Search results for "550"
showing 10 items of 1192 documents
MIDI Polyphonic Expression: fra verktøy til kunstnerisk uttrykk : Et møte mellom min egen kunstneriske prosess og den nye MIDI-teknologien MIDI Polyp…
2021
Master's thesis in Popular music (MUR502)
Individuell time i musikkproduksjon
2021
Master's thesis in Popular music (MUR502)
Privacy-enhanced network monitoring
2013
Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, 2014 This PhD dissertation investigates two necessary means that are required for building privacy-enhanced network monitoring systems: a policy-based privacy or confidentiality enforcement technology; and metrics measuring leakage of private or confidential information to verify and improve these policies. The privacy enforcement mechanism is based on fine-grained access control and reversible anonymisation of XML data to limit or control access to sensitive information from the monitoring systems. The metrics can be used to support a continuous improvement process, by quantifying leakages of private o…
Generalized Bayesian pursuit: A novel scheme for multi-armed Bernoulli bandit problems
2011
Published version of a chapter in the book: IFIP Advances in Information and Communication Technology. Also available from the publisher at: http;//dx.doi.org/10.1007/978-3-642-23960-1_16 In the last decades, a myriad of approaches to the multi-armed bandit problem have appeared in several different fields. The current top performing algorithms from the field of Learning Automata reside in the Pursuit family, while UCB-Tuned and the ε -greedy class of algorithms can be seen as state-of-the-art regret minimizing algorithms. Recently, however, the Bayesian Learning Automaton (BLA) outperformed all of these, and other schemes, in a wide range of experiments. Although seemingly incompatible, in…
On the Statistical Properties of Equal Gain Combining over Mobile-to-Mobile Fading Channels in Cooperative Networks
2010
Paper presented at the 2010 IEEE International Conference on Communications (ICC), Cape Town. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/ICC.2010.5501898 This article deals with the statistical analysis of equal gain combining (EGC) over mobile-to-mobile (M2M) fading channels in a dual-hop amplify-and-forward relay network. Here, we…
A survey on peer-to-peer SIP based communication systems
2010
Published version of an article from the journal: Peer-to-Peer Networking and Applications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s12083-009-0064-4 Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in …
Mobile-to-mobile fading channels in amplify-and-forward relay systems under line-of-sight conditions: statistical modeling and analysis
2010
Published version of an article from the journal:Annales des Telecommunications/Annals of Telecommunications. The original publication is available at Springerlink. http://dx.doi.org/10.1007/s12243-010-0169-z This paper deals with the modeling and analysis of narrowband mobile-to-mobile (M2M) fading channels for amplify-and-forward relay links under line-of-sight (LOS) conditions. It is assumed that a LOS component exists in the direct link between the source mobile station (SMS) and the destination mobile station (DMS), as well as in the links via the mobile relay (MR). The proposed channel model is referred to as the multiple-LOS second-order scattering (MLSS) channel model. The MLSS chan…
Statistical Modeling and Analysis of Mobile-to-Mobile Fading Channels in Cooperative Networks Under Line-of-Sight Conditions
2009
Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Springerlink. http://dx.doi.org/10.1007/s11277-009-9721-4 Recently, mobile-to-mobile (M2M) cooperative network technology has gained considerable attention for its promise of enhanced system performance with increased mobility support. As this is a new research field, little is known about the statistical properties of M2M fading channels in cooperative networks. So far, M2M fading channels have mainly been modeled under the assumption of non-line-of-sight (NLOS) conditions. In this paper, we propose a new model for M2M fading channels in amplify-and-forward relay lin…
An adaptive cooperative MAC mechanism in multi-hop wireless networks
2010
Paper presented at the 2010 IEEE Symposium on Computers and Communications, Riccione, Italy . (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/ISCC.2010.5546573 In this paper, we propose a novel adaptive cooperative MAC mechanism that is specifically designed for two-hop cooperative communications where source and destinati…
Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks
2010
Paper presented at the 2010 5th IEEE International Symposium on Wireless Pervasive Computing (ISWPC). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/ISWPC.2010.5483733 While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not bee…