Academic literature on the topic 'Mobile networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile networks"

1

S, Durga Devi, and Mythrae R. "The Mathematics of Mobile Networks." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (February 28, 2019): 795–97. http://dx.doi.org/10.31142/ijtsrd21492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ray, Shweta. "Intelligent-Driven Green Resource Allocation for Industrial Internet of Things In 5g Heterogeneous Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 55–67. http://dx.doi.org/10.22214/ijraset.2022.45161.

Full text
Abstract:
Abstract: Mobile networks' energy consumption is rising in tandem with the volume of traffic and the number of people utilising mobile technology. To maintain the long-term survival of the next generation of mobile networks, there must be an emphasis on energy efficiency. By minimising the network's power consumption and proposing an energy-efficient network architecture, this thesis addresses the issue of increasing 5G and beyond network efficiency. The first component of this thesis focuses on base stations (BSs), the most energy-intensive part of mobile networks. Mobile network providers offer us with a data set that contains information on the amount of traffic on their system. The poor temporal granularity of mobile network traffic data makes it difficult to train ML systems for sleep mode management choices. Bursty arrivals are taken into consideration while generating mobile network traffic statistics.
APA, Harvard, Vancouver, ISO, and other styles
3

Zavlanos, Michael M., Alejandro Ribeiro, and George J. Pappas. "Network Integrity in Mobile Robotic Networks." IEEE Transactions on Automatic Control 58, no. 1 (January 2013): 3–18. http://dx.doi.org/10.1109/tac.2012.2203215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kwun Han and S. Ghosh. "Going mobile [mobile-computing networks]." IEEE Circuits and Devices Magazine 14, no. 1 (1998): 10–22. http://dx.doi.org/10.1109/101.648595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fu Jie Tey, Fu Jie Tey, Tin-Yu Wu Fu Jie Tey, Yueh Wu Tin-Yu Wu, and Jiann-Liang Chen Yueh Wu. "Generative Adversarial Network for Simulation of Load Balancing Optimization in Mobile Networks." 網際網路技術學刊 23, no. 2 (March 2022): 297–304. http://dx.doi.org/10.53106/160792642022032302010.

Full text
Abstract:
<p>The commercial operation of 5G networks is almost ready to be launched, but problems related to wireless environment, load balancing for example, remain. Many load balancing methods have been proposed, but they were implemented in simulation environments that greatly differ from 5G networks. Current load balancing algorithms, on the other hand, focus on the selection of appropriate Wi-Fi or macro & small cells for Device to Device (D2D) communications, but Wi-Fi facilities and small cells are not available all the time. For this reason, we propose to use the macro cells that provide large coverage to achieve load balancing. By combing Generative Adversarial Network (GAN) with the ns-3 network simulator, this paper uses neural networks in TensorFlow to optimize load balancing of mobile networks, increase the data throughput and reduce the packet loss rate. In addition, to discuss the load balancing problem, we take the data produced by the ns-3 network simulator as the real data for GAN.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Nada, Fayza A. "Steady State Analysis of Base Station Buffer Occupancy in a Cellular Mobile System." Journal of Computer Networks and Communications 2023 (March 23, 2023): 1–13. http://dx.doi.org/10.1155/2023/1364824.

