The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of direct device-to-device (D2D) communications is expected to drastically increase the spatial frequency reuse significantly improving the capacity of forthcoming fifth generation (5G) cellular systems. The number of D2D pairs operating within the same channel that can be supported in a certain area of interest is limited by the interference imposed by them on each other. In an inherently...
The mobile devices of today evolve towards offering uninterrupted connectivity while attempting to achieve untethered mobility of their users. Further technological advances in hardware often lead to an increased data consumption. Combining these two factors, we notice that the data rates on the current Internet connections are starting to lag behind. Ultimately, we observe a mismatch between the...
The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT) vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG), become an important direction for industry including telecommunication operators. In most cases,...
Network-assisted device-to-device (D2D) connectivity is a next-generation wireless technology that facilitates direct user contacts in physical proximity while taking advantage of the flexible and ubiquitous control coming from the cellular infrastructure. This novel type of user interactions creates challenges in constructing meaningful proximity-based applications and services that would enjoy high...
Device-to-Device (D2D) communication constitutes an emerging network paradigm that promises to unlock decisive capacity gains without the need for expensive cellular resources. However, while deployment of this promising enabler technology in 5G-grade mobile networks is currently underway, the complete understanding of feasible use cases and their respective limitations has not yet been provided in...
D2D communications is one of the key technologies to enable aggressive spatial frequency reuse in future evolution of cellular systems. While the standardization efforts are far from their final stage there is clear understanding that security is one of the major concerns for proximity services. This is especially the case when one or more communicating stations in a logical cluster do not have an...
The Internet of Things (IoT) employs smart devices as its building blocks for developing a ubiquitous communication framework. It thus supports a wide variety of application domains, including public safety, healthcare, education, and public transportation. While offering a novel communication paradigm, IoT finds its requirements closely connected to the security issues. The role of security following...
This paper presents a conceptual design of a dynamic and personalizable knowledge workspace suitable for collaboration in academic contexts. The concept of such workspace is aimed to cater the needs of students — as knowledge workers — for flexibility in various types of group and individual knowledge tasks. The research is focused on revealing challenges and obstacles faced by students who perform...
Network-assisted device-to-device (D2D) communication is a next-generation wireless technology enabling direct connectivity between proximate user devices under the control of cellular infrastructure. It couples together the centralized and the distributed network architectures, and as such requires respective enablers for secure, private, and trusted data exchange especially when cellular control...
This article attempts to summarize challenges in visualization methods for existing Big Data and beyond. Moreover, it classifies types of data, analytical methods, visualization techniques and tools, known up to date, with a particular emphasis placed on surveying evolution of visualization techniques over the past years. Following the identified shortcomings of the existing techniques, the role of...
This paper studies a widely used wireless technology (IEEE 802.11-2014) and the simulation establishment of the efficient Wireless Local Area Network (WLAN) in modern environment. However, currently used saturation based analysis may be applied only for fair systems, hence, the question arises which system may be considered as fair. Mostly used metric for such an analysis (Jain's Fairness Index) does...
In this paper, we consider a contemporary short-range technology, IEEE 802.11-2012 a.k.a. WiFi, to enable high-speed wireless communication and thus facilitate ubiquitous Wireless Local Area Network (WLAN) connectivity. In particular, we detail our integrated simulation-analytical framework to characterize full-buffer WLAN deployments revealing the impact of many important performance factors, such...
The paper presents an overview of known approaches to evaluate performance of short-range communication technologies, when handling diverse types of traffic, generated by several recently emerging applications. In particular, very specific cases, like machine-to-machine communications, heterogeneous networking and device-to-device communications are considered. These scenarios have some specific traffic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.