Search results for "Telecommunication"

showing 10 items of 1769 documents

Joint Radio and Computational Resource Allocation in IoT Fog Computing

2018

The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…

Service (systems architecture)IoTEdge deviceComputer Networks and CommunicationsComputer scienceDistributed computingAerospace Engineeringresource allocationCloud computing02 engineering and technologyresursointiComputational resource0203 mechanical engineeringUser experience design0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringstudent project allocationmatching theoryta113ta213business.industry020302 automobile design & engineering020206 networking & telecommunicationsService providerAutomotive EngineeringResource allocationEnhanced Data Rates for GSM Evolutionfog computingbusinessIEEE Transactions on Vehicular Technology
researchProduct

A Data-Driven Architecture for Personalized QoE Management in 5G Wireless Networks

2017

With the emergence of a variety of new wireless network types, business types, and QoS in a more autonomic, diverse, and interactive manner, it is envisioned that a new era of personalized services has arrived, which emphasizes users' requirements and service experiences. As a result, users' QoE will become one of the key features in 5G/future networks. In this article, we first review the state of the art of QoE research from several perspectives, including definition, influencing factors, assessment methods, QoE models, and control methods. Then a data-driven architecture for enhancing personalized QoE is proposed for 5G networks. Under this architecture, we specifically propose a two-ste…

Service (systems architecture)MultimediaComputer scienceWireless networkQuality of service020206 networking & telecommunications02 engineering and technologycomputer.software_genreComputer Science ApplicationsVariety (cybernetics)Data-drivenComprehension0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringArchitecturecomputer5GIEEE Wireless Communications
researchProduct

Kata Containers: An Emerging Architecture for Enabling MEC Services in Fast and Secure Way

2019

New coming applications will be only possible through Mobile Edge Servers deployed in proximity of the mobile users. Due to the user's mobility and server's workload, service migration will be an integral part of the services. For this reason, a standardized architecture should be designed to accomplish a workload migration in a secure and timely manner. Most research done to date has focused on the use of either virtual machine (VM) or container or a mix of both recently. A final solution might be an architecture only having the advantages of both technologies as the security of the VM and the speed of the containers. Custom solutions, actually, by using both technologies, need continuous …

Service (systems architecture)Settore ING-INF/03 - TelecomunicazioniInterface (Java)Computer science020206 networking & telecommunications02 engineering and technologycomputer.software_genreVirtualizationArchitecture Internet of things Optimization Virtual machineSoftware deploymentVirtual machine020204 information systemsServerContainer (abstract data type)0202 electrical engineering electronic engineering information engineeringOperating systemArchitecturecomputerLive migration2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS)
researchProduct

Breaking layer 2: A new architecture for programmable wireless interfaces

2012

This paper introduces a new architecture for programmable wireless interfaces, aiming at responding to the emerging request of wireless access flexibility and adaptability. Instead of implementing a specific MAC protocol stack, the proposed architecture supports a set of programmable services, devised to customize the wireless access operations according to specific network and application scenarios. The services are composed by means of simpler functions, which in turns work on system primitives (i.e. elementary non-programmable functionalities, natively provided by the system) dealing with the physical transmission and reception of the frames. Our approach significantly differs from softw…

Service (systems architecture)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputer scienceInterface (computing)Quality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReconfigurabilityMAC program service function architecture flexibility reconfigurabilityProtocol stackTransmission (telecommunications)PHYWirelessbusinessComputer network2012 International Conference on ICT Convergence (ICTC)
researchProduct

Software-as-a-Service in the Telecommunication Industry: Problems and Opportunities

2010

This paper examines the telecommunication software market and the adoption of topical Software-as-a-Service (SaaS) model in this vertical market. The aim of this paper is to estimate which telecommunication software products are likely to be provided as a Service, and to examine the potential factors disallowing SaaS adoption. The set aim is pursued by studying both the supplying software vendors and the communication service providers (CSP) as customers. A set of thematic interviews, software industry statistics and information disclosed by the software vendors are used in the analysis. The results of the analysis reveal challenges in adopting SaaS for telecommunication software as well as…

