The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
XML has become a standard widely used in wireless networking technologies to improve flexibility and interoperability between heterogeneous applications. However, applying this technology to areas such as network management across a wireless embedded internet can pose significant challenges due to the verbosity of XML. A number of compression techniques and tools have been applied to this problem...
With the rapidly gaining ground of the Internet of things, wireless sensor networks (WSNs) will be bound to permeate more and more applications. However, due to the nature of these applications such as harsh environment, resource-limited wireless sensor networks are usually fault prone. Therefore, it is essential to provide effective fault management techniques and robust fault management frameworks...
Video based monitoring system plays an important role in asset management. However, transmission of video data occupies large amount of bandwidth, especially in wireless communication environment. On the same time, searches and storage of video data is a troublesome problem in after-event investigation. This paper studies a non-video monitoring system which is based on RFID and sensors. The system...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.