首页 > 最新文献

2008 1st IFIP Wireless Days最新文献

英文 中文
A new generic model for signal propagation in Wi-Fi and WiMAX environments Wi-Fi和WiMAX环境下信号传播的一种新的通用模型
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812872
R. Ezzine, Ala Al-Fuqaha, R. Braham, A. Belghith
The ability to accurately predict radio propagation behavior for wireless communication systems, such as cellular mobile radio, is becoming crucial to system design. Since site measurements are costly, propagation models have been developed as suitable, low-cost, and convenient alternative. In this paper, we will propose a new generic signal propagation model for Wi-Fi and WiMAX environments. To develop this model we used existing models which are classified as: Free space models and land propagation models. This includes different types of loss: path loss, slow fading (shadowing) and fast fading. Our aim is to have a flexible model to be applicable in indoor and outdoor environments. Experiments carried out for indoor Wi-Fi and outdoor WiMAX cases have shown excellent results for the proposed model.
准确预测无线通信系统(如蜂窝移动无线电)的无线电传播行为的能力对系统设计至关重要。由于现场测量是昂贵的,传播模型已经发展成为合适的,低成本的,方便的替代方案。在本文中,我们将为Wi-Fi和WiMAX环境提出一种新的通用信号传播模型。为了开发这个模型,我们使用了现有的模型,这些模型分为:自由空间模型和陆地传播模型。这包括不同类型的损耗:路径损耗、慢衰落(阴影)和快速衰落。我们的目标是有一个灵活的模型,适用于室内和室外环境。在室内Wi-Fi和室外WiMAX环境下进行的实验表明,所提出的模型具有良好的效果。
{"title":"A new generic model for signal propagation in Wi-Fi and WiMAX environments","authors":"R. Ezzine, Ala Al-Fuqaha, R. Braham, A. Belghith","doi":"10.1109/WD.2008.4812872","DOIUrl":"https://doi.org/10.1109/WD.2008.4812872","url":null,"abstract":"The ability to accurately predict radio propagation behavior for wireless communication systems, such as cellular mobile radio, is becoming crucial to system design. Since site measurements are costly, propagation models have been developed as suitable, low-cost, and convenient alternative. In this paper, we will propose a new generic signal propagation model for Wi-Fi and WiMAX environments. To develop this model we used existing models which are classified as: Free space models and land propagation models. This includes different types of loss: path loss, slow fading (shadowing) and fast fading. Our aim is to have a flexible model to be applicable in indoor and outdoor environments. Experiments carried out for indoor Wi-Fi and outdoor WiMAX cases have shown excellent results for the proposed model.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Security management process or video surveillance systems in heterogeneous communication networks 异构通信网络中视频监控系统的安全管理过程
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812865
K. Kraus, O. Martikainen, R. Reda
In this paper, we are going to study and analyze the security management process for video surveillance systems. Subsequently, an architecture concept will be presented, showing the different standard security processes e.g. physical security, application security, network security and describe and analyze the individual factors affecting each process. Then the influence and impact to the video surveillance business continuity as well as on the law & ethic issues will be discussed. Finally the interdependencies between different security process and/or the different security parameters in video surveillance systems will be analyzed while keeping in mind the heterogeneous nature of the networks in order to achieve an optimal security management process architecture.
