Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cloud radio access network (C-RAN) and mobile edge computing (MEC) have emerged as promising candidates for the next generation access network techniques. Unfortunately, although MEC tries to utilize the highly distributed computing resources in close proximity to user equipments equipments (UE), C-RAN suggests to centralize the baseband processing units (BBU) deployed in radio access networks. To...
In recent years, mobile data gathering in wireless sensor networks has attracted much interests in the research community. However, despite extensive efforts, many of previous work in this area lies only in theory and evaluates network performance with computer simulations, which leaves a large gap from reality. In this paper, we present the design and implementation of a general purpose, flexible...
The development of 5G networks supposes a big challenge for mobile operators in order to satisfy the ambitious objective of delivering broadband services ubiquitously. Based on this, the increasing capabilities of satellite systems have created the consensus that such systems can satisfy the required necessities for several scenarios, such as for rural or low-density populated areas. Used in combination...
In this paper, we suggest a power allocation strategy for the Chase Combining Hybrid Automatic Repeat Request (CC-HARQ) protocol with ultra-reliability constraints. The proposed optimal power allocation scheme would allow us to reach any outage probability target in the finite block-length regime. We cast an optimization problem as minimization of the average transmitted power under a given outage...
In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations...
WiFi networks are vulnerable to rogue AP attacks in which an attacker sets up an imposter AP to lure mobile users to connect. The attacker can eavesdrop on the communication, severely threatening users' privacy. Existing rogue AP detection solutions are confined to some specific attack scenarios (e.g., by relaying the traffic to a target AP) or require additional hardware. In this paper, we propose...
Energy remains a major hurdle in running computation-intensive tasks on wireless sensors. Recent efforts have been made to employ a Mobile Charger (MC) to deliver wireless power to sensors, which provides a promising solution to the energy problem. Most of previous works in this area aim at maintaining perpetual network operation at the expense of high operating cost of MC. In the meanwhile, it is...
Real-time localization of mobile target has been attracted much attention in recent years. With the limitation of unavailable GPS signals in the complex environments, wireless sensor networks can be applied to real-time locate and track the mobile targets in this paper. The multi wireless signals are used to weaken the effect of abnormal wireless signals in some areas. To verify the real-time localization...
We consider the practical problem of video surveillance in public transport systems, where security videos are stored onboard, and a central operator occasionally needs to access portions of the recordings. When this happens, the selected video must be uploaded within a deadline, possibly using multiple parallel wireless interfaces. Interfaces have different associated costs, related to tariffs charged...
Different with the sparseness of moving nodes in delay tolerant network (DTN), the mobile terminals with its short distance wireless interface can also be seen as mobile nodes, which were endowed as agents because of the social properties of their users. A self-organized agent picking (SOAP) network is established that the data with limited-copies can transfer across the SOAP network between random...
Participatory sensing has been emerging as an economical and practical way to collect and share information on the surrounding environment. The information includes both physical data produced by embedded sensors in the smart device and the observation and reasoning from human participants. However, most of the existing participatory sensing applications lack multi-functional capabilities; they are...
The personalization is one of the main success factor in Mobile Commerce. This paper presents the main characteristic for Mobile Commerce and describes factors of personalization in Mobile Commerce, it also shows how these factors affects user satisfaction positively or negatively. The mechanism for personalization and recommendation system used in personalized Mobile Commerce are described. Many...
Packet forwarding plays an important role in inter-vehicle communications. A predicted forwarding is a promising solution to address high mobility issues in a Vehicular Ad-hoc Network (VANET) as it increases the ratio of packet transmissions. The predicted forwarding scheme proposed, termed Vehicular-to-vehicular Urban Network (V2VUNet), is based on an angle measurement between a sender and a receiver...
Recent studies have suggested that the stability of peer-to-peer networks may rely on persistent peers, who dwell on the network after they obtain the entire file. In the absence of such peers, one piece becomes extremely rare in the network, which leads to instability. Technological developments, however, are poised to reduce the incidence of persistent peers, giving rise to a need for a protocol...
Low robustness under mobility is the Achilles' heel of the emerging 60 GHz networking technology. Instead of using omni-directional antennas as in existing Wi-Fi/cellular networks, 60 GHz radios communicate via highly-directional links formed by phased-array beam-forming, so as to upgrade wireless link throughput to multi-Gbps. However, user motion causes misalignment between the Tx's and Rx's beam...
Understanding the mobile user flow flux patterns is important for numerous applications relevant to crowd movement, from information sharing, networking, to security and public health. Particularly in instances of smart buildings and hospitals, among others, the flow between indoor locations, and mobility modeling within buildings is of a prime significance. Much of the mobility modeling studies have...
Challenged Networks (CNs) are characterized by frequent varying network conditions and intermittent connectivity. In general, CNs emerge in different scenarios including the disaster and emergency situations when the traditional cellular infrastructure is dysfunctional or unavailable as well as in the undeserved areas such as rural and developing regions. This paper aims to evaluate the performance...
In mobile communication system, moving terminals have to switch to the network access points frequently due to the flexible mobility of Mobile Station (MS). How to provide an efficient low-cost and real-time service for MS is an important subject of mobility management. Different from the traditional static location management model, a novel dynamic model, based on prediction of users behavior, is...
In opportunistic mobile networks (OppNets), nodes should be in listening state to discover the neighbors for opportunistic message forwarding. While in OppNets, contacts between nodes are sparse, most of nodes' energy is consumed in idle listening state, which highlights the need for energy saving in contact probing. Duty cycle operation can be applied to address this problem. However, it may cause...
The lack of adequate support for multicast hinders the ability of WiFi to deliver high quality video in crowded areas with large number of users. In our recent papers, we presented techniques for low-overhead feedback collection and rate adaptation for WiFi multicast. In this demo, we present a platform for evaluating video delivery over multicast using these techniques. The platform does not require...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.