Login / Signup
Throughput analysis of IEEE 802.15.4 MAC protocol in the presence of hidden nodes.
Sumudu Wijetunge
Upul Gunawardana
Ranjith Liyanapathirana
Published in:
ISCIT (2011)
Keyphrases
</>
mac protocol
comprehensive analysis
medium access control
pattern classification
hidden nodes
neural network
energy consumption