Search results for "Bile"

showing 10 items of 2148 documents

Resource sharing optimality in WiFi infrastructure networks

2009

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. Assuming that a contending node can dynamically change its strategy, by tuning its contention parameters to non-standard values on the basis of channel observations, we prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium condi…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - TelecomunicazioniDistributed computingNode (networking)ThroughputDistributed coordination functionShared resourceSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkMobile telephonybusinessGame theory Mechanism Design WiFi Infrastructure NetworksRandom accessCommunication channelComputer network
researchProduct

UDP flows in Cognitive Radios with Channel Aggregation and Fragmentation: A Test-bed Based Evaluation

2018

Channel aggregation (CA) and channel fragmentation (CF) have been studied extensively in cognitive radios (CRs) for many years. However, a test-bed evaluation for such techniques at flow level is still open. In this study, employing National Instruments devices, a test-bed is set up to evaluate the performance of UDP flows for CRs with CA and CF, considering the aspects of blocking, preemption, and throughput in probability. The measurements clearly show that there are performance improvements in applying CA and CF in CRs for UDP flows.

Computer sciencebusiness.industryFragmentation (computing)020302 automobile design & engineering020206 networking & telecommunicationsThroughput02 engineering and technologySoftware-defined radioBlocking (statistics)Cognitive radio0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringbusinessCommunication channelComputer network2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
researchProduct

Web Services Specific Security Standards

2014

Abstract In this paper are described the aspects regarding the security within OGSA framework, introducing WS-Security standard – OASIS standard for Web Services security. There are approached the security aspects of the OGSA environment for the delivered architectures P2P – ‘Peer-to-Peer’ and there are presented the recent initiatives for creating a specific and adapted environment OGSA for the applications P2P and the specific security demands of these transactions. Furthermore, there are exposed aspects regarding the mobility of services and resources in the P2P context, with the conditions of applying WSRF framework, derived from OGSA to the P2P environments, SOA processes in P2P enviro…

Computer sciencebusiness.industryGeneral Engineeringmobile agents.Energy Engineering and Power TechnologyContext (language use)mobile environmentscomputer.software_genreWeb application securitySecurity softwareWorld Wide WebGrid architecturesWeb servicebusinesscomputersecurity softwareWeb servicesProcedia Economics and Finance
researchProduct

On the advantages of combining differential algorithms and log-polar vision for detection of self-motion from a mobile robot

2001

Abstract This paper describes the design and implementation on programmable hardware (FPGAs) of an algorithm for the detection of self-mobile objects as seen from a mobile robot. In this context, ‘self-mobile’ refers to those objects that change in the image plane due to their own movement, and not to the movement of the camera on board of the mobile robot. The method consists on adapting the original algorithm from Chen and Nandhakumar [A simple scheme for motion boundary detection, in: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1994] by using foveal images obtained with a special camera whose optical axis points towards the direction of advance. It i…

Computer sciencebusiness.industryGeneral MathematicsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONContext (language use)Mobile robotMotion detectionImage planeObject (computer science)Computer Science ApplicationsControl and Systems EngineeringComputer visionArtificial intelligenceDifferential (infinitesimal)businessAlgorithmSoftwareRobotics and Autonomous Systems
researchProduct

UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments

2010

A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…

Computer sciencebusiness.industryInteroperabilityProvisioningComputer securitycomputer.software_genreAdvanced Traffic Management SystemInteroperationIntelligent NetworkMiddleware (distributed applications)Semantic technologybusinesscomputerMobile serviceComputer network2010 Fifth International Conference on Internet and Web Applications and Services
researchProduct

A mechanism of coalition formation in the metaphor of politics multiagent architecture

2003

Hybrid Multi-Agent Architectures allow the support of mobile robots colonies moving in dynamic, not predictable and time variable environments in order to achieve distributed solving strategies that develop collective team-oriented behaviors for solving complicate and difficult tasks. The development of a new robotic architecture for the coordination of a robot colonies in dangerous, unknown and dynamic environment is outlined. The name of this new architecture is Metaphor of Politics (MP), because it loosely takes inspiration from the political organizations of democratic governments.

Computer sciencebusiness.industryMetaphormedia_common.quotation_subjectComputer Science (all)Mobile robotRoboticsDemocracyTheoretical Computer SciencePoliticsOrder (exchange)Human–computer interactionRobotArtificial intelligenceArchitecturebusinessMechanism (sociology)media_common
researchProduct

An Empirical Investigation of Performance Overhead in Cross-Platform Mobile Development Frameworks

2020

AbstractThe heterogeneity of the leading mobile platforms in terms of user interfaces, user experience, programming language, and ecosystem have made cross-platform development frameworks popular. These aid the creation of mobile applications – apps – that can be executed across the target platforms (typically Android and iOS) with minimal to no platform-specific code. Due to the cost- and time-saving possibilities introduced through adopting such a framework, researchers and practitioners alike have taken an interest in the underlying technologies. Examining the body of knowledge, we, nonetheless, frequently encounter discussions on the drawbacks of these frameworks, especially with regard…

Computer sciencebusiness.industryMobile appMobile apps020206 networking & telecommunications020207 software engineering02 engineering and technologyData scienceBody of knowledgeDevelopment approachesUser experience designCross-platform0202 electrical engineering electronic engineering information engineeringCross-platform developmentMobile developmentAndroid (operating system)User interfacePerformance benchmarkEmpirical evidencebusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Software
researchProduct

Reliable Underlay Device-to-Device Communications on Multiple Channels

2019

Device-to-device (D2D) communications provide a substantial increase in spectrum usage and efficiency by allowing nearby users to communicate directly without passing their packets through the base station (BS). In previous works, proper channel assignment and power allocation algorithms for sharing of channels between cellular users and D2D pairs, usually require exact knowledge of the channel-state-information (CSI). However, due to the non-stationary wireless environment and the need to limit the communication and computation overheads, obtaining perfect CSI in the D2D communication scenario is generally not possible. In this work, we propose a joint channel assignment and power allocati…

Computer sciencebusiness.industryNetwork packetComputationReliability (computer networking)05 social sciences050801 communication & media studies020302 automobile design & engineeringThroughput02 engineering and technologyBase station0508 media and communications0203 mechanical engineeringComputer Science::Networking and Internet ArchitectureWirelessUnderlaybusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science::Information TheoryCommunication channelComputer network2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
researchProduct

Energy-Efficient Binary Power Control with Bit Error Rate Constraint in MIMO-OFDM Wireless Communication Systems

2012

Motivated by the demand for energy efficiency improvement in mobile communication industry, we explore an idea of optimizing energy efficiency for MIMO-OFDM wireless communication systems while maintaining users' quality of service (QoS) requirement. Based on the binary power control scheme,a power allocation criterion for energy efficiency optimization is derived under the total power constraint. From a bit error rate (BER) point of view, a protection constraint is configured to guarantee the system QoS. With the aim of energy efficiency optimization under QoS guarantee in MIMO-OFDM wireless communication systems, an energy-efficient binary power control with BER constraint (EBPCB) algorith…

Computer sciencebusiness.industryOrthogonal frequency-division multiplexingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMIMO-OFDMComputer Science::PerformanceConstraint (information theory)Computer Science::Networking and Internet ArchitectureBit error rateElectronic engineeringMobile telephonybusinessComputer Science::Information TheoryEfficient energy usePower control2012 IEEE Vehicular Technology Conference (VTC Fall)
researchProduct

Keynote talk 3: From basics to advanced modelling and simulation techniques for mobile radio channels

2011

From the earliest beginnings of mobile communications to the present time, there has always been a high demand for realistic mobile radio channel models. This demand is driven by the fact that channel models are indispensable for the performance evaluation, parameter optimisation, and test of mobile communication systems. Channel modelling and simulation techniques are therefore of great importance for electronics and telecommunication engineers who are involved in the development of present and future mobile communication systems. This presentation will start with a review of the basic principles of mobile radio channel modelling and gradually moves to more advanced modelling and simulatio…

Computer sciencebusiness.industryPrincipal (computer security)Emphasis (telecommunications)Electrical engineeringlaw.inventionOpen researchRelaylawElectronic engineeringMobile telephonyElectronicsbusinessComputer Science::Information TheoryCommunication channelEnvelope (motion)The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)
researchProduct