11,351 Hits in 6.1 sec

"WBC over DVB-H" Testbed Design, Development and Results

Zhanlin Ji, Ivan Ganchev, Máirtín O'Droma
2010 EURASIP Journal on Wireless Communications and Networking  
A three-layer system architecture of WBCs established over the digital video broadcasting-handheld (DVB-H) standard is presented.  ...  The WBCs are used by the service providers to broadcast advertisements of their (wireless) services to the mobile terminals so that the mobile users may discover and associate with the "best" services  ...  Acknowledgment This publication has been supported by the Irish Research Council for Science, Engineering and Technology (IRCSET), and the Telecommunications Research Centre, University of Limerick, Ireland  ... 
doi:10.1155/2010/769683 fatcat:whxxlds2kbak7dmnmrgq2tgl6u

Page 288 of SMPTE Motion Imaging Journal Vol. 106, Issue 5 [page]

1997 SMPTE Motion Imaging Journal  
Richardson Level-2 architecture. provide access for local media suppli- ers, such as school sports programs or local advertisers.  ...  There is also software for extracting data for off-line analysis and reporting.  ... 

An energy-efficient object discovery protocol for context-sensitive middleware for ubiquitous computing

S.S. Yau, F. Karim
2003 IEEE Transactions on Parallel and Distributed Systems  
Analytical comparisons of the energy-consumptions are given between RKS and two other protocols for object discovery in context-sensitive middleware.  ...  In this paper, an energy-efficient object discovery protocol, RKS, for context-sensitive middleware for ubiquitous computing is presented.  ...  The authors would like to thank Microsoft Research and Tektronix, Inc. for donating the equipment used in their experiments.  ... 
doi:10.1109/tpds.2003.1247669 fatcat:bwo3bklpmrev5czezoblyh2hwy


Min-Hua Chen, Pai H. Chou
2010 Proceedings of the tenth ACM international conference on Embedded software - EMSOFT '10  
TeleScribe is a software mechanism for efficiently reprogramming embedded systems such as wireless sensor nodes over a shared communication link.  ...  Experimental results show TeleScribe to be the fastest and smallest among similar systems, achieving an update rate of about 95 bytes per node per second in a 100-node system.  ...  Finally, the base station broadcasts the requested data (DATA) to the (a) Base station broadcasts an advertisement message. (b) Nodes reply requests to the base station.  ... 
doi:10.1145/1879021.1879040 dblp:conf/emsoft/ChenC10 fatcat:f7ln33ecvfgb5e5hebkwjztzfa

DEAPspace – Transient ad hoc networking of pervasive devices

Reto Hermann, Dirk Husemann, Michael Moser, Michael Nidd, Christian Rohner, Andreas Schade
2001 Computer Networks  
The DEAPspace project described in this paper aims at providing a framework for interconnecting pervasive devices over a wireless medium.  ...  In this paper we discuss the motivation of the project and describe possible new application scenarios from which requirements for both the supporting framework and the underlying wireless medium are derived  ...  For both slotted and regular broadcast classes of advertisement schemes, a period T can easily be established for the expected time between advertisement repetitions.  ... 
doi:10.1016/s1389-1286(00)00184-5 fatcat:ugaohxq52jglhhacmsu6komimm

Interactive IPTV Services

Rastislav Kokoška, Stanislav Marchevský
2012 Acta Electrotechnica et Informatica  
Data streams watched by big groups of users are transmitted. Services with non-linear subject matter On the other hand, services with non-linear subject matter do not have fixed broadcast scheme.  ...  Television set is delivered with a classical remote control, alongside a smart remote control, and an adapter for external appliances connection.  ... 
doi:10.2478/v10198-012-0040-4 fatcat:r7dyydpetvc5xflz6octodb7tq

Spontaneous Windows File Sharing via Virtual Groups

Stefan Götz, Klaus Wehrle
2005 Networked Systems  
As the Windows CIFS protocol was designed for local area networks, its use has been confined to relatively small environments.  ...  Although file and printer sharing services have been deployed almost ubiquitously for a long time as part of Microsoft Windows, only recent peer-to-peer applications popularized file-sharing on a global  ...  Outlook We currently investigate mechanisms to let peers access any services in remote LANs in which only a single gateway peer runs the i3 proxy.  ... 
dblp:conf/kivs/GotzW05 fatcat:6dj5zjcurjghxc2j54rz7mtila

Preprint: Privacy-preserving IoT Data Sharing Scheme [article]

Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili
2022 arXiv   pre-print
Using broadcast signals to measure Received Signal Strength Indicator values and Machine Learning models this paper implements an IoT data sharing scheme based on something that is in an IoT devices environment  ...  Data sharing can be granted using different factors one of which is something in a users or an IoT devices environment which is in this paper broadcast signals.  ...  In the advertising mode, each BlE-enabled device broadcast their unique signature to identify themselves to each other.  ... 
arXiv:2209.13073v1 fatcat:kk7nnhexwrby3ik3woubelnk7a

Study on Research Challenges and Optimization for Internetworking of Hybrid MANET and Satellite Networks [chapter]

Ye Miao, Zhili Sun, Fang Yao, Ning Wang, Haitham S. Cruickshank
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
As a basic step of internetworking, the issue of gateway selection is studied specifically and corresponding optimization scheme for achieving load balancing is described.  ...  The integrated MANET and satellite network is a natural evolution in providing local and remote connectivity.  ...  The gateway periodically broadcast advertisement messages including the gateway information. The mobile nodes respond to these advertisements by requesting registration.  ... 
doi:10.1007/978-3-319-02762-3_8 fatcat:ed2sfmfmyrbf7a4sxrd6ag53ci

MiSPOT: dynamic product placement for digital TV through MPEG-4 processing and semantic reasoning

Martín López-Nores, José J. Pazos-Arias, Jorge García-Duque, Yolanda Blanco-Fernández, Manuela I. Martín-Vicente, Ana Fernández-Vilas, Manuel Ramos-Cabrer, Alberto Gil-Solla
2009 Knowledge and Information Systems  
The advertisements can be set to launch interactive commercials, thus enabling means for the provision of t-commerce services.  ...  This paper presents the proof of concept of MiSPOT, a system that brings a non-invasive and fully personalized form of advertising to Interactive Digital TV, targeting both domestic and mobile receivers  ...  The standard provides descriptors for low-level features of the audiovisual data (such as color, texture, motion, tempo or pitch) that can be filled out automatically, and for high-level characteristics  ... 
doi:10.1007/s10115-009-0200-8 fatcat:grmau3lmyzbhxdkibexbq6emva

Increasing Survivability of DSRC Safety Applications through Dissimilarity and Redundancy without Altering Existing Standards

Ahmed Serageldin
2015 International Conference on Aerospace Sciences and Aviation Technology  
Then we will investigate data reliability of safety application message exchanges for selected scenarios.  ...  For wireless communication ITS uses communications links based on Dedicated Short Range Communication (DSRC) in Wireless Access in Vehicular Environments (WAVE) systems, which is a promising technology  ...  We recommend this system be used for collision detection, which triggers a Road Side Alert (RSA) message to be broadcast.  ... 
doi:10.21608/asat.2015.23007 fatcat:nwkrzchqtvfxnn7kugpufujk4a

HARMS-based Service Discovery Protocol using Address-DNS

Kyuhwan Lee, Yunsuk Yeo, Tai-Myoung Chung
2015 Procedia Computer Science  
To cope with this, in this paper, we suggested discovery protocols in two different circumstances.  ...  One is to use postal address and DNS system over Internet, and another is to adopt maximum hop counts based on AODV routing protocol, which showed both no effect on the network size and diminution of overhead  ...  One of top-level domains is ccTLD(country code Top-Level Domain) which is two letter both established for countries or territories and can be mapped to the country of postal address.  ... 
doi:10.1016/j.procs.2015.07.183 fatcat:vji7jplbsfckldfjpt6lavjdci

Securing the Deluge network programming system

P.K. Dutta, J.W. Hui, D.C. Chu, D.E. Culler
2006 2006 5th International Conference on Information Processing in Sensor Networks  
Under our scheme, a program binary consists of several code and data segments that are mapped to a series of messages for transmission over the network.  ...  A number of multi-hop, wireless, network programming systems have emerged for sensor network retasking but none of these systems support a cryptographically-strong, publickey-based system for source authentication  ...  ACKNOWLEDGMENTS We thank Chris Karlof, David Molnar, Naveen Sastry, Jay Taneja, David Wagner, and the anonymous reviewers for their invaluable feedback.  ... 
doi:10.1109/ipsn.2006.243821 fatcat:yczxso4gd5ba5mgillzxqbi2v4

Securing the deluge Network programming system

Prabal K. Dutta, Jonathan W. Hui, David C. Chu, David E. Culler
2006 Proceedings of the fifth international conference on Information processing in sensor networks - IPSN '06  
Under our scheme, a program binary consists of several code and data segments that are mapped to a series of messages for transmission over the network.  ...  A number of multi-hop, wireless, network programming systems have emerged for sensor network retasking but none of these systems support a cryptographically-strong, publickey-based system for source authentication  ...  ACKNOWLEDGMENTS We thank Chris Karlof, David Molnar, Naveen Sastry, Jay Taneja, David Wagner, and the anonymous reviewers for their invaluable feedback.  ... 
doi:10.1145/1127777.1127826 dblp:conf/ipsn/DuttaHCC06 fatcat:dwt655kwsrf3jbsk55oi7wsqbe

A voice for the voiceless

Kavitha Ranganathan, Ankur Sarin
2012 Information Development  
We then investigate a most critical issuethe choice of the network wide broadcast protocol for the audio content. We identify desired characteristics of a community radio broadcasting service.  ...  We choose and evaluate eight popular broadcasting protocols on these characteristics, to find the protocols most suited for our application.  ...  Probability Based Schemes: Two techniques -probabilistic scheme and counter-based scheme allow nodes to re-broadcast based on the network topology.  ... 
doi:10.1177/0266666911424073 fatcat:lknp2x7os5a5zfkragkwvpa2sy
« Previous Showing results 1 — 15 out of 11,351 results