Full text
Abstract:
The 3rd generation partnership project (3GPP) standards organizations makes great efforts in order to reduce the latency of 5G mobile networks to the least possible extent. Recently, these networks are associated with big buffers to maximize the network utilization and minimize the wasted wireless resources. However, in existence of the TCP congestions, having bottlenecks are still expected on radio access networks (RANs) data paths. Consequently, this influences the network performance and reduces its quality of services (QoSs). Apparently, studying and improving the behavior of buffers deployed at 5G mobile networks devices can contribute to solving these problems (at least by reducing the queuing time at these buffers). In this paper, we study the buffer behavior of base stations in a 5G mobile network at steady state. We consider a cellular mobile network consisting of finite number of users (stations, terminals, and mobiles). At any time-slot, a station may be using the channel (busy) or not using the channel (idle). Since system analysis of cellular mobile networks in general form is rather complex, solutions are always obtained in closed forms or by numerical techniques. A two-dimensional traffic system for cellular mobile networks is presented, and the main performance evaluations are derived. Moreover, different moments of the base station buffer occupancy are calculated. The study reveals that there is a correlation between the state of the mobile stations (busy or idle) and the expected buffers occupancy of the base station. In addition, the results discussions demonstrate some important factors and parameters that affect the base station buffers and the overall network performance. These factors can be further worked on and controlled to obtain the least possible latency in next generation mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Mohan, Seshadri, Nitin Agarwal, and Ashutosh Dutta. "Social networks meet mobile networks." IEEE Communications Magazine 50, no. 6 (June 2012): 72–73. http://dx.doi.org/10.1109/mcom.2012.6211488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sugumaran, Vijayan, Shriram Raghunathan, and K. Vivekanandan. "Mobile Community Networks." International Journal of Mobile Computing and Multimedia Communications 1, no. 2 (April 2009): 61–79. http://dx.doi.org/10.4018/jmcmc.2009040105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, You-Chiun. "Mobile Sensor Networks." ACM Computing Surveys 47, no. 1 (July 2014): 1–36. http://dx.doi.org/10.1145/2617662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Campbell, Andrew T., Michael E. Kounavis, and Raymond R. F. Liao. "Programmable mobile networks." Computer Networks 31, no. 7 (April 1999): 741–65. http://dx.doi.org/10.1016/s0169-7552(98)00298-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mobile networks"

1

Cheng, Jerry. "Collaborative network security for heterogeneous mobile networks." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132471&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Glidden, Todd P. "Privacy for mobile networks via network virtualization." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FGlidden.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Singh, Gurminder ; Gibson, John. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Privacy, mobile networks, first responders, mobile file sharing, data dissemination. Includes bibliographical references (p. 47-49). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Suárez, Trujillo Luis Carlos. "Securing network slices in 5th generation mobile networks." Thesis, Brest, 2020. http://www.theses.fr/2020BRES0050.

Full text
Abstract:
Le « network slicing » est la pierre angulaire pour la conception et le déploiement de services de communication à forte valeur ajoutée qui seront supportés par les nouveaux cas d’usage introduits par la nouvelle architecture 5G. Ce document souligne le défi que représente l’isolation des « network slices », et la gestion de sa sécurité en fonction des politiques retenues.Tout d’abord, un nouveau modèle de contrôle d’accès a été créé. Il permet de sécuriser les interactions entre les fonctions réseaux supportées par les systèmes 5G. Ensuite, la gestion des interactions entre les «network slices » a été abordée. On utilise le concept de chaînes de « network slices », qui seront mises en oeuvre après validation des contraintes de sécurité selon la politique choisie. Enfin, une méthode de quantification de l’isolation a été mise au point, permettant de connaître le degré d’isolation d’un service de communication offert via des « network slices». Cela permet aux opérateurs de réseau et aux clients de mesurer le degré d’isolation, puis d’améliorer la configuration des « network slices » afin de le renforcer. Ces éléments établissent un cadre solide contribuant à sécuriser, verticalement, les services de communication d’un réseau 5G et à évaluer le degré de sécurité en ce qui concerne leurs interactions et leur isolation
Network slicing is a cornerstone in the conception and deployment of enriched communication services for the new use cases envisioned and supported by the new 5G architecture.This document makes emphasis on the challenge of the network slicing isolation and security management according to policy. First, a novel access control model was created, that secures the interactions between network functions that reside inside the 5G system. Then, the management of the interactions between network slices was addressed. We coin the concept of network slice chains, which are conceived after security constraint validation according to policy. Lastly, a method to quantify isolation was developed, permitting to find out how well isolated a communication service is, which is offered via network slices. This enables network operators and customers to measure the isolation level and improve the configuration of the network slices so the isolation level can be enhanced. These components establish a solid framework that contributes to secure, vertically, the communication services of a 5G network and assess how secure they are with respect to their interactions and isolation
APA, Harvard, Vancouver, ISO, and other styles
4

Moessner, K. "Reconfigurable mobile communication networks." Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/844245/.