本文将对视频监控系统的安全管理流程进行研究和分析。随后,我们将介绍架构概念,展示不同的标准安全过程,例如物理安全、应用程序安全、网络安全,并描述和分析影响每个过程的个别因素。然后讨论对视频监控业务连续性的影响和冲击,以及对法律和道德问题的影响。最后,分析视频监控系统中不同安全过程和/或不同安全参数之间的相互依赖关系,同时考虑网络的异构性,以实现最佳的安全管理过程体系结构。
{"title":"Security management process or video surveillance systems in heterogeneous communication networks","authors":"K. Kraus, O. Martikainen, R. Reda","doi":"10.1109/WD.2008.4812865","DOIUrl":"https://doi.org/10.1109/WD.2008.4812865","url":null,"abstract":"In this paper, we are going to study and analyze the security management process for video surveillance systems. Subsequently, an architecture concept will be presented, showing the different standard security processes e.g. physical security, application security, network security and describe and analyze the individual factors affecting each process. Then the influence and impact to the video surveillance business continuity as well as on the law & ethic issues will be discussed. Finally the interdependencies between different security process and/or the different security parameters in video surveillance systems will be analyzed while keeping in mind the heterogeneous nature of the networks in order to achieve an optimal security management process architecture.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Low complexity iterative decoding algorithm for low-density parity-check (LDPC) codes 低密度奇偶校验码的低复杂度迭代译码算法
Pub Date : 2008-11-01 DOI: 10.1007/978-3-642-17758-3_29
Albashir Mohamed, M. Elsabrouty, S. El-Ramly
{"title":"Low complexity iterative decoding algorithm for low-density parity-check (LDPC) codes","authors":"Albashir Mohamed, M. Elsabrouty, S. El-Ramly","doi":"10.1007/978-3-642-17758-3_29","DOIUrl":"https://doi.org/10.1007/978-3-642-17758-3_29","url":null,"abstract":"","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"553 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secured vertical handoff decision scheme for the Fourth Generation (4G) wireless networks 第四代(4G)无线网络的安全垂直切换决策方案
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812889
R. Tawil, Jacques Demarjien, G. Pujolle
One of the main issues in the fourth generation (4G) wireless networks is the vertical handoff decision. The handoff is the mechanism used in order to let a mobile node (MN) switches from a network to another without remarkable service disconnection. Thus, the delay consumed to choose the suitable network to which the MN may connect is a major issue, which may impact the offered quality of service (QoS). In this paper we will present a Secured Vertical Handoff Decision (Sec-DVHD) scheme using the PKI algorithm, which is an extension of our proposed scheme, the distributed vertical handoff decision (DVHD). The simulation shows a good performance of the Sec-DVHD in term of handoff blocking rate and throughput.
第四代(4G)无线网络的主要问题之一是垂直切换决策。切换是一种机制,用于让移动节点(MN)从一个网络切换到另一个网络,而不会出现明显的业务中断。因此,选择MN可以连接的合适网络所消耗的延迟是一个主要问题,这可能会影响所提供的服务质量(QoS)。在本文中,我们将提出一个使用PKI算法的安全垂直切换决策(Sec-DVHD)方案,它是我们提出的分布式垂直切换决策(DVHD)方案的扩展。仿真结果表明,Sec-DVHD在切换阻塞率和吞吐量方面具有良好的性能。
{"title":"Secured vertical handoff decision scheme for the Fourth Generation (4G) wireless networks","authors":"R. Tawil, Jacques Demarjien, G. Pujolle","doi":"10.1109/WD.2008.4812889","DOIUrl":"https://doi.org/10.1109/WD.2008.4812889","url":null,"abstract":"One of the main issues in the fourth generation (4G) wireless networks is the vertical handoff decision. The handoff is the mechanism used in order to let a mobile node (MN) switches from a network to another without remarkable service disconnection. Thus, the delay consumed to choose the suitable network to which the MN may connect is a major issue, which may impact the offered quality of service (QoS). In this paper we will present a Secured Vertical Handoff Decision (Sec-DVHD) scheme using the PKI algorithm, which is an extension of our proposed scheme, the distributed vertical handoff decision (DVHD). The simulation shows a good performance of the Sec-DVHD in term of handoff blocking rate and throughput.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive subcarrier and power allocation for OFDMA systems OFDMA系统的自适应子载波和功率分配
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812830
C. Weeraddana, W. Li, M. Codreanu, M. Latva-aho
We consider the sum rate maximization problem in downlink OFDMA systems subject to total transmit power and minimum user rate constraints. A low complexity suboptimal resource allocation algorithm is proposed for joint optimization of multiuser subcarrier assignment and power allocation. The algorithm is based on Lagrangian relaxation where the non-convex optimization problem is decomposed into a master problem and a subproblem. Subproblem has a similar form as standard weighted sum rate maximization subject to total transmit power. Standard subgradient method is used in the master problem and a suboptimal algorithm inspired from primal decomposition techniques is also proposed to approximately solve the subproblem. Simulations are provided to compare the performance of the proposed algorithm to fixed spectrum assignment based algorithms with adaptive power control.
研究了受总发射功率和最小用户速率约束的下行OFDMA系统中速率最大化问题。针对多用户子载波分配和功率分配的联合优化问题,提出了一种低复杂度的次优资源分配算法。该算法基于拉格朗日松弛,将非凸优化问题分解为一个主问题和一个子问题。子问题的形式类似于总发射功率下的标准加权和速率最大化。采用标准次梯度法求解主问题,并提出了一种受原始分解技术启发的次优算法来近似求解子问题。通过仿真比较了该算法与基于固定频谱分配的自适应功率控制算法的性能。
{"title":"Adaptive subcarrier and power allocation for OFDMA systems","authors":"C. Weeraddana, W. Li, M. Codreanu, M. Latva-aho","doi":"10.1109/WD.2008.4812830","DOIUrl":"https://doi.org/10.1109/WD.2008.4812830","url":null,"abstract":"We consider the sum rate maximization problem in downlink OFDMA systems subject to total transmit power and minimum user rate constraints. A low complexity suboptimal resource allocation algorithm is proposed for joint optimization of multiuser subcarrier assignment and power allocation. The algorithm is based on Lagrangian relaxation where the non-convex optimization problem is decomposed into a master problem and a subproblem. Subproblem has a similar form as standard weighted sum rate maximization subject to total transmit power. Standard subgradient method is used in the master problem and a suboptimal algorithm inspired from primal decomposition techniques is also proposed to approximately solve the subproblem. Simulations are provided to compare the performance of the proposed algorithm to fixed spectrum assignment based algorithms with adaptive power control.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wireless cooperative networks: Partnership selection and fairness 无线合作网络:伙伴选择与公平性
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812891
E. Elsheikh, Kai‐Kit Wong
This paper presents analytical results that formalize fair-and-effective partnership selection for a distributed wireless network where user cooperation is employed to enhance the network performance and each individual user has the responsibility of identifying an appropriate partner, or makes a decision if a partnership opportunity is offered by other users. In particular, a 2-user time-division reciprocal cooperation is used so that the transmitters in a network are arranged into pairs of cooperating users with the aid of the channel state information (CSI) at the user nodes.
本文给出的分析结果形式化了分布式无线网络中公平有效的伙伴选择,其中用户合作用于提高网络性能,每个单个用户有责任确定合适的合作伙伴,或者在其他用户提供合作机会时做出决定。具体地说,利用用户节点上的信道状态信息(CSI)将网络中的发射机安排成合作的用户对,从而使用了2用户时分互惠合作。
{"title":"Wireless cooperative networks: Partnership selection and fairness","authors":"E. Elsheikh, Kai‐Kit Wong","doi":"10.1109/WD.2008.4812891","DOIUrl":"https://doi.org/10.1109/WD.2008.4812891","url":null,"abstract":"This paper presents analytical results that formalize fair-and-effective partnership selection for a distributed wireless network where user cooperation is employed to enhance the network performance and each individual user has the responsibility of identifying an appropriate partner, or makes a decision if a partnership opportunity is offered by other users. In particular, a 2-user time-division reciprocal cooperation is used so that the transmitters in a network are arranged into pairs of cooperating users with the aid of the channel state information (CSI) at the user nodes.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126475223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network level cooperation for resource allocation in future wireless networks 面向未来无线网络资源分配的网络级协作
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812916
M. A. Khan, C. Truong, T. Geithner, F. Sivrikaya, S. Albayrak
The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops.
无线接入技术的不断增加和多无线设备的可用性增加了对蜂窝网络中新的资源分配方案的需求。本文采用协作博弈论方法在网络级进行资源分配,同时在设备级利用可用的无线电接口。利用著名的破产模型对资源分配管理进行建模,并应用Kalai-Smorodinsky议价求解方法寻找分配规则,在此基础上提出了资源分配和呼叫准入控制方案。对我们的分配和控制方案的性能分析表明,在可用带宽的利用率和掉线次数方面,我们比以前的方法有了显著的改进。
{"title":"Network level cooperation for resource allocation in future wireless networks","authors":"M. A. Khan, C. Truong, T. Geithner, F. Sivrikaya, S. Albayrak","doi":"10.1109/WD.2008.4812916","DOIUrl":"https://doi.org/10.1109/WD.2008.4812916","url":null,"abstract":"The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Using SIP identity to prevent man-in-the-middle attacks on ZRTP 使用SIP身份,防止ZRTP受到中间人攻击
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812920
O. Jung, M. Petraschek, T. Hoeher, I. Gojmerac
In this paper we present an architecture and associated protocol extensions for securing the media stream of a VoIP session. We make use of ZRTP which is a key agreement protocol that allows two parties to agree upon a secret session key over the media path. Because ZRTP is based on the popular Diffie-Hellmann key exchange mechanism it is inherently vulnerable to man-in-the-middle (MITM) attacks. Although ZRTP offers a mechanism for the prevention of MITM attacks, a sophisticated attacker might be able to launch a successful attack in certain scenarios. We describe an approach that provides authentic cryptographic parameters for ZRTP without sacrificing the independence from a user-level Public Key Infrastructure (PKI). We propose to use the mechanisms provided by RFC 4474 (SIP Identity) to ensure the identity of the parties involved in an ZRTP key exchange.
在本文中,我们提出了一种用于保护VoIP会话媒体流的体系结构和相关协议扩展。我们使用ZRTP,这是一个密钥协议,允许双方在媒体路径上就秘密会话密钥达成一致。由于ZRTP基于流行的Diffie-Hellmann密钥交换机制,因此它天生就容易受到中间人(MITM)攻击。尽管ZRTP提供了一种防止MITM攻击的机制,但在某些情况下,老练的攻击者可能会发起成功的攻击。我们描述了一种为ZRTP提供真实的加密参数而不牺牲与用户级公钥基础设施(PKI)的独立性的方法。我们建议使用RFC 4474 (SIP身份)提供的机制来确保参与ZRTP密钥交换的各方的身份。
{"title":"Using SIP identity to prevent man-in-the-middle attacks on ZRTP","authors":"O. Jung, M. Petraschek, T. Hoeher, I. Gojmerac","doi":"10.1109/WD.2008.4812920","DOIUrl":"https://doi.org/10.1109/WD.2008.4812920","url":null,"abstract":"In this paper we present an architecture and associated protocol extensions for securing the media stream of a VoIP session. We make use of ZRTP which is a key agreement protocol that allows two parties to agree upon a secret session key over the media path. Because ZRTP is based on the popular Diffie-Hellmann key exchange mechanism it is inherently vulnerable to man-in-the-middle (MITM) attacks. Although ZRTP offers a mechanism for the prevention of MITM attacks, a sophisticated attacker might be able to launch a successful attack in certain scenarios. We describe an approach that provides authentic cryptographic parameters for ZRTP without sacrificing the independence from a user-level Public Key Infrastructure (PKI). We propose to use the mechanisms provided by RFC 4474 (SIP Identity) to ensure the identity of the parties involved in an ZRTP key exchange.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Practical handover optimization solution using autonomic agent-based piloting system 基于自主智能体的驾驶系统的实用交接优化解决方案
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812921
M. Abid, Mathieu Ligocki, Lionel Molinier, Gérard Nguenguang, G. Pujolle, D. Gaïti, H. Zimmermann
With the multiplication of wireless communication networks and the increasing capabilities of the user devices equipped with multiple technology interfaces, being always connected tends to be a reality in the near future. In this article we propose to pilot the current weak handover algorithms using an autonomic agent-based piloting system. We specifically focus on the pre-execution handover process. The proposed system main contributions are to recover the useful information and compute it to obtain useful knowledge. This latter will be used for feeding a sophisticated handover decision algorithm in order to pick the most appropriate access network. We have developed a real testbed to evaluate and validate our solution unlike most proposed works analyzed only by simulations and thus avoid practical problems encountered in real environment. Above this real platform we performed an experimentation in 802.11 wireless networks that shows promising results.
随着无线通信网络的增加和用户设备的功能的增加,配备了多种技术接口,在不久的将来,始终连接将成为现实。在本文中,我们建议使用基于自主代理的导航系统来导航当前的弱切换算法。我们特别关注执行前的交接过程。该系统的主要贡献是恢复有用的信息并对其进行计算以获得有用的知识。后者将用于提供复杂的切换决策算法,以选择最合适的接入网。我们开发了一个真实的测试平台来评估和验证我们的解决方案,不像大多数建议的工作只通过模拟来分析,从而避免了在真实环境中遇到的实际问题。在这个真实的平台之上,我们在802.11无线网络中进行了一个实验,显示出很好的结果。
{"title":"Practical handover optimization solution using autonomic agent-based piloting system","authors":"M. Abid, Mathieu Ligocki, Lionel Molinier, Gérard Nguenguang, G. Pujolle, D. Gaïti, H. Zimmermann","doi":"10.1109/WD.2008.4812921","DOIUrl":"https://doi.org/10.1109/WD.2008.4812921","url":null,"abstract":"With the multiplication of wireless communication networks and the increasing capabilities of the user devices equipped with multiple technology interfaces, being always connected tends to be a reality in the near future. In this article we propose to pilot the current weak handover algorithms using an autonomic agent-based piloting system. We specifically focus on the pre-execution handover process. The proposed system main contributions are to recover the useful information and compute it to obtain useful knowledge. This latter will be used for feeding a sophisticated handover decision algorithm in order to pick the most appropriate access network. We have developed a real testbed to evaluate and validate our solution unlike most proposed works analyzed only by simulations and thus avoid practical problems encountered in real environment. Above this real platform we performed an experimentation in 802.11 wireless networks that shows promising results.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131218191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Experimental validation of a 2-level social mobility model in opportunistic networks 机会主义网络中两层次社会流动模型的实验验证
Pub Date : 2008-11-01 DOI: 10.1109/WD.2008.4812850
S. Gaito, G. Grossi, F. Pedersini, G. P. Rossi
The aim of this paper is to validate a synthetic trace generator by means of a local campus experiment based on opportunistic networking. We employed pocket trace recorder (PTR) devices in order to explore human mobility and to make real connectivity available for reproducing its statistical features by artificial model simulations.
本文的目的是通过基于机会网络的本地校园实验来验证合成轨迹发生器。我们采用口袋跟踪记录仪(PTR)设备,以探索人类的流动性,并使真实的连接可用于通过人工模型模拟再现其统计特征。
{"title":"Experimental validation of a 2-level social mobility model in opportunistic networks","authors":"S. Gaito, G. Grossi, F. Pedersini, G. P. Rossi","doi":"10.1109/WD.2008.4812850","DOIUrl":"https://doi.org/10.1109/WD.2008.4812850","url":null,"abstract":"The aim of this paper is to validate a synthetic trace generator by means of a local campus experiment based on opportunistic networking. We employed pocket trace recorder (PTR) devices in order to explore human mobility and to make real connectivity available for reproducing its statistical features by artificial model simulations.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 1st IFIP Wireless Days
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1