Conference on Communications
Piotr Gawłowicz3
Estimated H-index: 3
(Technical University of Berlin),
Anatolij Zubow11
Estimated H-index: 11
(Technical University of Berlin)
+ 1 AuthorsAdam Wolisz44
Estimated H-index: 44
(Technical University of Berlin)
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless devices co-existing in the same radio spectrum. They demand harmonized, frequently even coordinated adaptation of multiple parameters in different protocol layers (cross-...
4 Citations Source Cite
Published on Apr 1, 2015 in International Conference on Computer Communications
Peng-Jun Wan44
Estimated H-index: 44
(Illinois Institute of Technology),
Fahad Al-dhelaan2
Estimated H-index: 2
(Illinois Institute of Technology)
+ 2 AuthorsGuowen Xing (Nanjing University of Information Science and Technology)
Multi-packet reception (MPR) technology provides a means of boosting wireless network capacity without requiring additional spectrum. It has received widespread attention over the past two decades from both industry and academic researchers. Despite the huge promise and considerable attention, provable good algorithms for maximizing network capacity in MPR-capable wireless networks are missing in the state of the art. One major technical obstacle is due to the ...
Source Cite
Published on Aug 1, 2000 in ACM/IEEE International Conference on Mobile Computing and Networking
Diane Tang16
Estimated H-index: 16
(Stanford University),
Mary Baker25
Estimated H-index: 25
(Stanford University)
To understand better how users take advantage of wireless networks, we examine a twelve-week trace of a building-wide local-area wireless network. We analyze the network for overall user behavior (when and how intensively people use the network and how much they move around), overall network traffic and load characteristics (observed throughput and symmetry of incoming and outgoing traffic), and traffic characteristics from a user point of view (o...
350 Citations Source Cite
Published on May 1, 2017 in International Conference on Computer Communications
Wenzhong Li15
Estimated H-index: 15
(Nanjing University),
Jinggong Zhang (Nanjing University), Yanchao Zhao3
Estimated H-index: 3
(Nanjing University of Aeronautics and Astronautics)
With the dense deployment of wireless infrastructure such as radio towers and WiFi access points, wireless network optimization becomes very important for improving the network capacity and enhancing the communication quality of wireless links. Most optimization algorithms rely on the conflict graph to describe the interference situation. However, building a conflict graph requires exhaustive measurements of the whole network and the existing estimation ...
Source Cite
Published on Dec 1, 1995 in ACM/IEEE International Conference on Mobile Computing and Networking
Joel E. Short10
Estimated H-index: 10
(University of California, Los Angeles),
Rajive L. Bagrodia36
Estimated H-index: 36
(University of California, Los Angeles),
Leonard Kleinrock70
Estimated H-index: 70
(University of California, Los Angeles)
This paper describes an advanced simulation environment which is used to examine, validate, and predict the performance of mobile wireless network systems. This simulation environment overcomes many of the limitations found with analytical models, experimentation, and other commercial network simulators available on the market today. We identify a set of components which make up mobile wireless systems and describe a set of flexible modules which can be used to model ...
65 Citations Source Cite
Published on Sep 9, 2007 in ACM/IEEE International Conference on Mobile Computing and Networking
Qunfeng Dong11
Estimated H-index: 11
(University of Wisconsin-Madison),
Jianming Wu1
Estimated H-index: 1
(University of Wisconsin-Madison)
+ 1 AuthorsJon Crowcroft73
Estimated H-index: 73
(University of Cambridge)
Network coding is seen as a promising technique to improve network throughput. In this paper, we study two important problems in localized network coding in wireless networks, which only requires each node to know about and coordinate with one-hop neighbors. In particular, we first establish a condition that is both necessary and sufficient for useful coding to be possible. We show this condition is much weaker than expected, and hence allows a variety of codin...
61 Citations Source Cite