Gotowa bibliografia na temat „Mobile networks”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Mobile networks”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Mobile networks"

1

S, Durga Devi, i Mythrae R. "The Mathematics of Mobile Networks". International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (28.02.2019): 795–97. http://dx.doi.org/10.31142/ijtsrd21492.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Ray, Shweta. "Intelligent-Driven Green Resource Allocation for Industrial Internet of Things In 5g Heterogeneous Network". International Journal for Research in Applied Science and Engineering Technology 10, nr 7 (31.07.2022): 55–67. http://dx.doi.org/10.22214/ijraset.2022.45161.

Pełny tekst źródła
Streszczenie:
Abstract: Mobile networks' energy consumption is rising in tandem with the volume of traffic and the number of people utilising mobile technology. To maintain the long-term survival of the next generation of mobile networks, there must be an emphasis on energy efficiency. By minimising the network's power consumption and proposing an energy-efficient network architecture, this thesis addresses the issue of increasing 5G and beyond network efficiency. The first component of this thesis focuses on base stations (BSs), the most energy-intensive part of mobile networks. Mobile network providers offer us with a data set that contains information on the amount of traffic on their system. The poor temporal granularity of mobile network traffic data makes it difficult to train ML systems for sleep mode management choices. Bursty arrivals are taken into consideration while generating mobile network traffic statistics.
Style APA, Harvard, Vancouver, ISO itp.
3

Zavlanos, Michael M., Alejandro Ribeiro i George J. Pappas. "Network Integrity in Mobile Robotic Networks". IEEE Transactions on Automatic Control 58, nr 1 (styczeń 2013): 3–18. http://dx.doi.org/10.1109/tac.2012.2203215.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kwun Han i S. Ghosh. "Going mobile [mobile-computing networks]". IEEE Circuits and Devices Magazine 14, nr 1 (1998): 10–22. http://dx.doi.org/10.1109/101.648595.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Fu Jie Tey, Fu Jie Tey, Tin-Yu Wu Fu Jie Tey, Yueh Wu Tin-Yu Wu i Jiann-Liang Chen Yueh Wu. "Generative Adversarial Network for Simulation of Load Balancing Optimization in Mobile Networks". 網際網路技術學刊 23, nr 2 (marzec 2022): 297–304. http://dx.doi.org/10.53106/160792642022032302010.

Pełny tekst źródła
Streszczenie:
<p>The commercial operation of 5G networks is almost ready to be launched, but problems related to wireless environment, load balancing for example, remain. Many load balancing methods have been proposed, but they were implemented in simulation environments that greatly differ from 5G networks. Current load balancing algorithms, on the other hand, focus on the selection of appropriate Wi-Fi or macro & small cells for Device to Device (D2D) communications, but Wi-Fi facilities and small cells are not available all the time. For this reason, we propose to use the macro cells that provide large coverage to achieve load balancing. By combing Generative Adversarial Network (GAN) with the ns-3 network simulator, this paper uses neural networks in TensorFlow to optimize load balancing of mobile networks, increase the data throughput and reduce the packet loss rate. In addition, to discuss the load balancing problem, we take the data produced by the ns-3 network simulator as the real data for GAN.</p> <p>&nbsp;</p>
Style APA, Harvard, Vancouver, ISO itp.
6

Nada, Fayza A. "Steady State Analysis of Base Station Buffer Occupancy in a Cellular Mobile System". Journal of Computer Networks and Communications 2023 (23.03.2023): 1–13. http://dx.doi.org/10.1155/2023/1364824.