Full text
Abstract:
Telecommunication technologies and networks are constantly changing; with the introduction of the GSM system the shift from wired to wireless telephony experienced a unique boom. Since then, behaviour and communication needs of users (i.e. subscribers) have undergone rapid changes from initially the need for pure wireless voice transmission to now data and multimedia content traffic. Introduction of the 3rd Generation (UMTS/IMT 2000) promised the delivery of these services and the integration with the Internet. However, legacy technologies and networks are not likely to be replaced soon, the different wireless and wired communication and information infrastructures will co-exist and will have to work, seemingly seamless, together. The here documented research work delivers basic mechanisms supporting this integration, therefore a variety of technologies from different areas, ranging from Software Radio technology to Object-Oriented computing, have been brought together to introduce reconfigurability to mobile communication networks. Distributed object computing technologies are evaluated and their application as signalling and support platforms for reconfigureable systems is shown in different examples. Other novelties are the introduction of a protocol for download of reconfiguration software, from various software sources, these sources include Smart Cards, wired outlets and Over-The-Air. Furthermore, an object-oriented framework for flexible, 'on-the-fly' protocol exchange has been developed; the mechanisms and architecture of this framework are described within this thesis. Combining protocol reconfiguration, software download and distributed platforms and focusing on control and management of reconfiguration have led to the design and definition of a reconfiguration management architecture. Functionality and structure of this architecture are documented, and its single modules are described. Providing means and mechanisms enabling management and control of reconfiguration within reconfigureable mobile communication networks is the purpose of this thesis. KM, Guildford, July 2001 Key words: reconfiguration, reconfiguration management. Software Radio, object-orientation, middleware, CORBA, Universal Control CHannel.
APA, Harvard, Vancouver, ISO, and other styles
5

Dengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents." Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cullen, Cionaith. "Network and signalling aspects of satellite personal communication networks." Thesis, University of Surrey, 1995. http://epubs.surrey.ac.uk/842984/.

Full text
Abstract:
The use of satellites for mobile communication applications has become a global issue. The use of handheld, vehicle mounted and transportable terminals is a key feature of Satellite Personal Communication Networks (S-PCNs). Due to the higher eirp requirements on the Earths surface and also because of their inherent delay, geostationary (GEO) satellites are not considered suitable for such applications. Instead, constellations of satellites at lower altitudes have been proposed for use in what are termed 2nd generation mobile satellite communication systems. Low intensity regions in the Earths surrounding trapped radiation bands, have resulted in two altitude bands of specific interest, resulting in two constellation types - LEO (Low Earth Orbit) constellations at around 1,000 km and MEO (Medium Earth Orbit) constellations at around 10,000 km. A satellite constellation consists of a number of satellites orbiting at the same altitude and inclination and phased in a specific way. The work reported in this thesis proposes a network control architecture for LEO or MEO based S-PCN systems. Air-interface signalling aspects are then considered for mobility management and call setup signalling. LEO and MEO constellation design aspects and properties are initially considered. Important implications on the control network are drawn based on constellation coverage and connectivity properties. Other system constraints such as terrestrial network interworking considerations as well as user, network operator and regulator requirements are also considered. Finally network and more specifically satellite control signalling is examined before a S-PCN architecture is proposed. The reference architecture results in constellation control being distributed globally with individual satellite control, at any one time, being located at a specific earth station. The use of two earth station types allows network administration to be separated from traffic channel carrying aspects. In order to reduce system setup cost and delay, the reuse of network related standards from the GSM terrestrial mobile communication system is envisaged. An equivalence is made between the S-PCN architecture and the GSMs terrestrial architecture. Network implementation aspects are considered for a 14 satellite MEO constellation. Network implications resulting from the use of LEO and MEO constellations are considered. After an examination of S-PCN traffic demand on a MEO constellation, mobility management signalling is considered. A new approach is proposed based on the use of a positioning system. The performance of this approach is examined from a system signalling viewpoint for both LEO and MEO constellations and a method to minimise the required amount of signalling is described. The air interface signalling procedure for location update, based on a modified GSM network layer protocol, is simulated from a delay point of view for both LEO and MEO constellations. User-originated, user-terminated and user-to-user call setup signalling were also simulated and their delay performance examined. The importance of random access channel delay and of user cooperation with the link were highlighted as aspects which have a significant influence on the average signalling delay. Finally, the effect of common and dedicated control channel system signalling on satellite power consumption, based on busy hour call setup and mobility management signalling estimates, was examined for a MEO constellation. From this, conclusions can be made on the signalling power efficiency of S-PCN systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Trullols, Cruces Oscar. "Information dissemination in mobile networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/276176.

