{"id":"https://openalex.org/W2015362773","doi":"https://doi.org/10.1109/secon.2012.6275803","title":"Elimination of exposed terminal problem using signature detection","display_name":"Elimination of exposed terminal problem using signature detection","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2015362773","doi":"https://doi.org/10.1109/secon.2012.6275803","mag":"2015362773"},"language":"en","primary_location":{"id":"doi:10.1109/secon.2012.6275803","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secon.2012.6275803","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032605093","display_name":"Junmei Yao","orcid":"https://orcid.org/0000-0002-8979-0007"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Junmei Yao","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong, China","Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036357996","display_name":"Tao Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Tao Xiong","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong, China","Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087959421","display_name":"Wei Lou","orcid":"https://orcid.org/0000-0002-9784-5741"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wei Lou","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong, China","Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032605093"],"corresponding_institution_ids":["https://openalex.org/I14243506"],"apc_list":null,"apc_paid":null,"fwci":2.1276,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.87504974,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"398","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8230335712432861},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8047853708267212},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.665669322013855},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.6518352627754211},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.5979646444320679},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5664659142494202},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5661543607711792},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5531038641929626},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4668138027191162},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.4469446837902069},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.43541499972343445},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41771355271339417},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34109923243522644},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3215686082839966},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.16268157958984375},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10099688172340393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10087767243385315}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8230335712432861},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8047853708267212},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.665669322013855},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.6518352627754211},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.5979646444320679},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5664659142494202},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5661543607711792},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5531038641929626},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4668138027191162},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.4469446837902069},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.43541499972343445},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41771355271339417},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34109923243522644},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3215686082839966},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.16268157958984375},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10099688172340393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10087767243385315},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/secon.2012.6275803","is_oa":false,"landing_page_url":"https://doi.org/10.1109/secon.2012.6275803","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)","raw_type":"proceedings-article"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/38111","is_oa":false,"landing_page_url":"http://hdl.handle.net/10397/38111","pdf_url":null,"source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1517466511","https://openalex.org/W1541597266","https://openalex.org/W1997834106","https://openalex.org/W2099057525","https://openalex.org/W2103331800","https://openalex.org/W2106029702","https://openalex.org/W2119990492","https://openalex.org/W2127773132","https://openalex.org/W2129474233","https://openalex.org/W2129807739","https://openalex.org/W2136455335","https://openalex.org/W2139914328","https://openalex.org/W2148099880","https://openalex.org/W2149863032","https://openalex.org/W2155416924","https://openalex.org/W2157936671","https://openalex.org/W2354005007","https://openalex.org/W2409433878","https://openalex.org/W4214605592","https://openalex.org/W4230506308","https://openalex.org/W4240536681","https://openalex.org/W6630761012","https://openalex.org/W6679236322","https://openalex.org/W6682170065"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703","https://openalex.org/W41015297"],"abstract_inverted_index":{"This":[0],"paper":[1],"represents":[2],"the":[3,23,37,60,72,82,85,97,102,111,123,141,144],"design":[4],"of":[5,105,113,143],"Interference":[6],"Resistant":[7],"Multiple":[8],"Access":[9],"(IRMA),":[10],"a":[11,67,91],"novel":[12],"cross":[13],"layer":[14,74,99],"protocol":[15],"that":[16,46,127,154],"can":[17,129],"combat":[18,76],"exposed":[19],"terminals":[20],"and":[21,40,148],"exploit":[22],"concurrent":[24],"transmissions":[25],"in":[26,31,48,54,62,71,96],"wireless":[27],"networks,":[28],"both":[29],"helping":[30],"achieving":[32],"higher":[33],"throughput":[34],"compared":[35],"to":[36,75,100],"802.11":[38,124],"standard":[39,125],"other":[41,157],"recent":[42],"protocols.":[43],"By":[44],"observing":[45],"nodes":[47],"current":[49,133],"protocols":[50,158],"waste":[51],"transmission":[52,107],"opportunities":[53],"two":[55,63],"different":[56,106],"scenarios,":[57],"IRMA":[58,65,88,119,155],"exploits":[59,81,110],"concurrency":[61,83,112],"aspects.":[64],"proposes":[66],"signature":[68,145],"detection":[69,146],"method":[70],"physical":[73],"control":[77],"frames'":[78],"collisions,":[79],"thus":[80,109],"at":[84],"transmitter":[86],"side.":[87],"also":[89],"designs":[90],"new":[92],"NAV":[93],"update":[94],"scheme":[95],"MAC":[98],"differentiate":[101],"interference":[103],"ranges":[104],"links,":[108],"all":[114],"non-interfering":[115],"links.":[116],"In":[117],"addition,":[118],"is":[120],"based":[121,137,150],"on":[122,138,151],"so":[126],"it":[128],"be":[130],"implemented":[131],"into":[132],"devices.":[134],"Experimental":[135],"results":[136],"USRP2":[139],"demonstrate":[140],"feasibility":[142],"method,":[147],"simulations":[149],"NS2":[152],"show":[153],"outperforms":[156],"significantly.":[159]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