Pełny tekst źródła
Streszczenie:
The 3rd generation partnership project (3GPP) standards organizations makes great efforts in order to reduce the latency of 5G mobile networks to the least possible extent. Recently, these networks are associated with big buffers to maximize the network utilization and minimize the wasted wireless resources. However, in existence of the TCP congestions, having bottlenecks are still expected on radio access networks (RANs) data paths. Consequently, this influences the network performance and reduces its quality of services (QoSs). Apparently, studying and improving the behavior of buffers deployed at 5G mobile networks devices can contribute to solving these problems (at least by reducing the queuing time at these buffers). In this paper, we study the buffer behavior of base stations in a 5G mobile network at steady state. We consider a cellular mobile network consisting of finite number of users (stations, terminals, and mobiles). At any time-slot, a station may be using the channel (busy) or not using the channel (idle). Since system analysis of cellular mobile networks in general form is rather complex, solutions are always obtained in closed forms or by numerical techniques. A two-dimensional traffic system for cellular mobile networks is presented, and the main performance evaluations are derived. Moreover, different moments of the base station buffer occupancy are calculated. The study reveals that there is a correlation between the state of the mobile stations (busy or idle) and the expected buffers occupancy of the base station. In addition, the results discussions demonstrate some important factors and parameters that affect the base station buffers and the overall network performance. These factors can be further worked on and controlled to obtain the least possible latency in next generation mobile networks.
Style APA, Harvard, Vancouver, ISO itp.
7

Mohan, Seshadri, Nitin Agarwal i Ashutosh Dutta. "Social networks meet mobile networks". IEEE Communications Magazine 50, nr 6 (czerwiec 2012): 72–73. http://dx.doi.org/10.1109/mcom.2012.6211488.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sugumaran, Vijayan, Shriram Raghunathan i K. Vivekanandan. "Mobile Community Networks". International Journal of Mobile Computing and Multimedia Communications 1, nr 2 (kwiecień 2009): 61–79. http://dx.doi.org/10.4018/jmcmc.2009040105.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wang, You-Chiun. "Mobile Sensor Networks". ACM Computing Surveys 47, nr 1 (lipiec 2014): 1–36. http://dx.doi.org/10.1145/2617662.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Campbell, Andrew T., Michael E. Kounavis i Raymond R. F. Liao. "Programmable mobile networks". Computer Networks 31, nr 7 (kwiecień 1999): 741–65. http://dx.doi.org/10.1016/s0169-7552(98)00298-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Mobile networks"

1

Cheng, Jerry. "Collaborative network security for heterogeneous mobile networks". Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132471&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Glidden, Todd P. "Privacy for mobile networks via network virtualization". Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FGlidden.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Singh, Gurminder ; Gibson, John. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Privacy, mobile networks, first responders, mobile file sharing, data dissemination. Includes bibliographical references (p. 47-49). Also available in print.
Style APA, Harvard, Vancouver, ISO itp.
3

Suárez, Trujillo Luis Carlos. "Securing network slices in 5th generation mobile networks". Thesis, Brest, 2020. http://www.theses.fr/2020BRES0050.

Pełny tekst źródła
Streszczenie:
Le « network slicing » est la pierre angulaire pour la conception et le déploiement de services de communication à forte valeur ajoutée qui seront supportés par les nouveaux cas d’usage introduits par la nouvelle architecture 5G. Ce document souligne le défi que représente l’isolation des « network slices », et la gestion de sa sécurité en fonction des politiques retenues.Tout d’abord, un nouveau modèle de contrôle d’accès a été créé. Il permet de sécuriser les interactions entre les fonctions réseaux supportées par les systèmes 5G. Ensuite, la gestion des interactions entre les «network slices » a été abordée. On utilise le concept de chaînes de « network slices », qui seront mises en oeuvre après validation des contraintes de sécurité selon la politique choisie. Enfin, une méthode de quantification de l’isolation a été mise au point, permettant de connaître le degré d’isolation d’un service de communication offert via des « network slices». Cela permet aux opérateurs de réseau et aux clients de mesurer le degré d’isolation, puis d’améliorer la configuration des « network slices » afin de le renforcer. Ces éléments établissent un cadre solide contribuant à sécuriser, verticalement, les services de communication d’un réseau 5G et à évaluer le degré de sécurité en ce qui concerne leurs interactions et leur isolation
Network slicing is a cornerstone in the conception and deployment of enriched communication services for the new use cases envisioned and supported by the new 5G architecture.This document makes emphasis on the challenge of the network slicing isolation and security management according to policy. First, a novel access control model was created, that secures the interactions between network functions that reside inside the 5G system. Then, the management of the interactions between network slices was addressed. We coin the concept of network slice chains, which are conceived after security constraint validation according to policy. Lastly, a method to quantify isolation was developed, permitting to find out how well isolated a communication service is, which is offered via network slices. This enables network operators and customers to measure the isolation level and improve the configuration of the network slices so the isolation level can be enhanced. These components establish a solid framework that contributes to secure, vertically, the communication services of a 5G network and assess how secure they are with respect to their interactions and isolation
Style APA, Harvard, Vancouver, ISO itp.
4

