نتایج جستجو برای: personal communication network

تعداد نتایج: 1080914  

2002
Casey Carter Robin Kravets

MOPED (MObile grouPEd Device) is a network model that treats a user’s set of personal devices as a single, virtual device. The nodes of the MOPED dynamically aggregate available communication resources to provide the user with the best possible network service. We demonstrate MOPED’s resource management capability with a short series of experiments that show how the MOPED paradigm enables effec...

1999
Yoshiaki SHIKATA Shigefusa SUZUKI Yoshitaka TAKAHASHI Takeshi IHARA Takao NAKANISHI

In a personal communication system (PCS), a scheme for reforwarding call-terminating setup messages (SETUP messages) from a network or a cell station is used to guard against their loss. We have developed a method for evaluating the loss probability of a reforwarding scheme in which the network monitors the response messages from a personal station after forwarding a SETUP message to that perso...

Journal: :CoRR 2015
Vibhutesh Kumar Singh Sanjeev Baghoriya Vivek Ashok Bohara

Project Monitomation is a unique implementation which focuses on justifying the capability of smart wireless networks based on IEEE 802.15.4 standard, for low power, short range Personal Area Network (PAN) communication. Through this project wireless text messaging, device control & network monitoring is implemented to demonstrate the future of Internet of things . Keywordsautomation; labview; ...

Journal: :IEEE Personal Commun. 1998
Takehiro Murase Minoru Ohyama

tions technology is about to bring dramatic changes to business and home life. In 1990, NTT announced the Visual Intelligent and Personal (VI&P) communications services plan as its service vision for the beginning of the 21st century [1], as shown in Fig. 1. We are engaged in wide-ranging research and development aiming at creating service systems for diverse applications. The phase 1 experimen...

2017
Erico Leão Carlos Montez Ricardo Moraes Paulo Portugal Francisco Vasques

The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable technology to deploy wide-scale Wireless Sensor Networks (WSNs). These networks are usually designed to support convergecast traffic, where all communication paths go through the PAN (Personal Area Network) coordinator. Nevertheless, peer-to-peer communication relationships may be also required for different types of WSN applications....

The stability of a communication network composed of processing nodes and communication links is of prime importance to network designers. As the network begins losing links or nodes, eventually there is a loss in its effectiveness. Thus, communication networks must be constructed to be as stable as possible, not only with respect to the initial disruption, but also with respect to the possible...

2007
Andreas Heinemann

Motivation. With the increasing integration of wireless short-range communication technologies (Bluetooth, 802.11b WiFi) into mobile devices, novel applications for spontaneous communication, interaction and collaboration are possible. We distinguish between active and passive collaboration. The devices help users become aware of each other and stimulate face-to-face conversation (active collab...

If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.In this paper we discuss...

2011
Pablo Najera Rodrigo Roman Javier López

The secure integration of RFID technology into the personal network paradigm, as a context-aware technology which complements body sensor networks, would provide notable benefits to applications and potential services of the personal network (PN). RFID security as an independent technology is reaching an adequate maturity level thanks to research in recent years; however, its integration into t...

Journal: :CAIS 2007
Alain Cucchi Chantal Fuhrer

This study is about the structure embedded in e-mail relationships. Based on data describing organizational e-mail exchanges, this research deals with organizational structure, personal power, and the centrality of people in a network. Social network analysis is used to study the centralization dimension of the structure embedded in the data. The data concerns 385 employees of 36 firms within a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید