نتایج جستجو برای: access network
تعداد نتایج: 953073 فیلتر نتایج به سال:
This paper investigates the potential impacts caused by Call Admission Control (CAC) mechanism of the air interface on simulations carried out for the transport network domain of UMTS Radio Access Network. Independent from the TNL CAC mechanism of the transport network which is in charge of Iub link bandwidth, the Radio CAC function deals with the highly non-linear resources needed for an attem...
Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms. To best support these technologies, next generation systems must provide a centralized service for securely selecting, collecting, and evaluating integrity measurements. Centralization of M&A avoids duplication, minimizes security risks to the system, and ensu...
The Project Authorization Request (PAR) for the IEEE P1900.4 Working Group (WG), under the IEEE Standards Coordinating Committee 41 (SCC41) was approved in December 2006, leading to this WG being officially launched in February 2007 [1]. The scope of this standard is to devise a functional architecture comprising building blocks to enable coordinated network-device distributed decision making, ...
Massive Machine-Type Communications (mMTC) presents significant challenges in terms of the number of devices accessing the shared resource, and coordination among those devices. This paper overviews work on RAN congestion control in order to better manage resources in the context of device-to-device (D2D) interaction among the MTCDs. It then proceeds to introduce a novel grouping-assisted rando...
Malicious root-kits modify the in-memory state of programs executing on an endpoint to hide themselves from security software. Such attacks negatively affect network-based security frameworks that depend on the trustworthiness of endpoint software. In network access control frameworks this issue is called the lying-endpoint problem, where a compromised endpoint spoofs software integrity reports...
The existence of online social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community organization. On the other hand, security and privacy concerns need to be addressed for creating such applications. Improving social network access control systems appears as the first step toward addressing the existing ...
With the nation’s increasing awareness of the importance of securing the computer/communication infrastructure of process control systems (PCS), recommendations for their configuration have appeared, most notably NIST Special Publication SP-800-82 [1]. Some of these recommendations concern network connectivity, specifically describing near isolation of some subnetworks from the PCS. Security me...
Two mechanisms have been proposed independently by IEEE and 3GPP; namely, Media Independent Handover (MIH) and Access Network Discovery and Selection Function (ANDSF), respectively. These mechanisms enable a seamless Vertical Handover (VHO) between the different types of technologies (3GPP and non-3GPP), such as GSM (Global System for Mobile Communication), Wireless Fidelity (WiFi), Worldwide I...
This long-lasting point in his life due to economic developments, social and cultural development of the Industrial Revolution, the foundation has been transformed. Today, the need for rehabilitation and restoration of these islands what the city increases, the need to develop a coherent and logical connection between the old and new areas to preserve and enhance the integrity and identity of...
Hybrid Fiber-Wireless (FiWi) networks become rapidly mature and represent a promising candidate for reducing power consumption, costs, and bandwidth bottlenecks of next-generation broadband access networks. Two key FiWi technologies with similar design goals are Ethernet Passive Optical Network (EPON) and WiMAX. In this paper, we develop a powerful and flexible techno-economic analysis to compa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید