Search results for "access"

showing 10 items of 1232 documents

Monitoring Accessibility of Governmental Web Sites in Europe

2008

Web accessibility is an important goal of the European i2010 strategy. Several one-off surveys of eAccessibility have been conducted in the past few years. In this paper, we describe an approach to supplement the results of such surveys with automated assessments, that can easily be repeated at regular intervals. The software basis is provided by the European Internet Accessibility Observatory (EIAO). We analyse how the data collected by EIAO can be compared to other surveys.

Web standardsWorld Wide WebSoftwarebusiness.industryObservatoryComputer scienceThe InternetInformation societybusinessData scienceWeb accessibility
researchProduct

A tool to estimate usability of Web 2.0 applications

2009

Nowadays, companies and home users use websites offering services ranging from web sites up to complex web applications. The ergonomics of these applications often remain unconsidered and the applications turn out to be hard to use. In this paper, a tool is presented to facilitate the examination of usability. Web 2.0 applications in particular are supported, because they are more flexible and require other techniques than traditional web applications. The paper explains how to collect, analyze, process and visualize usability data for Web 2.0 applications.

Web standardsmedicine.medical_specialtyWeb developmentComputer sciencebusiness.industryWeb engineeringWorld Wide WebWeb Accessibility InitiativeWeb testingWeb designmedicinebusinessWeb usabilityWeb modeling2009 11th IEEE International Symposium on Web Systems Evolution
researchProduct

WiSHFUL : enabling coordination solutions for managing heterogeneous wireless networks

2017

The paradigm shift toward the Internet of Things results in an increasing number of wireless applications being deployed. Since many of these applications contend for the same physical medium (i.e., the unlicensed ISM bands), there is a clear need for beyond-state-of-the-art solutions that coordinate medium access across heterogeneous wireless networks. Such solutions demand fine-grained control of each device and technology, which currently requires a substantial amount of effort given that the control APIs are different on each hardware platform, technology, and operating system. In this article an open architecture is proposed that overcomes this hurdle by providing unified programming i…

Wi-Fi arrayComputer Networks and Communicationsbusiness.industryWireless networkComputer scienceInter-Access Point ProtocolSettore ING-INF/03 - Telecomunicazioni020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessOverhead (computing)IBCNIEEE 802.11e-2005Electrical and Electronic EngineeringOpen architectureUnified programming interfaces network control radio control wishful projectbusinessIEEE 802.11sComputer network
researchProduct

Security in Mobile Wireless Sensor Networks – A Survey

2011

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…

Wi-Fi arrayComputer sciencebusiness.industryWireless networkWireless WANComputer securitycomputer.software_genreKey distribution in wireless sensor networksWireless site surveymobile Wireless Sensor Network security Wireless Sensor NetworkNetwork Access ControlVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile wireless sensor networkElectrical and Electronic EngineeringbusinesscomputerWireless sensor networkComputer networkJournal of Communications
researchProduct

Towards a Dual-mode Adaptive MAC Protocol (DMA-MAC) for Feedback-based Networked Control Systems

2014

Abstract Automated control systems play an important part in many industrial domains and the medium used for communication between devices in these systems is in transition from wired to wireless for cost reasons. Control systems have strict requirements on delay, throughput, and reliability, that vary with time during operation. Addressing these requirements requires predictable and robust protocols to be employed, and they must be adaptive to the varying states of the controlled process. In this article, we propose a dual-mode adaptive medium access control protocol that caters for two main operation modes in control systems: the steady mode operation, and the transient mode operation. We…

Wireless Sensor Actuator NetworksAutomatic controlbusiness.industryComputer scienceReliability (computer networking)Real-time computingThroughputAccess controlEnergy consumptionIndustrial control systemAutomationIndustrial Application.Process ControlAutomationEmbedded systemControl systemGeneral Earth and Planetary SciencesProcess controlbusinessGeneral Environmental ScienceProcedia Computer Science
researchProduct

Supporting scalable video transmission in MANETs through distributed admission control mechanisms

2009

Emerging multimedia applications over mobile devices are becoming very popular, especially over infrastructure wireless networks such as cellular and WLANs. However, providing this kind of services over infrastructureless networks like ad hoc networks presents many additional problems. One of these problems is how to share resources fairly among the users involved. In this article we propose a QoS framework supporting scalable video streaming in mobile ad hoc networks based on distributed admission control and video traffic awareness. Our framework promotes fairness between video flows in terms of resource consumption. It also guarantees a significant reduction of the idle times experienced…

Wireless ad hoc networkComputer scienceWireless networkbusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingMobile ad hoc networkAdmission control:Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Serveis telemàtics i de comunicació multimèdia [Àrees temàtiques de la UPC]Video qualityNetwork congestionVídeo -- TransmissióAd hoc networks (Computer networks) -- Access controlbusinessComputer network
researchProduct

Ensuring the QoS requirements in 802.16 scheduling

2006

IEEE 802.16 standard defines the wireless broadband access network technology called WiMAX. WiMAX introduces several interesting advantages, and one of them is the support for QoS at the MAC level. For these purposes, the base station must allocate slots based on some algorithm. We propose a simple, yet efficient, solution for the WiMAX base station that is capable of allocating slots based on the QoS requirements, bandwidth request sizes, and the WiMAX network parameters. To test the proposed solution, we have implemented the WiMAX MAC layer in the NS-2 simulator. Several simulation scenarios are presented that demonstrate how the scheduling solution allocates resources in various cases. S…

Wireless broadband accessBase stationComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSbusinessWiMAXComputer networkScheduling (computing)Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
researchProduct

WINSE: WiMAX NS-2 extension

2009

IEEE 802.16 standard defines the wireless broadband technology called WiMAX. When compared to other wireless technologies, it introduces many interesting advantages at PHY, MAC, and QoS layers. Heavy simulations are needed to study IEEE 802.16 performance and propose further enhancements to this standard. Link level simulations are not always sufficient, while system level simulators are not always accurate to capture MAC and transport protocol details. We implemented a 802.16 extension for the NS-2 network simulator. It includes upper PHY modeling, almost all the features of the 802.16 MAC layer, as well as the QoS framework. This article describes the implemented features, simulation meth…

Wireless broadbandIEEE 802.11w-2009Computer sciencebusiness.industryInter-Access Point ProtocolQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLink levelIEEE 802.1XNetwork allocation vectorbusinessWiMAXComputer networkProceedings of the Second International ICST Conference on Simulation Tools and Techniques
researchProduct

Supporting a Pseudo-TDMA Access Scheme in Mesh Wireless Networks

2013

Wireless mesh networks appear a promising solution for pro- viding ubiquitous low-cost wireless access, but cannot rely on simple CSMA access protocols because of the critical inefficiencies that arise in topologies with hidden nodes. To overcome these limitations, some important protocol extensions based on synchronization and reservation mechanisms have been ratified. In this paper we show that an alternative approach to the standardiza- tion of new features and signaling messages for mesh networks can be the utilization of programmable nodes able to execute different MAC protocols programmed on the fly. Signaling messages are used only for disseminating the new protocol among the nodes. …

Wireless mesh networkHidden node problembusiness.industryComputer scienceWireless networkSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOrder One Network ProtocolShared meshKey distribution in wireless sensor networkswireless mesh networks synchronization pseudo-TDMA random accessbusinessComputer networkIEEE 802.11sWireless distribution system
researchProduct

Testbed implementation of the meta-MAC protocol

2016

The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…

Wireless mesh networkInter-Access Point ProtocolComputer sciencebusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science (all)020206 networking & telecommunications020302 automobile design & engineeringOrder One Network Protocol02 engineering and technologyWireless LAN controllerWireless Transport Layer Security0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringMedia access controlElectrical and Electronic EngineeringbusinessIEEE 802.11sWireless distribution systemComputer network
researchProduct