Search results for "access"

showing 10 items of 1232 documents

An energy analysis of IEEE 802.15.6 scheduled access modes

2010

Body Area Networks (BANs) are an emerging area of wireless personal communications. The IEEE 802.15.6 working group aims to develop a communications standard optimised for low power devices operating on, in or around the human body. IEEE 802.15.6 specifically targets low power medical application areas. The IEEE 802.15.6 draft defines two main channel access modes; contention based and contention free. This paper examines the energy lifetime performance of contention free access and in particular of periodic scheduled allocations. This paper presents an overview of the IEEE 802.15.6 and an analytical model for estimating the device lifetime. The analysis determines the maximum device lifeti…

Settore ING-INF/03 - TelecomunicazioniComputer scienceInter-Access Point Protocolbusiness.industryPhysical layerbiomedical communication body area networks personal area networksIEEE 802.15.6 scheduled access modes body area network channel access modes communications standard device lifetime estimation energy analysis energy lifetime performance human body low power devices low power medical application areas periodic scheduled allocation wireless personal communicationTelecommunications linkBody area networkWirelessIEEE 802.11e-2005TransceiverbusinessIEEE 802.15IEEE 802.11r-2008Computer network2010 IEEE Globecom Workshops
researchProduct

Coexistence between IEEE802.15.4 and IEEE802.11 through cross-technology signaling

2017

When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and requiring technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when using different technologies. To this end, this paper proposes an architecture that allows crosstechnology medium access by means of a Time Division Multiple Access (TDMA) scheme. In order to achieve cross-technology synchronization, which is required for the TDMA solution, an energy pattern beacon…

Settore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedTime division multiple access020206 networking & telecommunications02 engineering and technologyInterference (wave propagation)Radio spectrumSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringWirelessIBCN020201 artificial intelligence & image processingMAC protocols interference mitigation crosstechnology TDMA scheme energy pattern beacon parameter negotiationbusinessEnergy (signal processing)Degradation (telecommunications)2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

Random access with repeated contentions for emerging wireless technologies

2017

In this paper we propose ReCo, a robust contention scheme for emerging wireless technologies, whose efficiency is not sensitive to the number of contending stations and to the settings of the contention parameters (such as the contention windows and retry limits). The idea is iterating a basic contention mechanism, devised to select a sub-set of stations among the contending ones, in consecutive elimination rounds, before performing a transmission attempt. Elimination rounds can be performed in the time or frequency domain, with different overheads, according to the physical capabilities of the nodes. Closed analytical formulas are given to dimension the number of contention rounds in order…

Settore ING-INF/03 - Telecomunicazionibusiness.industryOrthogonal frequency-division multiplexingComputer scienceComputer Science (all)020206 networking & telecommunications02 engineering and technologycomputer science (all); electrical and electronic engineering; binary alloys0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingElectrical and Electronic EngineeringbusinessRandom accessComputer networkIEEE INFOCOM 2017 - IEEE Conference on Computer Communications
researchProduct

Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs

2007

This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronizertion among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link fai…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceInter-Access Point Protocolbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionNetwork allocation vectorWireless sensor networksIEEE 802.1QLogical link controlbusinessWireless sensor networkIEEE 802.15IEEE 802.11r-2008Computer networkIEEE 802.11s2007 16th International Conference on Computer Communications and Networks
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct

MEDIATION IN ITALY: NEW DISCIPLINE, OLD-STYLE LOGIC

2014

Settore IUS/01 - Diritto PrivatoADR ACCESS TO JUSTICE MEDIATION
researchProduct

L'accesso al credito immobiliare

2018

The essay deals with the issue of the various forms of financing real estate purchases with particular regard to the new types of contracts designed specifically to facilitate access to credit, such as rent to buy, the real estate lifetime loan, the real estate credit to businesses and the real estate credit to consumers

Settore IUS/01 - Diritto Privatoreal estate credit access to credit rent to buy real estate lifetime loan real estate credit to businesses real estate credit to consumers
researchProduct

sub artt. 38 e 39 d.lgs. n. 150/2009

2011

Settore IUS/07 - Diritto Del Lavoroaccesso dirigente fasce pubblica amministrazione
researchProduct

IL DIRITTO ALL'ISTRUZIONE AL COSPETTO DELLE CORTI DI STRASBURGO E DI LUSSEMBURGO: L'ACCESSO ALL'UNIVERSITÀ E LA QUESTIONE DEL NUMERO CHIUSO.

Settore IUS/08 - Diritto CostituzionaleDiritto all'istruzione accesso all'università numero chiuso
researchProduct

Quote rosa e parità tra i sessi: la storia di un lungo cammino

2019

Article 3.1 of the Italian Constitution enshrines the principle of equality and the prohibition of discrimination, based on “gender, race, language, religion, political opinion, personal and social conditions”. Additionally, Article 48 grants an equal right to men and women to vote, and Articles 56.3 and Article 58.1 establish the right to be elected to the Camera dei Deputati and the Senato della Repubblica without any reference to the gender of the candidates. Men and women voted in Italy the first time in an institutional referendum on 2 June 1946 to choose between a Republic and a Monarchy. However , the right for women to be elected came many years later, after a long and hard-fought s…

Settore IUS/08 - Diritto Costituzionaleeguaglianza accesso cariche elettive gender balance right to be elected
researchProduct