Moessner, K. "Reconfigurable mobile communication networks". Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/844245/.

Pełny tekst źródła
Streszczenie:
Telecommunication technologies and networks are constantly changing; with the introduction of the GSM system the shift from wired to wireless telephony experienced a unique boom. Since then, behaviour and communication needs of users (i.e. subscribers) have undergone rapid changes from initially the need for pure wireless voice transmission to now data and multimedia content traffic. Introduction of the 3rd Generation (UMTS/IMT 2000) promised the delivery of these services and the integration with the Internet. However, legacy technologies and networks are not likely to be replaced soon, the different wireless and wired communication and information infrastructures will co-exist and will have to work, seemingly seamless, together. The here documented research work delivers basic mechanisms supporting this integration, therefore a variety of technologies from different areas, ranging from Software Radio technology to Object-Oriented computing, have been brought together to introduce reconfigurability to mobile communication networks. Distributed object computing technologies are evaluated and their application as signalling and support platforms for reconfigureable systems is shown in different examples. Other novelties are the introduction of a protocol for download of reconfiguration software, from various software sources, these sources include Smart Cards, wired outlets and Over-The-Air. Furthermore, an object-oriented framework for flexible, 'on-the-fly' protocol exchange has been developed; the mechanisms and architecture of this framework are described within this thesis. Combining protocol reconfiguration, software download and distributed platforms and focusing on control and management of reconfiguration have led to the design and definition of a reconfiguration management architecture. Functionality and structure of this architecture are documented, and its single modules are described. Providing means and mechanisms enabling management and control of reconfiguration within reconfigureable mobile communication networks is the purpose of this thesis. KM, Guildford, July 2001 Key words: reconfiguration, reconfiguration management. Software Radio, object-orientation, middleware, CORBA, Universal Control CHannel.
Style APA, Harvard, Vancouver, ISO itp.
5

Dengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents". Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Cullen, Cionaith. "Network and signalling aspects of satellite personal communication networks". Thesis, University of Surrey, 1995. http://epubs.surrey.ac.uk/842984/.

