Wireless 3-hop Networks with Stealing Revisited: A Kernel Approach
From MaRDI portal
Publication:6160402
DOI10.3138/INFOR.51.4.192OpenAlexW2047903689MaRDI QIDQ6160402FDOQ6160402
Hongshuai Dai, Yiqiang Q. Zhao
Publication date: 9 May 2023
Published in: INFOR: Information Systems and Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3138/infor.51.4.192
Recommendations
- Wireless three-hop networks with stealing. II: Exact solutions through boundary value problems
- Wireless multihop networks with stealing: large buffer asymptotics via the ray method
- Erratum to: ``Wireless three-hop networks with stealing. II: Exact solutions through boundary value problems
- The three-node wireless network: achievable rates and Cooperation strategies
- Wireless network design via 3-decompositions
- scientific article; zbMATH DE number 7042550
- Stability-throughput tradeoff and routing in multi-hop wireless ad hoc networks
- scientific article; zbMATH DE number 1717197
Cites Work
- Analytic combinatorics
- Title not available (Why is that?)
- Generating functions for generating trees
- Title not available (Why is that?)
- Wireless Multihop Networks with Stealing: Large Buffer Asymptotics via the Ray Method
- Asymptotic Methods in Enumeration
- Wireless three-hop networks with stealing. II: Exact solutions through boundary value problems
- First response to letter of G. Fayolle and R. Iasnogorodski
- Analysis of exact tail asymptotics for singular random walks in the quarter plane
- Tail asymptotics for a generalized two-demand queueing model -- a kernel method
- Letter to editors
Cited In (3)
This page was built for publication: Wireless 3-hop Networks with Stealing Revisited: A Kernel Approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6160402)