G. Anastasi, L. Lenzini, E. Mingozzi, A. Hettich, A. Kramling, MAC protocols for wideband wireless local access: Evolution toward wireless ATM, IEEE Personal Commun. Magazine, 1998,5(5), 53-64.[2]E. Ayanoglu, et al., Mobile information infrastructure, Bell Labs Technical Journal, Autumn 1996, 1(2), 143-164.[3]Li Jiandong, Li Weiying, Yang Jiawei, User-dependent Perfect-scheduling Multiple Access(UPMA) for wireless internet access, Future Telecommunications Forum, Beijing, Dec. 1999,59-63.[4]Li Jiandong, Li Weiying, Yang Jiawei, User-dependent Perfect-scheduling Multiple Access(UPMA) for wireless ad hoc Internet access, in Proc. WCC 2000/ICCT 2000, Beijing, China,Aug. 2000, 1714-1717.[5]李建东,多信道自组织分组无线电网的组网算法和实验系统,电子学报,1993,21(10),38-46.[6]M. Gerla, T. C. Tsai, Multicluster, mobile, multimedia radio network, ACM/Baltzer J. Wireless Networks, 1995, 1(3), 255-265.[7]V. Paxson, S. Floyd, Wide area traffic: The failure of Poisson modeling, in Proc. of ACM SIGCOMM 94, London, UK, Oct. 1994, 257-268.[8]Shuang Deng.[J].Empirical model of WWW document arrivals at access link, in Proc. IEEE ICC 96, Dallas, TX, USA, June.1797,1996:-[9]W. Leland, M. Taqqu, W. Willinger, On the self-similar nature of Ethernet traffic (Extended Version), IEEE/ACM Trans. Networking, 1994, 2(1), 1-15.
|