The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent work shows that Cooperative Data Exchange (CDE) with network coding can significantly improve wireless performance, especially in data exchange scenario. Moreover, wireless networks are now capable of supporting time critical applications, e.g., video streaming. Such time-critical applications usually impose a deadline on the packet reception, i.e., beyond which, the packet is useless or invalid...
In recent years, the drive for the Healthcare Monitoring Application (HMA) aims to provide continuous remote monitoring of a patient's health. For this to happen, the sensors in the monitoring component of the Body Area Wireless Sensor Networks (BAWSN) need to continuously send data to a Healthcare Application. We show that to provide continuous health data, the BAWSN depends on the collective data...
FlexRay is a new high bandwidth communication protocol for automotive systems, providing time-triggered transmission of periodic frames in a static segment and priority-based scheduling in a dynamic segment. Analysis techniques are required to compute bounds for the FlexRay frame response times, before the standard is used for safety- and time-critical applications. Moreover, the design of a FlexRay...
Real-time database systems can have security constraints in addition to timing constraints. Such real-time systems are typically contained in environments that exhibit hierarchical propagation of information, where mandatory access control for security is required. Conventional multi-level secure database models that implement mandatory access control are inadequate for time-critical applications...
Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications...
The demand for Internet connectivity has grown exponentially in the past few years. Moreover, the advent of new services such as Voice over IP (VoIP), Video on Demand (VOD) and Videoconferencing applications have caused a sever increase in traffic, which makes it extremely hard to ensure an acceptable level of quality. This is mainly attributed to current routing strategies, such as Link State (LS)...
Ubiquitous and pervasive computing systems are characterized by intelligent sensing and computing. These systems seamlessly understand and respond to the environment with little human intervention. Since such systems are required to be small and inobtrusive, embedded systems play an important role in their design. Furthermore, these systems need to run sophisticated applications in a resource constrained...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.