The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today's mobile communication networks support not just simple mobile voice and data services but also access to mobile Internet-based services with varying bandwidth and quality-of-service requirements. Step towards NGN leads to heterogeneity and complexity. The rapidly growing demand for “anywhere, anytime” high-speed Internet access will be one of the major forthcoming challenges for mobile network...
The problem of cache sharing for supporting data access in mobile ad hoc networks is studied in this paper. The key to this problem is to discover a requested data item in an efficient manner. In the paper, we propose two caching protocols, IXP and DPIP, which distinguish themselves from the existing ones in that they fully exploit in-zone broadcasts to facilitate cache sharing operation. In particular,...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
More and more users subscribing to wireless broadband services are seeking to have access to both WLAN and UMTS networks. We study individually optimal user-network association in an integrated WLAN and UMTS hybrid cell. The association problem is formulated within a non-cooperative game framework. In the formulation, mobile arrivals are assumed to follow the Poisson process and each mobile considers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.