References
- S.M. Oh and J.H. Kim, "The Analysis of the Optimal Contention Period for Broadband Wireless Access Network," Proceedings of Percom 2005 Workshop, pp.215-219, March 2005.
- S.M. Oh and J.H. Kim, "The Optimization of the Collision Resolution Algorithm for Broad band Wireless Access Network," ICACT 2006, pp.1944-1948, Feb. 2006.
- B.J. Kwak, N.O. Song and L.E. Miller, "Performance Analysis of Exponential Back off," IEEE/ACM Trans. On Networking, Vol.13, No.2, pp.343-355, April 2006.
- J. Je, K. Guild, K. Yang and H.H. Chen, "Modeling Contention Based Bandwidth Request Scheme for IEEE 802.16 Networks," IEEE Communication Letters, Vol.11, No.8, pp.698-700, August 2007.
- V.A. Kobliakiv, A.M. Turlikov and A.V. Vinel," Distributed Queue Random Multiple Access Algorithm for Centralized Data Networks," ISCE'06, pp.1-6, 2006.
- M.Molle, "Conflict-Resolution Algorithm," Encyclopedia of Telecommunications, Vol.4, Communications Human Factors to Cryptology, pp.381-398.
- K.H, kook and K.W. Lee, "A Study on the Efficient Link Establishment between MR-BS and RS," ETRI Technical Report, Jan. 2008.
- H. Vogt, "Efficient Object Identification with Passive RFID Tags," International Conference on Pervasive Computing, LNCS, Springer-Verlag, 2002.
- N.L. Johnson and S. Kotz, "Urn Models and Their Application," Wiley, 1977.
- V.F. Kolchin, B.A. Svast'yanov, and V.P. Christyakov, "Random Allocations," V.H. Winston & Sons, 1978.