The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By RFID (Radio Frequency Identification Technology) technology and internet, IOV (Internet of Vehicles) can extract and use kinds of static or dynamic information from all the vehicles. In addition, it can manage vehicles as well as supporting comprehensive services according to different application demands. Nowadays, IOV needs more composite information including not only basic RFID info but also...
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. Therefore, pervasive applications need a middleware that can detect and act upon any context changes...
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. To achieve this goal, one of the problems is how to continuously monitor/capture and interpret the...
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. To achieve this goal, one of the problems is how to continuously monitor/capture and interpret the...
To enable secondary transmissions in cognitive radio (CR) networks, the medium access control (MAC) protocol design for CR networks is an important but challenging issue. In this paper, we propose a cognitive packet reservation multiple access (Cog-PRMA) protocol for the CR/secondary users (SUs) sharing a common channel with time division multiple access (TDMA) primary users (PUs). This Cog-PRMA protocol...
Both TDMA and CSMA are effective media access protocols, which can also be important elements of more advanced protocols. In this paper, we investigate TDMA and slotted CSMA protocols in a cognitive radio network, where primary users have higher priority than secondary users and secondary users need to monitor the channel to avoid interference to the primary users. It is thus proposed that TDMA is...
Slotted Aloha and carrier sensing multiple access (CSMA) are effective random access protocols, which can also be important elements of more advanced media access protocols. In this paper, we investigate slotted Aloha and CSMA protocols in a cognitive radio network, where primary users have higher priority than secondary users and secondary users need to monitor the channel to avoid interference to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.