Pełny tekst źródła
Streszczenie:
The use of satellites for mobile communication applications has become a global issue. The use of handheld, vehicle mounted and transportable terminals is a key feature of Satellite Personal Communication Networks (S-PCNs). Due to the higher eirp requirements on the Earths surface and also because of their inherent delay, geostationary (GEO) satellites are not considered suitable for such applications. Instead, constellations of satellites at lower altitudes have been proposed for use in what are termed 2nd generation mobile satellite communication systems. Low intensity regions in the Earths surrounding trapped radiation bands, have resulted in two altitude bands of specific interest, resulting in two constellation types - LEO (Low Earth Orbit) constellations at around 1,000 km and MEO (Medium Earth Orbit) constellations at around 10,000 km. A satellite constellation consists of a number of satellites orbiting at the same altitude and inclination and phased in a specific way. The work reported in this thesis proposes a network control architecture for LEO or MEO based S-PCN systems. Air-interface signalling aspects are then considered for mobility management and call setup signalling. LEO and MEO constellation design aspects and properties are initially considered. Important implications on the control network are drawn based on constellation coverage and connectivity properties. Other system constraints such as terrestrial network interworking considerations as well as user, network operator and regulator requirements are also considered. Finally network and more specifically satellite control signalling is examined before a S-PCN architecture is proposed. The reference architecture results in constellation control being distributed globally with individual satellite control, at any one time, being located at a specific earth station. The use of two earth station types allows network administration to be separated from traffic channel carrying aspects. In order to reduce system setup cost and delay, the reuse of network related standards from the GSM terrestrial mobile communication system is envisaged. An equivalence is made between the S-PCN architecture and the GSMs terrestrial architecture. Network implementation aspects are considered for a 14 satellite MEO constellation. Network implications resulting from the use of LEO and MEO constellations are considered. After an examination of S-PCN traffic demand on a MEO constellation, mobility management signalling is considered. A new approach is proposed based on the use of a positioning system. The performance of this approach is examined from a system signalling viewpoint for both LEO and MEO constellations and a method to minimise the required amount of signalling is described. The air interface signalling procedure for location update, based on a modified GSM network layer protocol, is simulated from a delay point of view for both LEO and MEO constellations. User-originated, user-terminated and user-to-user call setup signalling were also simulated and their delay performance examined. The importance of random access channel delay and of user cooperation with the link were highlighted as aspects which have a significant influence on the average signalling delay. Finally, the effect of common and dedicated control channel system signalling on satellite power consumption, based on busy hour call setup and mobility management signalling estimates, was examined for a MEO constellation. From this, conclusions can be made on the signalling power efficiency of S-PCN systems.
Style APA, Harvard, Vancouver, ISO itp.
7

Trullols, Cruces Oscar. "Information dissemination in mobile networks". Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/276176.

Pełny tekst źródła
Streszczenie:
This thesis proposes some solutions to relieve, using Wi-Fi wireless networks, the data consumption of cellular networks using cooperation between nodes, studies how to make a good deployment of access points to optimize the dissemination of contents, analyzes some mechanisms to reduce the nodes' power consumption during data dissemination in opportunistic networks, as well as explores some of the risks that arise in these networks. Among the applications that are being discussed for data off-loading from cellular networks, we can find Information Dissemination in Mobile Networks. In particular, for this thesis, the Mobile Networks will consist of Vehicular Ad-hoc Networks and Pedestrian Ad-Hoc Networks. In both scenarios we will find applications with the purpose of vehicle-to-vehicle or pedestrian-to-pedestrian Information dissemination, as well as vehicle-to-infrastructure or pedestrian-to-infrastructure Information dissemination. We will see how both scenarios (vehicular and pedestrian) share many characteristics, while on the other hand some differences make them unique, and therefore requiring of specific solutions. For example, large car batteries relegate power saving techniques to a second place, while power-saving techniques and its effects to network performance is a really relevant issue in Pedestrian networks. While Cellular Networks offer geographically full-coverage, in opportunistic Wi-Fi wireless solutions the short-range non-fullcoverage paradigm as well as the high mobility of the nodes requires different network abstractions like opportunistic networking, Disruptive/Delay Tolerant Networks (DTN) and Network Coding to analyze them. And as a particular application of Dissemination in Mobile Networks, we will study the malware spread in Mobile Networks. Even though it relies on similar spreading mechanisms, we will see how it entails a different perspective on Dissemination.
Style APA, Harvard, Vancouver, ISO itp.
8

Zincir, Ibrahim. "Behavioural profiling in mobile networks". Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/884.

