Search results for " Telecommunication systems"

showing 5 items of 5 documents

Streaming for vehicular users via elastic proxy buffer management

2004

In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…

Mobile radioService (systems architecture)Computer Networks and CommunicationsComputer scienceDelayed real time servicesMultimedia information retrievalCommunication channels (information theory)Resource sharing algorithmBuffer storageWirelessInformation retrievalWireless telecommunication systemsElectrical and Electronic EngineeringReal time streaming servicesProxy (statistics)Railroad car equipmentVehicular area networksBackbone networkInternetMobile computingVehicular ad hoc networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSatellite communication systemsElastic proxy buffer managementLocal area networksReal time systemsAlgorithms; Buffer storage; Communication channels (information theory); Information retrieval; Internet; Local area networks; Multimedia systems; Railroad car equipment; Real time systems; Satellite communication systems; Satellite links; Wireless telecommunication systems; Delayed real time services; Elastic proxy buffer management; Fast internet for fast train hosts (FIFTH); Real time streaming services; Resource sharing algorithm; Vehicular area networks; Mobile computingComputer Science ApplicationsTerminal (electronics)Fast internet for fast train hosts (FIFTH)businessSatellite linksAlgorithmsMultimedia systemsComputer network
researchProduct

Treating cockroach phobia using a serious game on a mobile phone and augmented reality exposure: A single case study

2011

In vivo exposure has proved its efficacy in the treatment of specific phobias; however, not all patients benefit from it. Communication and information technologies such as Virtual Reality (VR) and Augmented Reality (AR) have improved exposure treatment adherence and acceptance. Serious games (SG) could also be used in order to facilitate exposure treatment. A line of research on SG is emerging which focuses on health issues. We have developed a SG for the treatment of cockroach phobia that uses a mobile phone as the application device. This work examines results of an N = 1 study about whether the use of this mobile game can facilitate treatment of this specific phobia preparing her for th…

Serious gamesEXPRESION GRAFICA EN LA INGENIERIAApplied psychologyAugmented realitySingle-subject designVirtual realityMobile gamesSpecific phobiaTelephone setsArts and Humanities (miscellaneous)In-vivomedicineMobile phonesSession (computer science)ArgonGeneral PsychologyPhobiasPhobiasResearchExposure treatmentHomework assignmentsmedicine.diseaseTelephoneHuman-Computer InteractionMobile telecommunication systemsMobile phoneMobile devicesHealth issuesAugmented realityPsychologyMobile deviceSocial psychologyAnxiety disorderComputers in Human Behavior
researchProduct

Revealing Transmit Diversity Mechanisms in Commercial IEEE 802.11 Cards

2008

Service differentiation in WLAN has been traditionally faced at the MAC layer. However, some PHY layer parameters, such as the transmission power, the antenna, and the modulation/coding scheme, have a deep impact on network performance. Since the criterion for selecting these parameters is left to the vendor specific implementations, the performance spread of most experimental results about 802.11 WLAN could be affected by vendor proprietary schemes. The focus of this paper is an experimental analysis of the undisclosed antenna diversity mechanisms employed by some widely used cards (namely, the Atheros and Intel based cards), and a thorough understanding of the optimization goals which gui…

Settore ING-INF/03 - TelecomunicazioniAntenna accessories Internet protocols Local area networks Machine design Mechanisms Standards Systems engineering Telecommunication Telecommunication systems Wireless local area networks (WLAN)
researchProduct

On the Fidelity of IEEE 802.11 commercial cards

2006

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

Signal processingCommunication channels (information theory); Internet; Signal processing; Wireless telecommunication systems; Baseband signals; Carrier sense function; MAC layer; Network protocolsComputer scienceMAC layerWireless local area networks (WLAN)backoff algorithmCommunication channels (information theory)IEEE 802.11Wireless telecommunication systemsNetwork protocolsThroughput (business)InternetBaseband signalsChannel allocation schemesSIMPLE (military communications protocol)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCarrier sense functionThroughputNetwork interface controllerEmbedded systemResource allocationbusinessComputer networkCommunication channel
researchProduct

Quality, Reliability, Security and Robustness in Heterogeneous Systems

2020

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.

bandwidthartificial intelligenceinternetmobiledevicesrouterstelecommunication networksdata communication systemscomputing mobileWorld Wide Webroutingsensorcomputer networkstelecommunication trafficdata securitysignal processingwireless sensor networksnetworks sensorswireless telecommunication systems
researchProduct