Browsing by Subject "Telecommunication networks"
Now showing items 21-40 of 50
-
Article
Emergency TeleOrthoPaedics m-health system for wireless communication links
(2009)For the first time, a complete wireless and mobile emergency TeleOrthoPaedics system with field trials and expert opinion is presented. The system enables doctors in a remote area to obtain a second opinion from doctors ...
-
Conference Object
Hierarchical approach for the bandwidth allocation, management and control in B-ISDN
(Publ by IEEE, 1993)This paper adopts a hierarchical multilayer/ multilevel approach for the allocation, management and control of B-ISDN resources. This approach seems appropriate to present a vertical decomposition of control layers, having ...
-
Article
How many attackers can selfish defenders catch?
(2013)In a distributed system with attacks and defenses, both attackers and defenders are self-interested entities. We assume a reward-sharing scheme among interdependent defenders
-
Conference Object
Information hovering in vehicular ad-hoc networks
(2009)Information Hovering is a relatively new concept of information dissemination over a mobile set of peers. It naturally applies in many applications in Vehicular Ad-Hoc Networks, where useful information needs to be made ...
-
Article
Nash equilibria in discrete routing games with convex latency functions
(2004)We study Nash equilibria in a discrete routing game that combines features of the two most famous models for non-cooperative routing, the KP model [16] and the Wardrop model [27]. In our model, users share parallel links. ...
-
Article
Nash equilibria in discrete routing games with convex latency functions
(2008)In a discrete routing game, each of n selfish users employs a mixed strategy to ship her (unsplittable) traffic over m parallel links. The (expected) latency on a link is determined by an arbitrary non-decreasing, non-constant ...
-
Article
A new estimation scheme for the effective number of users in internet congestion control
(2011)Many congestion control protocols have been recently proposed in order to alleviate the problems encountered by TCP in high-speed networks and wireless links. Protocols utilizing an architecture that is in the same spirit ...
-
Article
A new model for selfish routing
(2008)In this work, we introduce and study a new, potentially rich model for selfish routing over non-cooperative networks, as an interesting hybridization of the two prevailing such models, namely the KPmodel [E. Koutsoupias, ...
-
Article
A new model for selfish routing
(2004)In this work, we introduce and study a new model for selfish routing over non-cooperative networks that combines features from the two such best studied models, namely the KP model and the Wardrop model in an interesting ...
-
Article
On network survivability algorithms based on trellis graph transformations
(1999)Due to the wide range of services being supported, telecommunications networks are loaded with massive quantities of information. This stimulates extra concern for network survivability. In this paper, we use graph theoretic ...
-
Article
Performance aspects of data broadcast in wireless networks with user retrials
(2004)The User retrial phenomenon and its significant impact on network performance in unicast wireless systems are known and relatively well studied in the literature. However, there have been no previous studies on the impact ...
-
Conference Object
The power of the defender
(2006)We consider a security problem on a distributed network. We assume a network whose nodes are vulnerable to infection by threats (e.g. viruses), the attackers. A system security software, the defender, is available in the ...
-
Conference Object
Practical evaluation of GPRS use in a telemedicine system in Cyprus
(Institute of Electrical and Electronics Engineers Inc., 2003)The unceasing emergence of new technologies in wireless and mobile telecommunication networks, combined with the simultaneous rapid advances in information technology, are leading to many new solutions in the field of ...
-
Article
The price of anarchy for polynomial social cost
(2004)In this work, we consider an interesting variant of the well-studied KP model [18] for selfish routing that reflects some influence from the much older Wardrop model [31]. In the new model, user traffics are still unsplittable, ...
-
Article
The price of defense and fractional matchings
(2006)Consider a network vulnerable to security attacks and equipped with defense mechanisms. How much is the loss in the provided security guarantees due to the selfish nature of attacks and defenses? The Price of Defense was ...
-
Conference Object
RAN selection for converged networks supporting IMS signalling and MBMS service
(2007)Future Communication Networks are envisioned to be based upon a common, flexible and scalable convergence platform, where different access networks, different terminals and different services can coexist. The new user ...
-
Conference Object
Real-time graph visualization tool for vehicular ad-hoc networks: (VIVAGr: VIsualization tool of VAnet Graphs in real-time)
(2011)In this work we describe VIVAGr, a graphical-oriented real time visualization tool for vehicular ad-hoc network connectivity graphs. This tool enables the effective synthesis of structural, topological, and dynamic ...
-
Article
Requirements for the transmission of streaming video in mobile wireless networks
(2006)The ability to transmit video and support related real-time multimedia applications is considered important in mobile networks. Video streaming, video conferencing, online interactive gaming, and mobile TV are only a few ...
-
Article
Selfish routing in the presence of network uncertainty
(2009)We study the problem of selfish routing in the presence of incomplete network information. Our model consists of a number of users who wish to route their traffic on a network of m parallel links with the objective of ...
-
Conference Object
A simulation tool to evaluate radio resource management algorithms for enhanced UMTS
(2005)This paper presents a new system level simulator that has been developed to evaluate Radio Resource Management (RRM) techniques in UMTS (Universal Mobile Telecommunication Systems) and enhanced-UMTS networks. The simulator ...