Full text
Abstract:
This thesis proposes some solutions to relieve, using Wi-Fi wireless networks, the data consumption of cellular networks using cooperation between nodes, studies how to make a good deployment of access points to optimize the dissemination of contents, analyzes some mechanisms to reduce the nodes' power consumption during data dissemination in opportunistic networks, as well as explores some of the risks that arise in these networks. Among the applications that are being discussed for data off-loading from cellular networks, we can find Information Dissemination in Mobile Networks. In particular, for this thesis, the Mobile Networks will consist of Vehicular Ad-hoc Networks and Pedestrian Ad-Hoc Networks. In both scenarios we will find applications with the purpose of vehicle-to-vehicle or pedestrian-to-pedestrian Information dissemination, as well as vehicle-to-infrastructure or pedestrian-to-infrastructure Information dissemination. We will see how both scenarios (vehicular and pedestrian) share many characteristics, while on the other hand some differences make them unique, and therefore requiring of specific solutions. For example, large car batteries relegate power saving techniques to a second place, while power-saving techniques and its effects to network performance is a really relevant issue in Pedestrian networks. While Cellular Networks offer geographically full-coverage, in opportunistic Wi-Fi wireless solutions the short-range non-fullcoverage paradigm as well as the high mobility of the nodes requires different network abstractions like opportunistic networking, Disruptive/Delay Tolerant Networks (DTN) and Network Coding to analyze them. And as a particular application of Dissemination in Mobile Networks, we will study the malware spread in Mobile Networks. Even though it relies on similar spreading mechanisms, we will see how it entails a different perspective on Dissemination.
APA, Harvard, Vancouver, ISO, and other styles
8

Zincir, Ibrahim. "Behavioural profiling in mobile networks." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/884.

Full text
Abstract:
In the last 20 years mobile devices gained an important role in daily life and became must have items for everyone. As mobile devices give us the much needed flexibility and mobility, they also represent one major concern; security. As the information is transmitted from node to node via radio frequencies, an imposter can gain access into a mobile network without the need to gain physical access to firewalls and gateways. Also, as they are light and small, mobile devices are easily lost and often used without any PIN or password protection enabled. Hence, it is not difficult for someone even without any technical knowledge to gain access to such devices if they have been left behind or stolen. As traditional intrusion detection systems are not very effective against this kind of attack, there is a need of a different approach that can assist in the identification of a potential imposter. This thesis begins by assessing the security needs of the mobile devices, and establishes the perceived inadequacy of existing safeguards in this respect. Therefore this research considers using Behaviour-Based Mobile Intrusion Detection System (BeMIDS) that aims to assist the identification of anomalous user activity. This in return presents the two main characteristics needed to classify a legitimate user inside a mobile network: first with whom, when and what type of connection is established and then at where the mobile device is left open. After this the research proposes a novel approach that investigates the application of three machine learning algorithms to profile user behaviour in mobile networks. In BeMIDS, historical user profiles are created and then compared with the real-time ones in order to detect unusual activity in mobile networks. If a user’s behaviour changes, this results in alerting the system as an anomalous activity. Specific examples of behaviours that BeMIDS appears to be particularly sensitive to include duration (of calls and of connection with cell towers), time of day (calls are made and cell towers are connected), and frequency of caller usage. In order to classify a legitimate user over a mobile network the thesis then validates this approach by implementing C4.5, RIPPER and SOM algorithms over MIT’s Reality Mining Dataset. The results support the proposed architecture and present accuracy rate as high as 96% for call logs and 94% for tower logs under training conditions.
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, E. "Rethinking mobile ad hoc networks." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604708.

Full text
Abstract:
This thesis explores the physical layer feasibility, performance and limitations of MANETs through simulation and evaluation of a novel application scenario. The results of the work are intended to help researchers understand how and where MANETs can be used in the future, as well as to better understand physical layer considerations and methods of improving the physical layer performance of large scale, highly mobile MANETs. The thesis also investigates the effect and feasibility of using fixed relay or dispatch points that act as intermediate relays or source/sinks for messages. The results show the relative benefits of using relays vs. dispatch points, as well as the differences owing to the position, configuration and number of fixed points. We are then able to deduce the optimum configuration and type of fixed nodes to use to achieve the best results under various circumstances. Given the limited unlicensed spectrum available and the potentially high number of nodes in a bounded area, it is likely that interference will become a significant limiting factor for performance. The thesis explores this and other related issues to discover the significance of their effects and the necessary bounds for reasonable performance. We also explore the use of various techniques to mitigate these effects. The thesis concludes by investigating the issue of cooperation incentives. Without sufficient nodes cooperating to provide relaying functions, a MANET cannot function properly. Consequently various proposals have been made which provide incentives for individual users of a MANET to cooperate with each other. We examine the drawbacks of currently proposed incentive systems and propose a new solution.
APA, Harvard, Vancouver, ISO, and other styles
10

Assasa, Hany. "Service Mobility in Mobile Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166540.

