Search results for "Telephony"

showing 10 items of 84 documents

An intelligent architecture for service provisioning in pervasive environments

2011

Accepted version of an article from the conference: 2011 International Symposium on Innovations in Intelligent Systems and Applications (INISTA). Definitive published version available from IEEE: http://dx.doi.org/10.1109/INISTA.2011.5946134 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context Relevance is determined b…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Service (systems architecture)business.industrycomputer.internet_protocolComputer scienceMobile computing020206 networking & telecommunicationsContext (language use)02 engineering and technologyService-oriented architectureRecommender systemWorld Wide WebVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 5520202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Mobile telephonyUser interfacebusinesscomputer
researchProduct

A User-Balanced System for IP Telephony in WLANs

2008

Wireless IP telephony is becoming very popular between the users of large wireless local area networks (WLANs). This increment has been mainly caused because it allows cost savings. Although, large WLANs use to provide high availability and redundancy, WLANs lack on the available throughput when there are many IP telephony users. In this paper we present a system that reallocates IP telephony devices when the system detects that an AP is overloaded. The algorithm and the frames used for our proposal are described. Measurements taken show how the bandwidth consumed is transferred from an access point to another when our proposal is running. Finally, we show the time needed to re-associate re…

Voice over IPComputer sciencebusiness.industryHigh availabilityServerComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (computing)Local area networkWirelessThroughputTelephonybusinessComputer network2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
researchProduct

Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks

2010

While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not been studied in-depth yet. In this paper, a hybrid wireless network, which consists of a cellular component and a relay-assisted ad hoc component, is studied focusing on energy consumption by mobile stations with respect to the amount of data communicated and achieved battery lifetime. Four alternative paths are considered, including both pure cellular and hybrid ad hoc/cellular links for uplink and downlink traffic. The effects of each alternative connection on energy consumption of the involved mobile stations are analyzed in terms of the …

Wireless networkbusiness.industryComputer scienceWireless ad hoc networkMobile stationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingCellular networkMobile ad hoc networkEnergy consumptionMobile telephonybusinessComputer networkIEEE 5th International Symposium on Wireless Pervasive Computing 2010
researchProduct

Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]

2009

This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.

business.industryComputer scienceApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSignal ProcessingWireless lanThroughputMobile telephonyElectrical and Electronic EngineeringbusinessGame theoryProtocol (object-oriented programming)Computer networkIEEE Signal Processing Magazine
researchProduct

Capturing methodological trends in mobile communication studies

2013

This study investigates methodological trends in mobile communication studies. The articles published over the past 20 years in five journals (Communication Research, Journal of Communication, Journal of Computer-Mediated Communication, New Media & Society, and Information, Communication & Society) are analysed. The results show that the quantitative and qualitative studies have increased while theoretical accounts have remained few. The quantitative approach is the most applied. The studied articles reflect a structural problem of science communication that stems from the lack of cumulativity of scientific results and cross-national analyses and from the standard length of articles that po…

business.industryComputer scienceCommunicationmobile communicationmetodologiamobiiliviestintäStructural ProblemLibrary and Information SciencesData scienceCumulativitymobile communication; technology; trend; theoryNew mediatrendittrendtechnologyCommunicologyScience communicationteoriaMobile telephonySocial sciencetheorybusinessScientific communicationQualitative researchInformation, Communication & Society
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Technologies for green radio communication networks

2011

Since the introduction of cellular communications in the early '80s, the demand for two-way mobile communication services has increased tremendously. Today there are over 4 billion mobile users and 4.6 million radio base station sites worldwide. This rapid growth of the cellular mobile industry has been at the price of increased energy consumption and a sizable carbon footprint.

business.industryComputer scienceEnergy consumptionTelecommunications networkComputer Science ApplicationsEnergy conservationCellular communicationSustainable designCarbon footprintMobile telephonyElectrical and Electronic EngineeringbusinessTelecommunicationsEfficient energy useIEEE Wireless Communications
researchProduct

5G V2V Communication With Antenna Selection Based on Context Awareness: Signaling and Performance Study

2022

Enhanced vehicle-to-everything (eV2X) communication is one of the key challenges to be addressed by the fifth generation (5G) of cellular mobile communications. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. Although vehicular communications are by default assumed between single antennas located on the roof of the transmitter and receiver vehicles, prior art has shown that there are other antenna positions more suitable for V2X communication, depending on the specific communication context. Antenna selection can be used in this case to select one specific antenna or a subset of them better suited for a cer…

business.industryComputer scienceMechanical EngineeringTransmitterContext (language use)Radio Resource ControlComputer Science ApplicationsAutomotive EngineeringContext awarenessOverhead (computing)Mobile telephonyRadio resource managementAntenna (radio)businessComputer networkIEEE Transactions on Intelligent Transportation Systems
researchProduct

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs

2011

How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.

business.industryComputer scienceNode (networking)TestbedMobile computingEnergy consumptionSun SPOTKey distribution in wireless sensor networksForward secrecyMobile telephonybusinessWireless sensor networkComputer networkGroup key2011 IEEE 36th Conference on Local Computer Networks
researchProduct

Mobile cloud computing educational tool for image/video processing algorithms

2011

This paper shows the importance and benefit of coupling cloud computing with mobile especially due to power limitations that mobile devices exhibit. Moreover, the work done shows that mobile computing can be applied for educational purposes, where a tool for students termed Mobi4Ed is presented. This educational tool aims at exploiting the concept of cloud computing in the context of image and video processing, where students can assess several algorithms in real-time. Two possible system architectures are detailed, where one uses the cellular channel and the other uses the data channel. Consequently, one of the approaches is adopted and a detailed simulation is done where an Android client…

business.industryComputer scienceServerSystems architectureMobile computingCloud computingMobile telephonyVideo processingbusinessAlgorithmMobile deviceMobile cloud computing2011 Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE)
researchProduct