6 Hits in 6.0 sec

Wireless wakeups revisited

Yuvraj Agarwal, Ranveer Chandra, Alec Wolman, Paramvir Bahl, Kevin Chin, Rajesh Gupta
2007 Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07  
In enterprise Wi-Fi environments, VoIP is a compelling application for devices such as smartphones with multiple wireless interfaces.  ...  To address this issue, we present Cell2Notify, a practical and deployable energy management architecture that leverages the cellular radio on a smartphone to implement wakeup for the high-energy consumption  ...  We thank David Campbell and Eric Putnam for helping us with the smartphone power measurements.  ... 
doi:10.1145/1247660.1247682 dblp:conf/mobisys/AgarwalCWBCG07 fatcat:d7jan5b3avdblpxmqbz7j7lvnu

Experimenting With Commodity 802.11 Hardware: Overview and Future Directions

Pablo Serrano, Pablo Salvador, Vincenzo Mancuso, Yan Grunenberger
2015 IEEE Communications Surveys and Tutorials  
Index Terms-Wireless LAN, 802.11, experimentation, commercial off-the-shelf. 1553-877X  ...  In this paper, we review and categorise the most prevalent works carried out with 802.11 COTS devices over the past 15 years, to present a timely snapshot of the areas that have attracted the most attention  ...  Given that mobility-related operations are not PSM-friendly, in [257] authors present the Cell2Notify architecture for VoIP over WLAN, where the mobile terminal has the Wi-Fi interface switched off and  ... 
doi:10.1109/comst.2015.2417493 fatcat:pch232nzznc4hhkzzaoqrx347u

Cross-Layer Energy Optimization for IoT Environments: Technical Advances and Opportunities

Kirshna Kumar, Sushil Kumar, Omprakash Kaiwartya, Yue Cao, Jaime Lloret, Nauman Aslam
2017 Energies  
A taxonomy is presented for the classification of related literature on energy efficient techniques in IoT environments.  ...  In the present scenario, this is the most prominent requirement that must be served while introducing a communication protocol for an IoT environment.  ...  Voice over Internet Protocol (VoIP) and mobile users utilize this technique for making free calls.  ... 
doi:10.3390/en10122073 fatcat:664tljhlzbbkzpbpc4ubzd7mcq

Modeling and Measuring Performance of Data Dissemination in Opportunistic Networks

Nikodin Ristanovic
An "opportunistic network" is a term introduced to describe a sparse, wireless, ad hoc network with highly mobile nodes.  ...  We then focus on the impact of security print on network performance and design a scheme for the protection of optimal relaying capacity in an opportunistic multihop network.  ...  They use cellular footprints to wake up the Wi-Fi interfaces on smartphones when in proximity of Wi-Fi APs.  ... 
doi:10.5075/epfl-thesis-5448 fatcat:v7pr4t2xj5atzeghyfgtq6nate

Support of resource-aware vertical handovers in WLAN hotspots [article]

Sven Wiethölter, Technische Universität Berlin, Technische Universität Berlin, Adam Wolisz
Endgeräte wie Smartphones oder Tablets bieten häufig eine Vielfalt drahtloser Zugänge zum Internet an.  ...  In line with this, the number of devices as well as the traffic demand of end users have been reported to increase rapidly over the last years which imposes a strong challenge especially for the operators  ...  In the beta stadium, also Apple's iOS 6 offered a functionality denoted as "Wi-Fi Plus Cellular" which was intended to support 3G access if WLAN connectivity is unacceptable [66] .  ... 
doi:10.14279/depositonce-4124 fatcat:5l4hytrfsnbllmzws66r74urx4

Practical Private Set Intersection Protocols for Privacy-Preserving Applications

Christian Weinert
For this problem, we propose multiple mitigation techniques, inclu [...]  ...  , mutual authentication for Apple AirDrop, and database intersection analytics.  ...  We thank Oleksandr Tkachenko for his invaluable help with the implementation and benchmarking. We also thank Moni Naor for suggesting the application to achieve differential privacy.  ... 
doi:10.26083/tuprints-00019295 fatcat:mcrri3mvh5a3jois3hzpolx3ae