نتایج جستجو برای: telecommunication terminal

تعداد نتایج: 158861  

2003
Pamela Zave

User requirements for telecommunication systems are difficult to understand because they are obscured by a long history of ad hoc feature development and technological limitations. The presence of a viable modular architecture for telecommunication features gives us a fresh start. Working within this framework, we can discover desirable properties that ought to be requirements for all telecommu...

2001
Jan Lindström Tiina Niklander

As long as there have been databases there has been a large interest in measuring their performance. Therefore, several different benchmarks have been proposed. However, previous proposals do not consider timely response and other telecommunication application requirements. This paper shortly reviews telecommunication requirements and previous work on real-time databases. These requirements are...

1997

The restructuring of telecommunication in Central and Eastern Europe occurs at a time when the classical structures of telecommunication are falling apart worldwide. Coming from the socialist system in which telecommunication did not exist as an independent economic activity, the Eastern European countries have created specific “post-socialist“ modes of reform, often outdoing Western countries ...

1997
H. Hemmati K. Wilson M. K. Sue L. J. Harcke M. Wilhelm C.-C. Chen J. Lesh

We have performed a study on telecommunication systems for a hypothetical mission to Mars. The objective of the study was to evaluate and compare the benefits that microwave—X-band (8.4 GHz) and Ka-band (32 GHz)—and optical communications technologies afford to future missions. The telecommunication systems were required to return data after launch and in orbit at 2.7 AU with daily data volumes...

2012
Xiuquan Qiao Xiaofeng Li Junliang Chen

Network is the bearer of services and services are the soul of network. The convergent network extends the original communications service type and gradually forms new convergent services which integrate the traditional telecommunication services and a large number of value-added services or contents on Internet (Kolberg et al., 2010). The integrated service is essentially to handle the data an...

2000
Hiroshi HARADA Yukiyoshi KAMIO Masayuki FUJISE

In this paper, a new configuration method of multimode software radio system by parameter controlled and telecommunication component block embedded digital signal processing hardware (DSPH) is proposed for the future flexible multimedia communications. In this method, in advance, basic telecommunication component blocks are implemented in the DSPH like DSP and FPGA. And, external parameters, wh...

2005
Gary M. Weiss

Telecommunication companies generate a tremendous amount of data. These data include call detail data, which describes the calls that traverse the telecommunication networks, network data, which describes the state of the hardware and software components in the network, and customer data, which describes the telecommunication customers. This chapter describes how data mining can be used to unco...

Journal: :Journal of Research and Practice in Information Technology 2010
Seongcheol Kim Changi Nam Hyun-Kyung Jung Min-Ho Ryu

Fixed–mobile convergence (FMC) is a radical innovation for telecommunication companies because it requires them to move into unknown territories that are beyond traditional business lines and underlying technologies. In the meantime, understanding what types of telecommunication companies are better at doing business through the early adoption of FMC has become increasingly important in the con...

2001
Cynthia Irvine

We present an overview of our approach to managing security as a dimension of Quality of Service. Relative to traditional QoS attributes (e.g., jitter, deadline, latency) security has been handled rather statically and indirectly. We have developed a theory of Quality of Security Service and a related security-costing framework that supports extension of QoSS functionality to embrace existing a...

2012
Dieter Gollmann

The canonical IT security properties are geared towards infrastructure security. The task of an infrastructure security service is completed once data has been delivered to the application. When false data is submitted to the infrastructure, false data will be delivered securely. To secure an application, one thus may have to go beyond securing the infrastructure and in addition provide mechani...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید