Search results for "Telecommunication system"
showing 6 items of 6 documents
Streaming for vehicular users via elastic proxy buffer management
2004
In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…
All-optical measurements of background, amplitude, and timing jitters for high speed pulse trains or PRBS sequences using autocorrelation function
2008
International audience; We present a simple method for all-optical measurements of background, amplitude, and timing jitters of ultra high speed pulse trains or PRBS sequences using the jitter dependence of the intercorrelation-peak shape. This method is numerically and experimentally demonstrated on a 42.66 Gbit/s PRBS sequence and then applied to measure the jitter growths occurring during the propagation of a 160-GHz pulse train in a classical SMF/DCF dispersion map.
Treating cockroach phobia using a serious game on a mobile phone and augmented reality exposure: A single case study
2011
In vivo exposure has proved its efficacy in the treatment of specific phobias; however, not all patients benefit from it. Communication and information technologies such as Virtual Reality (VR) and Augmented Reality (AR) have improved exposure treatment adherence and acceptance. Serious games (SG) could also be used in order to facilitate exposure treatment. A line of research on SG is emerging which focuses on health issues. We have developed a SG for the treatment of cockroach phobia that uses a mobile phone as the application device. This work examines results of an N = 1 study about whether the use of this mobile game can facilitate treatment of this specific phobia preparing her for th…
Revealing Transmit Diversity Mechanisms in Commercial IEEE 802.11 Cards
2008
Service differentiation in WLAN has been traditionally faced at the MAC layer. However, some PHY layer parameters, such as the transmission power, the antenna, and the modulation/coding scheme, have a deep impact on network performance. Since the criterion for selecting these parameters is left to the vendor specific implementations, the performance spread of most experimental results about 802.11 WLAN could be affected by vendor proprietary schemes. The focus of this paper is an experimental analysis of the undisclosed antenna diversity mechanisms employed by some widely used cards (namely, the Atheros and Intel based cards), and a thorough understanding of the optimization goals which gui…
On the Fidelity of IEEE 802.11 commercial cards
2006
The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…
Quality, Reliability, Security and Robustness in Heterogeneous Systems
2020
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.