Full text
Abstract:
In the current mobile network architecture, network traffic between user equipment (UE) and services deployed on the public cloud is tromboned towards the anchor point which could lead to network congestion. Deploying services closer to the UE, for example near the eNodeB, is a potential solution. The services are deployed on small scale data centers connected to, or collocated with the eNodeB, called ’eNodeB-Cloud’ (eNBC). Mobility of UEs presents a challenge for deploying services in an eNBC. When the UE is handed over from one eNodeB to another, seamless migration of UE context between the service instances running in different eNBCs needs to be ensured. In this thesis, we propose a Platform as a Service framework to enable UE context migration between eNBCs. The architecture consists of handover signaling mechanism, network session migration technology, context transfer protocol and a set of APIs towards the service. The evaluation of the prototype implementation shows that virtualization causes some extra delays to the UE context migration time. Whereas when virtualization is omitted, the time taken to migrate a UE context between two eNBCs is in the order of 12 ms on average, which is within the limit of handover interruption time between two LTE-eNodeBs.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mobile networks"

1

Ansari, Nirwan, and Tao Han. Green Mobile Networks. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119125099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pérez, André. Mobile Networks Architecture. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118562116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Misra, Sudip, Barun Kumar Saha, and Sujata Pal. Opportunistic Mobile Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29031-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vaezi, Mojtaba, and Ying Zhang. Cloud Mobile Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54496-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Yulei, Sukhdeep Singh, Tarik Taleb, Abhishek Roy, Harpreet S. Dhillon, Madhan Raj Kanagarathinam, and Aloknath De, eds. 6G Mobile Wireless Networks. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72777-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rodriguez, Jonathan, Christos Verikoukis, John S. Vardakas, and Nikos Passas, eds. Enabling 6G Mobile Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-74648-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Calafate, Carlos T., Xianfu Chen, and Yuan Wu, eds. Mobile Networks and Management. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94763-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sheriff, R. E., Y. F. Hu, G. Losquadro, P. Conforto, and C. Tocci, eds. Space/Terrestrial Mobile Networks. Chichester, UK: John Wiley & Sons, Ltd, 2004. http://dx.doi.org/10.1002/0470021039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Timm-Giel, Andreas, John Strassner, Ramón Agüero, Susana Sargento, and Kostas Pentikousis, eds. Mobile Networks and Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37935-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Agüero, Ramón, Yasir Zaki, Bernd-Ludwig Wenning, Anna Förster, and Andreas Timm-Giel, eds. Mobile Networks and Management. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52712-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mobile networks"

1

Hardy, Daniel, Guy Malléus, and Jean-Noël Méreur. "Mobile networks." In Networks, 541–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-55498-8_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Metsälä, Esa. "Packet Networks." In Mobile Backhaul, 68–127. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781119941019.ch4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buchanan, W. J. "Mobile Networks." In The Handbook of Data Communications and Networks, 915–33. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4020-7870-5_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

auf der Heide, Friedhelm Meyer, Mohan Kumar, Sotiris Nikoletseas, and Paul Spirakis. "Mobile Computing, Mobile Networks." In Euro-Par 2002 Parallel Processing, 933–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45706-2_133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Xiang, Luoyang Fang, Liuqing Yang, and Shuguang Cui. "Mobile Big Data." In Wireless Networks, 1–11. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96116-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Juhola, Arto, Kimmo Ahola, Jarmo Mölsä, and Sami Lehtonen. "Mobile Active Overlay." In Active Networks, 416–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40057-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen, Van-Giang, Anna Brunstrom, Karl-Johan Grinnemo, and Javid Taheri. "5G Mobile Networks." In A Comprehensive Guide to 5G Security, 31–57. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Shiridah, Ghufran, Maytham Safar, and Khaled Mahdi. "Mobile Communication Networks." In Encyclopedia of Social Network Analysis and Mining, 1–10. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4614-7163-9_68-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Shiridah, Ghufran, Maytham Safar, and Khaled Mahdi. "Mobile Communication Networks." In Encyclopedia of Social Network Analysis and Mining, 940–50. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-6170-8_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Shiridah, Ghufran, Maytham Safar, and Khaled Mahdi. "Mobile Communication Networks." In Encyclopedia of Social Network Analysis and Mining, 1348–57. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile networks"

1

Jensen, Austin M., and YangQuan Chen. "Mobile Manipulator Networks: Platform Development and Applications." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34412.