Pełny tekst źródła
Streszczenie:
In the last 20 years mobile devices gained an important role in daily life and became must have items for everyone. As mobile devices give us the much needed flexibility and mobility, they also represent one major concern; security. As the information is transmitted from node to node via radio frequencies, an imposter can gain access into a mobile network without the need to gain physical access to firewalls and gateways. Also, as they are light and small, mobile devices are easily lost and often used without any PIN or password protection enabled. Hence, it is not difficult for someone even without any technical knowledge to gain access to such devices if they have been left behind or stolen. As traditional intrusion detection systems are not very effective against this kind of attack, there is a need of a different approach that can assist in the identification of a potential imposter. This thesis begins by assessing the security needs of the mobile devices, and establishes the perceived inadequacy of existing safeguards in this respect. Therefore this research considers using Behaviour-Based Mobile Intrusion Detection System (BeMIDS) that aims to assist the identification of anomalous user activity. This in return presents the two main characteristics needed to classify a legitimate user inside a mobile network: first with whom, when and what type of connection is established and then at where the mobile device is left open. After this the research proposes a novel approach that investigates the application of three machine learning algorithms to profile user behaviour in mobile networks. In BeMIDS, historical user profiles are created and then compared with the real-time ones in order to detect unusual activity in mobile networks. If a user’s behaviour changes, this results in alerting the system as an anomalous activity. Specific examples of behaviours that BeMIDS appears to be particularly sensitive to include duration (of calls and of connection with cell towers), time of day (calls are made and cell towers are connected), and frequency of caller usage. In order to classify a legitimate user over a mobile network the thesis then validates this approach by implementing C4.5, RIPPER and SOM algorithms over MIT’s Reality Mining Dataset. The results support the proposed architecture and present accuracy rate as high as 96% for call logs and 94% for tower logs under training conditions.
Style APA, Harvard, Vancouver, ISO itp.
9

Huang, E. "Rethinking mobile ad hoc networks". Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604708.

Pełny tekst źródła
Streszczenie:
This thesis explores the physical layer feasibility, performance and limitations of MANETs through simulation and evaluation of a novel application scenario. The results of the work are intended to help researchers understand how and where MANETs can be used in the future, as well as to better understand physical layer considerations and methods of improving the physical layer performance of large scale, highly mobile MANETs. The thesis also investigates the effect and feasibility of using fixed relay or dispatch points that act as intermediate relays or source/sinks for messages. The results show the relative benefits of using relays vs. dispatch points, as well as the differences owing to the position, configuration and number of fixed points. We are then able to deduce the optimum configuration and type of fixed nodes to use to achieve the best results under various circumstances. Given the limited unlicensed spectrum available and the potentially high number of nodes in a bounded area, it is likely that interference will become a significant limiting factor for performance. The thesis explores this and other related issues to discover the significance of their effects and the necessary bounds for reasonable performance. We also explore the use of various techniques to mitigate these effects. The thesis concludes by investigating the issue of cooperation incentives. Without sufficient nodes cooperating to provide relaying functions, a MANET cannot function properly. Consequently various proposals have been made which provide incentives for individual users of a MANET to cooperate with each other. We examine the drawbacks of currently proposed incentive systems and propose a new solution.
Style APA, Harvard, Vancouver, ISO itp.
10

Assasa, Hany. "Service Mobility in Mobile Networks". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166540.

Pełny tekst źródła
Streszczenie:
In the current mobile network architecture, network traffic between user equipment (UE) and services deployed on the public cloud is tromboned towards the anchor point which could lead to network congestion. Deploying services closer to the UE, for example near the eNodeB, is a potential solution. The services are deployed on small scale data centers connected to, or collocated with the eNodeB, called ’eNodeB-Cloud’ (eNBC). Mobility of UEs presents a challenge for deploying services in an eNBC. When the UE is handed over from one eNodeB to another, seamless migration of UE context between the service instances running in different eNBCs needs to be ensured. In this thesis, we propose a Platform as a Service framework to enable UE context migration between eNBCs. The architecture consists of handover signaling mechanism, network session migration technology, context transfer protocol and a set of APIs towards the service. The evaluation of the prototype implementation shows that virtualization causes some extra delays to the UE context migration time. Whereas when virtualization is omitted, the time taken to migrate a UE context between two eNBCs is in the order of 12 ms on average, which is within the limit of handover interruption time between two LTE-eNodeBs.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Mobile networks"

