Search results for "Telephony"
showing 10 items of 84 documents
An intelligent architecture for service provisioning in pervasive environments
2011
Accepted version of an article from the conference: 2011 International Symposium on Innovations in Intelligent Systems and Applications (INISTA). Definitive published version available from IEEE: http://dx.doi.org/10.1109/INISTA.2011.5946134 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context Relevance is determined b…
A User-Balanced System for IP Telephony in WLANs
2008
Wireless IP telephony is becoming very popular between the users of large wireless local area networks (WLANs). This increment has been mainly caused because it allows cost savings. Although, large WLANs use to provide high availability and redundancy, WLANs lack on the available throughput when there are many IP telephony users. In this paper we present a system that reallocates IP telephony devices when the system detects that an AP is overloaded. The algorithm and the frames used for our proposal are described. Measurements taken show how the bandwidth consumed is transferred from an access point to another when our proposal is running. Finally, we show the time needed to re-associate re…
Power consumption analysis for mobile stations in hybrid relay-assisted wireless networks
2010
While Internet access using mobile or wireless technologies has become ubiquitous these days, the energy consumption aspect of such connections has not been studied in-depth yet. In this paper, a hybrid wireless network, which consists of a cellular component and a relay-assisted ad hoc component, is studied focusing on energy consumption by mobile stations with respect to the amount of data communicated and achieved battery lifetime. Four alternative paths are considered, including both pure cellular and hybrid ad hoc/cellular links for uplink and downlink traffic. The effects of each alternative connection on energy consumption of the involved mobile stations are analyzed in terms of the …
Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]
2009
This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.
Capturing methodological trends in mobile communication studies
2013
This study investigates methodological trends in mobile communication studies. The articles published over the past 20 years in five journals (Communication Research, Journal of Communication, Journal of Computer-Mediated Communication, New Media & Society, and Information, Communication & Society) are analysed. The results show that the quantitative and qualitative studies have increased while theoretical accounts have remained few. The quantitative approach is the most applied. The studied articles reflect a structural problem of science communication that stems from the lack of cumulativity of scientific results and cross-national analyses and from the standard length of articles that po…
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…
Technologies for green radio communication networks
2011
Since the introduction of cellular communications in the early '80s, the demand for two-way mobile communication services has increased tremendously. Today there are over 4 billion mobile users and 4.6 million radio base station sites worldwide. This rapid growth of the cellular mobile industry has been at the price of increased energy consumption and a sizable carbon footprint.
5G V2V Communication With Antenna Selection Based on Context Awareness: Signaling and Performance Study
2022
Enhanced vehicle-to-everything (eV2X) communication is one of the key challenges to be addressed by the fifth generation (5G) of cellular mobile communications. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. Although vehicular communications are by default assumed between single antennas located on the roof of the transmitter and receiver vehicles, prior art has shown that there are other antenna positions more suitable for V2X communication, depending on the specific communication context. Antenna selection can be used in this case to select one specific antenna or a subset of them better suited for a cer…
SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs
2011
How to discover a captured node and to resist node capture attack is a challenging task in Wireless Sensor Networks (WSNs). In this paper, we propose a node capture resistance and key refreshing scheme for mobile WSNs which is based on the Chinese remainder theorem. The scheme is able of providing forward secrecy, backward secrecy and collusion resistance for diminishing the effects of capture attacks. By implementing our scheme on a Sun SPOT based sensor network testbed, we demonstrate that the time for updating a new group key varies from 56 ms to 546 ms and the energy consumption is limited to 16.5–225 mJ, depending on the length of secret keys and the number of sensors in a group.
Mobile cloud computing educational tool for image/video processing algorithms
2011
This paper shows the importance and benefit of coupling cloud computing with mobile especially due to power limitations that mobile devices exhibit. Moreover, the work done shows that mobile computing can be applied for educational purposes, where a tool for students termed Mobi4Ed is presented. This educational tool aims at exploiting the concept of cloud computing in the context of image and video processing, where students can assess several algorithms in real-time. Two possible system architectures are detailed, where one uses the cellular channel and the other uses the data channel. Consequently, one of the approaches is adopted and a detailed simulation is done where an Android client…