The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applying design principles and methodologies constituted in the software domain and being adapted to the complete execution environment provides new perspectives for future multi-radio computers. In order to share the underlying hardware resources efficiently, the overall system architecture and related programming model has to support dynamic behavior and extensive changes in the configuration during...
Reconfigurability is considered the collection of software and cognitive radio technologies that aim to differentiate user perception in volatile radio conditions while optimizing the use of network resources. The realization of equipment reconfiguration through software download and the efficient utilisation of spectrum require coordinated distribution of functionality among the user, control, and...
The course of events in the wireless communications area has driven the research towards the beyond third generation (B3G) systems. The B3G concept leans on the coexistence and co-operation of multiple, dissimilar radio access technologies (RATs). The reconfigurability concept has been developed to accommodate and exploit the advantages offered by B3G systems. Reconfigurability supports the B3G concept...
Reconfiguration will only be accepted and hence become a success in the market if the security requirements of all stakeholders are satisfied adequately. Secure reconfiguration involves device protection, secure software download to defend against potentially malicious software, and secure reconfiguration signalling to prevent manipulation of the reconfiguration process
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.