Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
To alleviate the pressure brought by the explosion of mobile video traffic on present cellular networks, small cell base stations (SBS) with caching ability are introduced. In this paper, we consider the caching strategy using network coding for mobile users over heterogeneous wireless network containing SBSs. We formulate an integer programming problem to minimize the average number of packets downloaded...
Named Data Networking (NDN) is a future Internet architecture suitable for Vehicular Ad Hoc Networks (VANETs), since it provides solutions to frequent topology changes in VANETs. In NDN messages are exchanged according to their content and not to the location of the hosts. SDN provides centralized network control. This paper presents use cases for vehicular NDN scenarios, where SDN is a suitable solution...
Mainly due to exponential growth in smart devices based mobile computing, the access networks are gaining tremendous momentum. Software defined networking (SDN), along with cloud computing and virtualization techniques, is considered as a major step forward from the conventional networking. Although SDN is being widely deployed in the data centers and enterprise networks, its adaptation in wireless...
In this work, a game theoretical approach for addressing the virtual network service providers (NSPs), small cell provider (SCP) and user interaction in heterogenous small cell networks is presented. In particular, we consider the users can select the services of different NSPs based on their prices. The NSPs have no dedicated hardware and need to rent from the SCP in term of radio resources, e.g...
One of the most important design problems for the multi unmanned aerial vehicles systems is communication between UAVs. In a multi-UAV system, the communication between UAVs is provided with all UAVs connecting directly to the ground station via satellite or infrastructure. However, infrastructure or satellite-based communication architectures restrict the capabilities of the multi-UAV systems. Infrastructure...
A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect...
It is well known that virtual private network (VPN) and intrusion prevention system (IPS) are all important network security schemes. Traditionally, both VPN and IPS need a clear network margin. However, now the rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. It is a noteworthy problem how to display wireless IPS (WIPS). Because...
The integration of heterogeneous wireless networks has been studied for some time. Wireless networks can be complementary by providing additional resources to one another if properly integrated. For example, 3G networks offer increased coverage, but they have a low capacity for data transmission. In contrast, WLANs (Wireless Local Networks) offer a limited coverage range while allowing high rates...
Along with the rapid development of 3rd generation mobile communication technologies, the applications of M-Commerce have been greatly expanded. Based on the research and analysis of the J2ME platform, this paper proposes a secure architecture for M-Commerce systems under the 3G networks. The proposed solution is the combination of J2EE and J2ME capabilities based on the three-tier architecture, as...
With the increase of the demands of mobile multimedia services, the real-time multimedia services such as IPTV often require the support of Mobile Multimedia Multicast (MMM) communications in the IP-based wireless networks. Since the MMM services often require a strict delay-bounded transport that guarantees quasi error free (QEF) transmission, we will investigate how to satisfy the QEF requirements...
In a thin client computing environment, applications run on server farms and are accessed through thin client protocols like Remote Frame Buffer (RFB), or Remote Desktop Protocol (RDP). Although they work well in high and stable bandwidth networks, thin client protocols require some modifications to adapt to the varying characteristics of wireless networks and to reduce the energy consumption of thin...
IP technology will play a key role in next generation wireless networks, which face the great challenge of integration in order to provide seamless service to users anywhere and anytime. On the basis of the architecture for Qos in next generation wireless network, a coordinated call admission control mechanism was presented, providing an end-to-end RSVP context transfer for real-time applications...
In recent years, the mobile equipments with powerful functions and convenient service feature are getting more and more popular. Those mobile equipments not only provide us many types of wireless network connections services but also with one of popular service which is video streaming. However, the most concerned problem is handover between networks during the video streaming transmission. So we...
Recent advances in mobile wireless networks allow handheld devices, such as smart phones, pocket PCs, to connect to the Internet and use the distributed applications conveniently. And the model of software as a service enables the handheld devices to use the applications which previously run on PCs or servers. However, the mobile wireless environment is dynamic and resource-limited. It needs an efficient...
The location-based services (LBS) are progressed from wireless mobile service and the spatial information service. Wireless communication is one of the most crucial components in the development of LBS applications. The cognitive networks are developed to enhance the adaptation limited by current different kinds of network technologies. This paper proposes a kind of new LBS architecture transmitting...
New advances in mobile computer technology, along with rapid growth of quality and quantity of wireless networks, introduce new capabilities, applications, and concerns to computer science and industry. Mobile payment, in which mobile customers use their phones for performing financial transactions, is a promising and exciting domain that has been rapidly developing recently. Although different mobile...
As heterogeneous wireless networks are deployed and users need more flexible mobility services, there has been a lot of research work about interworking mechanism between widely deployed 3G network and rapidly boarded WLAN. On the other side, WiBro is newly commercialized in Korea as the next generation wireless network. WiBro is based on IEEE 802.16e and it is expected to provide enough mobility...
In the past few years, many new mobile technologies including the 3G, WiFi or mobileTV have created unprecedented learning opportunities on mobile devices. Furthermore, such technologies continuously fuel the rapid growth of new fields of research like the edutainment for educational entertainment. In a recent project awarded by the Hong Kong Wireless Development Center, we have developed a mobile...
In recent years, security has become a major concern in ad hoc network technology. It has unique characteristics that make new challenges arise compared to its wired networks or traditional wireless networks counterpart. Due to these unique characteristics, the traditional intrusion detection techniques for wired networks and wireless networks are not well suited for ad hoc networks. In this paper,...
New Advances in mobile computer technology and the rapid growth of wireless networks in quality and quantity has introduced new applications and concerns in computer science and industry. The unique requirements and constraints associated with mobile systems have brought new challenges to software development for such environments, as it demands extensive improvements to traditional systems development...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.