Search results for "Application protocol"

showing 10 items of 17 documents

Mobile Electronic Commerce: Emerging Issues

2000

There are many definitions for Mobile Electronic Commerce (M-Commerce). We define M-Commerce as any type of transaction of an economic value having at least at one end a mobile terminal and thus using the mobile telecommunications network. The Wireless Application Protocol (WAP) plays an important role in m-commerce by optimizing Internet standards for the constraints of the wireless environment and thus bridging the gap between Internet and mobile world. Mobile Network Operators can play a major role in m-commerce by being strategically positioned between customers and content/service providers. In this paper we investigate the roles the operator can play in m-commerce and discuss respecti…

business.industryComputer sciencecomputer.internet_protocolMobile computingMobile WebMobile business developmentService providerComputer securitycomputer.software_genreInternet StandardTelecommunications networkPublic land mobile networkMobile paymentCellular networkMobile searchWirelessWireless Application ProtocolThe InternetTelephonyMobile telephonybusinessTelecommunicationscomputerMobile network operator
researchProduct

Mobile Wireless Interfaces: In Search for the Limits

2002

With the proliferation of 2G and 3G Telecom and other wireless networks hundred of millions of users will be able to access wireless services with their terminals in only a few years. In this paper we discuss the possibilities and limitations of existing and emerging mobile technologies and methodologies for porting information and functionality from traditional PCs to mobile devices and vice versa. We argue that in order to be able to properly port things between devices an equivalence concept for user interfaces is required.

EngineeringWi-Fi arrayMobile identification numbercomputer.internet_protocolbusiness.industryMobile broadbandMobile computingMobile WebWireless Application ProtocolMobile searchMobile technologybusinesscomputerComputer network
researchProduct

Improved section bonding using silanated glass slides--application protocol.

1992

Silanated slides provide excellent tissue adhesion for routine histology, immunohistochemistry and in situ hybridization of frozen, paraffin embedded material or cell smears. An easy and inexpensive method of treating glass microscope slides with triethoxysilylpropylamine is reported.

Tissue AdhesionMicroscopeMaterials scienceTissue adhesivesHistological TechniquesNucleic Acid HybridizationNanotechnologySilanesParaffin embeddedPathology and Forensic Medicinelaw.inventionImmunoenzyme TechniqueslawImmunoenzyme techniquesApplication protocolHumansTissue AdhesivesGlassBiomedical engineeringInternational journal of legal medicine
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches

2010

With the popularity of the IEEE 802.11 standards, many analytical saturation throughput studies for the distributed coordination function (DCF) have been reported. In this paper, we outline a number of issues and criticalities raised by previously proposed models. In particular, a careful look at backoff counter decrement rules allows us to conclude that, under saturation conditions, the slot immediately following a successful transmission can be accessed only by the station (STA) that has successfully transmitted in the previous channel access. Moreover, due to the specific acknowledgment (ACK) timeout setting adopted in the standard, the slot immediately following a collision cannot be ac…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceAerospace EngineeringThroughputDistributed coordination functionIEEE 802.11Wireless lanWireless Application ProtocolElectrical and Electronic Engineeringbusiness.industrySettore ING-INF/03 - Telecomunicazioni802.11 Performance analysisWiFiPerformance analysisComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCode ratemedium access protocolsAutomotive EngineeringbusinessTimeoutcomputerWireless sensor network802.11Computer networkCommunication channel
researchProduct

Performance Evaluation of the IEEE 802.16 ARQ Mechanism

2007

The IEEE 802.16 technology defines the ARQ mechanism that enables a connection to resend data at the MAC level if an error is detected. In this paper, we analyze the key features and parameters of the ARQ mechanism. In particular, we consider a choice for the ARQ feedback type, a scheduling of the ARQ feedbacks and retransmissions, the ARQ block rearrangement, ARQ transmission window and ARQ block size. We run a number of simulation scenarios to study these parameters and how they impact a performance of application protocols. The simulation results reveal that the ARQ mechanism plays an important role in transmitting data over wireless channels in the IEEE 802.16 networks.

IEEE 802Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSHybrid automatic repeat requestData_CODINGANDINFORMATIONTHEORYScheduling (computing)Selective Repeat ARQSliding window protocolApplication protocolWirelessbusinessBlock sizeComputer network
researchProduct

M-commerce - mobile commerce: a new frontier for E-business

2005

Mobile commerce involves the use of mobile computing devices in carrying out different types of economic transactions or enabling them to take place over space and time. The m-commerce includes use of such technologies as SMS services over a number of carriers (GSM, IS95, CDMA, W-CDMA), Bluetooth applications, and the integration of low-level digital carriers to IP based services through WAP or Compact HTML like the Japanese I-Mode service. This integration is one of the fastest growing markets of E-business and it will involve the development and design of a host of new applications, services, business models and technological solutions. The theme is both topical and challenging, as the nu…

Service (business)Electronic businessComputer sciencebusiness.industrycomputer.internet_protocolMobile commerceMobile computingServices computingMobile business developmentE-commerceBusiness modellaw.inventionWorld Wide WebBluetoothGSMlawMiddlewareInformation systemWireless Application ProtocolbusinesscomputerProceedings of the 34th Annual Hawaii International Conference on System Sciences
researchProduct

A Techno-Economic Perspective of Constrained Application Protocol

2017

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencePerspective (graphical)Techno economicEnvironmental economicsConstrained Application Protocol
researchProduct

A Multi-Relay Cooperative Automatic Repeat Request Protocol in Wireless Networks

2010

This paper proposes a Multi-relay Cooperative Automatic Repeat ReQuest protocol (MC-ARQ) for IEEE 802.11 based wireless networks. The proposed distributed relay selection scheme not only selects the best relays but also solves the collision problem among multiple contending relays, by sorting the relays in the network according to their instantaneous channel quality with the destination node. No prior information or explicit signaling among relay nodes is required. Both analytical and simulation results show that significant benefits can be achieved with the MC-ARQ protocol, compared with both the recently proposed PRCSMA scheme and the original non-cooperative DCF scheme.

business.industrycomputer.internet_protocolComputer scienceWireless networkAutomatic repeat requestDistributed computingNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionRelaylawWireless lanComputer Science::Networking and Internet ArchitectureWireless Application ProtocolbusinesscomputerComputer Science::Information TheoryComputer networkCommunication channel2010 IEEE International Conference on Communications
researchProduct