1

Ansari, Nirwan, i Tao Han. Green Mobile Networks. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119125099.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Pérez, André. Mobile Networks Architecture. Hoboken, NJ USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118562116.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Misra, Sudip, Barun Kumar Saha i Sujata Pal. Opportunistic Mobile Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29031-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Vaezi, Mojtaba, i Ying Zhang. Cloud Mobile Networks. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54496-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Wu, Yulei, Sukhdeep Singh, Tarik Taleb, Abhishek Roy, Harpreet S. Dhillon, Madhan Raj Kanagarathinam i Aloknath De, red. 6G Mobile Wireless Networks. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72777-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Rodriguez, Jonathan, Christos Verikoukis, John S. Vardakas i Nikos Passas, red. Enabling 6G Mobile Networks. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-74648-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Calafate, Carlos T., Xianfu Chen i Yuan Wu, red. Mobile Networks and Management. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94763-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sheriff, R. E., Y. F. Hu, G. Losquadro, P. Conforto i C. Tocci, red. Space/Terrestrial Mobile Networks. Chichester, UK: John Wiley & Sons, Ltd, 2004. http://dx.doi.org/10.1002/0470021039.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Timm-Giel, Andreas, John Strassner, Ramón Agüero, Susana Sargento i Kostas Pentikousis, red. Mobile Networks and Management. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37935-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Agüero, Ramón, Yasir Zaki, Bernd-Ludwig Wenning, Anna Förster i Andreas Timm-Giel, red. Mobile Networks and Management. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52712-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Mobile networks"

1

Hardy, Daniel, Guy Malléus i Jean-Noël Méreur. "Mobile networks". W Networks, 541–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-642-55498-8_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Metsälä, Esa. "Packet Networks". W Mobile Backhaul, 68–127. Chichester, UK: John Wiley & Sons, Ltd, 2012. http://dx.doi.org/10.1002/9781119941019.ch4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Buchanan, W. J. "Mobile Networks". W The Handbook of Data Communications and Networks, 915–33. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4020-7870-5_56.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

auf der Heide, Friedhelm Meyer, Mohan Kumar, Sotiris Nikoletseas i Paul Spirakis. "Mobile Computing, Mobile Networks". W Euro-Par 2002 Parallel Processing, 933–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45706-2_133.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Cheng, Xiang, Luoyang Fang, Liuqing Yang i Shuguang Cui. "Mobile Big Data". W Wireless Networks, 1–11. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96116-3_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Juhola, Arto, Kimmo Ahola, Jarmo Mölsä i Sami Lehtonen. "Mobile Active Overlay". W Active Networks, 416–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40057-5_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Nguyen, Van-Giang, Anna Brunstrom, Karl-Johan Grinnemo i Javid Taheri. "5G Mobile Networks". W A Comprehensive Guide to 5G Security, 31–57. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Al-Shiridah, Ghufran, Maytham Safar i Khaled Mahdi. "Mobile Communication Networks". W Encyclopedia of Social Network Analysis and Mining, 1–10. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4614-7163-9_68-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Al-Shiridah, Ghufran, Maytham Safar i Khaled Mahdi. "Mobile Communication Networks". W Encyclopedia of Social Network Analysis and Mining, 940–50. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-6170-8_68.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Al-Shiridah, Ghufran, Maytham Safar i Khaled Mahdi. "Mobile Communication Networks". W Encyclopedia of Social Network Analysis and Mining, 1348–57. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4939-7131-2_68.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Mobile networks"

1

Jensen, Austin M., i YangQuan Chen. "Mobile Manipulator Networks: Platform Development and Applications". W ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-34412.