Service (systems architecture)Social software engineeringProcess managementbusiness.industrySoftware deploymentInformationSystems_INFORMATIONSYSTEMSAPPLICATIONSSoftware as a serviceSoftware developmentVertical marketSoftware systemService providerbusinessTelecommunications
researchProduct

Network channel allocation and revenue maximization

2002

This paper introduces a model that can be used to share link capacity among customers under different kind of traffic conditions. This model is suitable for different kind of networks like the 4G networks (fast wireless access to wired network) to support connections of given duration that requires a certain quality of service. We study different types of network traffic mixed in a same communication link. A single link is considered as a bottleneck and the goal is to find customer traffic profiles that maximizes the revenue of the link. Presented allocation system accepts every calls and there is not absolute blocking, but the offered data rate/user depends on the network load. Data arriva…

Service qualityChannel networkAccess networkChannel allocation schemesbusiness.industryComputer scienceQuality of serviceBlocking (statistics)BottleneckWirelessRevenuebusinessTelecommunicationsComputer networkSPIE Proceedings
researchProduct

Toward solutions for energy efficiency

2020

Abstract The tariff setting for district heating (DH) services is a hard regulatory procedure. This chapter is devoted to development of the simple but sufficiently accurate methodology for fast and objective evaluation of the actual costs of DH to optimize the regulatory process and to set adequate tariffs on heat production and transmission. The developed methodology is based on the data sets of Latvian DH providers, but the methodological principles are applicable in another area too. Investigation of heat production drivers and following simulation revealed the key performance indicators (KPIs): fuel type and price. By usage of intelligent benchmarking data mining methods and mathematic…

Set (abstract data type)Operations researchTransmission (telecommunications)Process (engineering)Computer scienceProduction (economics)TariffPerformance indicatorBenchmarkingEfficient energy use
researchProduct

An Encoding in Metaheuristics for the Minimum Communication Spanning Tree Problem

2009

Problem-specific encodings can improve the performance of metaheuristics, such as genetic algorithms or simulated annealing. This paper studies the link-biased (LB) encoding, which is a tree representation, and applies metaheuristics using this encoding to the minimum communication spanning tree (MCST) problem. Given the communication requirements of the nodes, the MCST problem seeks a communication spanning tree with minimum total cost. Optimal solutions for MCST problems are similar to minimum spanning trees (MSTs), and the LB encoding exploits this property by encoding trees similar to MSTs with higher probability. The paper investigates how to systematically design problem-specific enc…

Set (abstract data type)Spanning treeTree representationEncoding (memory)Simulated annealingGeneral EngineeringMinimum spanning treeTelecommunications networkAlgorithmMetaheuristicMathematicsINFORMS Journal on Computing
researchProduct

Analysis of Users Behaviour from a Movie Preferences Perspective

2018

Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…

Settore INF/01 - InformaticaExploitComputer Networks and CommunicationsPerspective (graphical)020206 networking & telecommunications02 engineering and technologyHomophilyDecentralizationPopularityData scienceDecentralized Online Social NetworksData availabilityHomophilyTerm (time)Data availabilitySimilarity (psychology)0202 electrical engineering electronic engineering information engineeringDecentralized Online Social Network020201 artificial intelligence & image processingData availability; Decentralized Online Social Networks; Homophily; Computer Networks and Communications
researchProduct

Exploiting community detection to recommend privacy policies in decentralized online social networks

2018

The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…

Settore INF/01 - InformaticaExploitbusiness.industryEnd userComputer sciencePrivacy policyInternet privacy020206 networking & telecommunications02 engineering and technologyPrivacy policiesRecommender systemTheoretical Computer ScienceRecommendation systemPrivacyComputer Science0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingDecentralized online social networksPrivacy policiebusinessSet (psychology)Personally identifiable informationDecentralized online social networks; Privacy; Privacy policies; Recommendation system; Security
researchProduct