Full text
Abstract:
This paper presents a new platform with a team of lab-scale networked mobile robotic manipulators (SumoMote) which merges a mobile manipulator with wireless mobile sensor networks. Many existing platforms built for mobile manipulation are big and expensive. Our SumoMote is built small and inexpensive for applications where quantity is more important than size. The hardware and software of the SumoMote will be described. Then two application scenarios will be presented to illustrate SumoMote’s capability in mobile sensor networks and how the added manipulator can help.
APA, Harvard, Vancouver, ISO, and other styles
2

Lo, Anthony, Weidong Lu, Martin Jacobsson, Venkatesha Prasad, and Ignas Niemegeers. "Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lo, Anthony, Weidong Lu, Martin Jacobsson, Venkatesha Prasad, and Ignas Niemegeers. "Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Guofeng, Dan Li, Chuan Xu, Hong Tang, and Shui Yu. "Network dynamics of mobile social networks." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaur, Kirandeep, and Satinder Kaur. "A Brief Review of Energy Efficient Protocols in Mobile Ad hoc Networks." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.36.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) is an assemblage of multi-hop wireless mobile nodes that communicate with each other without centralized control and established infrastructure. Energy efficient routing is not merely concerned about less power consumption, it also deals with increasing the time duration in which any network maintains certain performance level. Therefore, power management becomes an essential issue. Considering this, various authors have designed and developed different techniques to enhance the energy efficiency of mobile networks. This paper focuses on the comparative study of different developments and modifications that have been carried out in this field in past decades. It also highlights how these modifications have helped to enhance the network lifetime.
APA, Harvard, Vancouver, ISO, and other styles
6

J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Full text
Abstract:
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.
APA, Harvard, Vancouver, ISO, and other styles
7

Srinivas, Anand, Gil Zussman, and Eytan Modiano. "Mobile backbone networks --." In the seventh ACM international symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1132905.1132924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Marnick, P. "Interconnection - mobile networks." In IEE Colloquium on How to Compete and Connect: Understanding the Engineering of Telecommunications Network Interconnection. IEE, 1997. http://dx.doi.org/10.1049/ic:19970966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manner, Jukka, Marko Luoma, Jörg Ott, and Jyri Hämäläinen. "Mobile networks unplugged." In the 1st International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1791314.1791325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Balon, Marc, and Bernard Liau. "Mobile virtual network operator." In 2012 XVth International Telecommunications Network Strategy and Planning Symposium (NETWORKS). IEEE, 2012. http://dx.doi.org/10.1109/netwks.2012.6381694.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mobile networks"

1

Campbell, Andrew T., and Mischa Schwartz. Supporting QOS in Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada411151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scellato, Giuseppe, Chiara Franzoni, and Paula Stephan. Mobile Scientists and International Networks. Cambridge, MA: National Bureau of Economic Research, December 2012. http://dx.doi.org/10.3386/w18613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sivalingam, Krishna M. Energy Efficient Network Protocols for Wireless and Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, November 2001. http://dx.doi.org/10.21236/ada400626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, December 2005. http://dx.doi.org/10.21236/ada442751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada404365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Koodli, R. Mobile Networks Considerations for IPv6 Deployment. RFC Editor, July 2011. http://dx.doi.org/10.17487/rfc6312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koodli, R. Mobile Networks Considerations for IPv6 Deployment. RFC Editor, August 2011. http://dx.doi.org/10.17487/rfc6342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2001. http://dx.doi.org/10.21236/ada390176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dolev, Shlomi, Seth Gilbert, Limor Lahiani, Nancy Lynch, and Tina Nolte. Virtual Stationary Automata for Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada467098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Joneckis, Lance, Corinne Kramer, David Sparrow, and David Tate. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada618314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography