Review Article
Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies
Figure 14
Three interference management schemes through exploiting the OFDM features.
(a) An example of attached information in hJam |
(b) An example of Back2F |
(c) The feature of cycle prefix exploited by CPRecycle |