Pełny tekst źródła
Streszczenie:
This paper presents a new platform with a team of lab-scale networked mobile robotic manipulators (SumoMote) which merges a mobile manipulator with wireless mobile sensor networks. Many existing platforms built for mobile manipulation are big and expensive. Our SumoMote is built small and inexpensive for applications where quantity is more important than size. The hardware and software of the SumoMote will be described. Then two application scenarios will be presented to illustrate SumoMote’s capability in mobile sensor networks and how the added manipulator can help.
Style APA, Harvard, Vancouver, ISO itp.
2

Lo, Anthony, Weidong Lu, Martin Jacobsson, Venkatesha Prasad i Ignas Niemegeers. "Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks". W 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361778.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lo, Anthony, Weidong Lu, Martin Jacobsson, Venkatesha Prasad i Ignas Niemegeers. "Personal Networks: An Overlay Network of Wireless Personal Area Networks and 3G Networks". W 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340446.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zhao, Guofeng, Dan Li, Chuan Xu, Hong Tang i Shui Yu. "Network dynamics of mobile social networks". W ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883695.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kaur, Kirandeep, i Satinder Kaur. "A Brief Review of Energy Efficient Protocols in Mobile Ad hoc Networks". W International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.36.

Pełny tekst źródła
Streszczenie:
Mobile Ad Hoc Networks (MANETs) is an assemblage of multi-hop wireless mobile nodes that communicate with each other without centralized control and established infrastructure. Energy efficient routing is not merely concerned about less power consumption, it also deals with increasing the time duration in which any network maintains certain performance level. Therefore, power management becomes an essential issue. Considering this, various authors have designed and developed different techniques to enhance the energy efficiency of mobile networks. This paper focuses on the comparative study of different developments and modifications that have been carried out in this field in past decades. It also highlights how these modifications have helped to enhance the network lifetime.
Style APA, Harvard, Vancouver, ISO itp.
6

J. Grahn, Kaj, Göran Pulkkis i Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks". W 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Pełny tekst źródła
Streszczenie:
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.
Style APA, Harvard, Vancouver, ISO itp.
7

Srinivas, Anand, Gil Zussman i Eytan Modiano. "Mobile backbone networks --". W the seventh ACM international symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1132905.1132924.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Marnick, P. "Interconnection - mobile networks". W IEE Colloquium on How to Compete and Connect: Understanding the Engineering of Telecommunications Network Interconnection. IEE, 1997. http://dx.doi.org/10.1049/ic:19970966.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Manner, Jukka, Marko Luoma, Jörg Ott i Jyri Hämäläinen. "Mobile networks unplugged". W the 1st International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1791314.1791325.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Balon, Marc, i Bernard Liau. "Mobile virtual network operator". W 2012 XVth International Telecommunications Network Strategy and Planning Symposium (NETWORKS). IEEE, 2012. http://dx.doi.org/10.1109/netwks.2012.6381694.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Mobile networks"

1

Campbell, Andrew T., i Mischa Schwartz. Supporting QOS in Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2002. http://dx.doi.org/10.21236/ada411151.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Scellato, Giuseppe, Chiara Franzoni i Paula Stephan. Mobile Scientists and International Networks. Cambridge, MA: National Bureau of Economic Research, grudzień 2012. http://dx.doi.org/10.3386/w18613.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Sivalingam, Krishna M. Energy Efficient Network Protocols for Wireless and Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, listopad 2001. http://dx.doi.org/10.21236/ada400626.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2005. http://dx.doi.org/10.21236/ada442751.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2002. http://dx.doi.org/10.21236/ada404365.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Koodli, R. Mobile Networks Considerations for IPv6 Deployment. RFC Editor, lipiec 2011. http://dx.doi.org/10.17487/rfc6312.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Koodli, R. Mobile Networks Considerations for IPv6 Deployment. RFC Editor, sierpień 2011. http://dx.doi.org/10.17487/rfc6342.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2001. http://dx.doi.org/10.21236/ada390176.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Dolev, Shlomi, Seth Gilbert, Limor Lahiani, Nancy Lynch i Tina Nolte. Virtual Stationary Automata for Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2005. http://dx.doi.org/10.21236/ada467098.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Joneckis, Lance, Corinne Kramer, David Sparrow i David Tate. Network Size and Connectivity in Mobile and Stationary Ad Hoc Networks. Fort Belvoir, VA: Defense Technical Information Center, maj 2014. http://dx.doi.org/10.21236/ada618314.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii