The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of mobile network and corresponding techniques, more and more works focus on providing efficient services based on mobile devices. Furthermore, motivated by IoT, studies of local distributed mobile devices attract attentions of both industry and academia in recent years. However, existing storage systems cannot manage data and support the QoS of mobile services well. This paper...
This paper proposes an algorithm called MACH for coding a hierarchical category structure to enable prefix matching between a publication and a subscription. Compared to fixed-length coding, the MACH algorithm generates shorter code lengths without losing the efficiency of matching. In addition, the MACH algorithm automatically identifies the bits that are not necessary for prefix matching. These...
In this article, the authors study querying binary large objects (blobs) such as video and voice clips in a network of vehicles communicating wirelessly. They introduce a novel paradigm, describe a set of derived query-processing strategies and compare them along three dimensions: push versus pull, whether or not a communication infrastructure is utilized, and whether metadata dissemination is separated...
Hierarchical phrase-based (HPB) translation has been introduced to speech-to-speech (S2S) translation system on mobile terminals, such as smartphones. However, it suffers from the explosive growth in the number of rules along with the increment in decoding time for S2S translation system when the memory and decoding speed is restricted. In this paper, we propose a nesting HPB model to capture the...
In this paper we provide an architecture for Tactical Information Middleware for bandwidth constrained information management. We propose the ideas of rank-based data dissemination, and the use of a tactical information management query language. These ideas will deal with dynamic changes in bandwidth and explore opportunistic data dissemination. Thus, will lead to a cross layer design of a system...
Recently, leaky coaxial cable plays a more and more important role in every kind of blind or semi-blind zone mobile communication, and along with the increase of communication business, the number of frequency band increases, lager communication capacity is needed, so it is necessary to extend the frequency band of leaky coaxial cable. The method of extending the frequency band of leaky coaxial cable...
In this paper, C3G-A (Combining the third generation mobile communication network and Ad hoc network) system is presented. Call Admission Control (CAC) plays an important role in radio resource management of wireless communication networks. It permits or denies the call arrival connection requests based on the certain criteria. To analyze the performance of CAC in C3G-A system, Markov chain model...
The random measuring error of observer position plays an important role in mobile telephone localization, because it may seriously influence the locating performance of traditional methods like Chan, Friedlander, Taylor series etc. This paper presents a method for accomplishing mobile telephone localization when the observer position contains random measuring error. The proposed method establishes...
In this environment each mobile peer has a local database that stores and manages a collection of reports (where each report is a product record, or a coupon), and all the local databases maintained by the mobile peers form a mobile e-commerce (or, more generally, a mobile P2P) database. Queries on this database are posed by potential customers, and they search for coupons and products pertaining...
We propose a medium access control (MAC) protocol for networks that integrated TD-SCDMA and Ad hoc networks. The protocol is collision-free and TD-SCDMAand operates under dynamic and distributed circumstances; it can improve channel utilization rate and increase the number of nodes simultaneously accessible to channel by combining control channel and transmission channel in one slot, and each channel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.