首页 > 最新文献

Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.最新文献

英文 中文
Automatic lip sync and its use in the new multimedia services for mobile devices 自动对口型及其在移动设备新多媒体服务中的应用
G. Zoric, I. Pandzic
In this paper we present a new method for mapping natural speech to lip shape animation in real time. The speech signal, represented by MFCC vectors, is classified into viseme classes using neural networks. The topology of neural networks is automatically configured using genetic algorithms. This eliminates the need for tedious manual neural network design by trial and error and considerably improves the viseme classification results. This method is available in real-time and offline mode, and is suitable for various applications. So, we propose the new multimedia services for mobile devices based on the lip sync system described.
本文提出了一种将自然语音实时映射到唇形动画的新方法。用MFCC向量表示语音信号,利用神经网络对语音信号进行分类。神经网络的拓扑结构采用遗传算法自动配置。这消除了繁琐的人工神经网络设计的需要,并大大提高了viseme分类结果。该方法具有实时和离线两种模式,适用于各种应用。因此,我们提出了基于上述对口型系统的移动设备多媒体服务。
{"title":"Automatic lip sync and its use in the new multimedia services for mobile devices","authors":"G. Zoric, I. Pandzic","doi":"10.1109/CONTEL.2005.185904","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185904","url":null,"abstract":"In this paper we present a new method for mapping natural speech to lip shape animation in real time. The speech signal, represented by MFCC vectors, is classified into viseme classes using neural networks. The topology of neural networks is automatically configured using genetic algorithms. This eliminates the need for tedious manual neural network design by trial and error and considerably improves the viseme classification results. This method is available in real-time and offline mode, and is suitable for various applications. So, we propose the new multimedia services for mobile devices based on the lip sync system described.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127178752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Predicate abstraction in protocol verification 协议验证中的谓词抽象
E. Pek, Nikola Bogunović
The paper shows how predicate abstraction can be applied to protocol verification. Predicate abstraction is a method for automatic construction of an abstract state graph. The basic idea is to use n predicates, phi1,..., phin, defined on a concrete state space to generate an abstract state graph. Model checking is a formal verification technique which has been successfully applied to protocol verification. However, model checking can only be applied to finite state systems. Many interesting systems are infinite state or the number of states is so large that verification becomes infeasible. Predicate abstraction can be applied in the verification of infinite state systems (or large finite state systems). An abstract state graph created by predicate abstraction can be used for verification of safety properties using a model checker. We provide simple examples of protocol verification using predicate abstraction
本文展示了如何将谓词抽象应用于协议验证。谓词抽象是一种自动构造抽象状态图的方法。基本思想是使用n个谓词,phi1,…, phin,在具体状态空间上定义,生成抽象状态图。模型检查是一种形式化的验证技术,已成功地应用于协议验证。然而,模型检验只能应用于有限状态系统。许多有趣的系统是无限状态的,或者状态的数量太大,以至于验证变得不可行的。谓词抽象可以应用于无限状态系统(或大型有限状态系统)的验证。通过谓词抽象创建的抽象状态图可用于使用模型检查器验证安全属性。我们提供了使用谓词抽象进行协议验证的简单示例
{"title":"Predicate abstraction in protocol verification","authors":"E. Pek, Nikola Bogunović","doi":"10.1109/CONTEL.2005.185971","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185971","url":null,"abstract":"The paper shows how predicate abstraction can be applied to protocol verification. Predicate abstraction is a method for automatic construction of an abstract state graph. The basic idea is to use n predicates, phi1,..., phin, defined on a concrete state space to generate an abstract state graph. Model checking is a formal verification technique which has been successfully applied to protocol verification. However, model checking can only be applied to finite state systems. Many interesting systems are infinite state or the number of states is so large that verification becomes infeasible. Predicate abstraction can be applied in the verification of infinite state systems (or large finite state systems). An abstract state graph created by predicate abstraction can be used for verification of safety properties using a model checker. We provide simple examples of protocol verification using predicate abstraction","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reliability issues in network planning 网络规划中的可靠性问题
A. Pakstas
Summary form only given. Capacity, reliability, and delay are three "magic words" used for describing concepts of computer network design. While capacity and delay are relatively well understood, this is not the case for reliability. The term reliability is often used interchangeably with availability and dependability. Increased redundancy in the network structure is often considered as an important, or even the only, way to achieve higher levels of reliability. The tutorial presents the role of reliability (in a broad sense) in network design. Factors affecting performability of the communications system are discussed. Reliability in the network design process, in the context of a systems approach to network design, is considered in more detail. Examples of calculations of reliability figures for different network designs are considered using the Delite tool. Reliability support in communications protocols is discussed. Examples of simulations and animations of network dynamics are presented using the ns-2 and nam tools
只提供摘要形式。容量、可靠性和延迟是用来描述计算机网络设计概念的三个“神奇的词”。虽然容量和延迟相对来说很容易理解,但可靠性却不是这样。术语可靠性通常与可用性和可靠性交替使用。在网络结构中增加冗余通常被认为是实现更高级别可靠性的重要途径,甚至是唯一途径。本教程介绍了可靠性(广义上)在网络设计中的作用。讨论了影响通信系统性能的因素。可靠性在网络设计过程中,在网络设计的系统方法的背景下,被更详细地考虑。用Delite工具计算了不同网络设计的可靠性图。讨论了通信协议中的可靠性支持。给出了使用ns-2和nam工具进行网络动力学仿真和动画的实例
{"title":"Reliability issues in network planning","authors":"A. Pakstas","doi":"10.1109/CONTEL.2005.185996","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185996","url":null,"abstract":"Summary form only given. Capacity, reliability, and delay are three \"magic words\" used for describing concepts of computer network design. While capacity and delay are relatively well understood, this is not the case for reliability. The term reliability is often used interchangeably with availability and dependability. Increased redundancy in the network structure is often considered as an important, or even the only, way to achieve higher levels of reliability. The tutorial presents the role of reliability (in a broad sense) in network design. Factors affecting performability of the communications system are discussed. Reliability in the network design process, in the context of a systems approach to network design, is considered in more detail. Examples of calculations of reliability figures for different network designs are considered using the Delite tool. Reliability support in communications protocols is discussed. Examples of simulations and animations of network dynamics are presented using the ns-2 and nam tools","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133932527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling spatial aspects of mobile channel in uniformly distributed scatterers 均匀分布散射体中移动信道空间方面的建模
M. Simsim, N. Khan, P. Rapajic
It is essential to have deep understanding of the mobile radio channel in particular for radio communication modeling and advanced technology system design. In his paper we employ the recently proposed Eccentro-Scattering physical channel model to derive the probability density functions (pdf) of Angle of Arrival (AOA) of the multipaths at Base Station (BS) from uniformly distributed scatterers for picocell, microcell, and macrocell environments. The Eccentro-Scattering model is easily employed to model any cellular environment with appropriate choice of few model parameters. This provides a unified approach to model all cellular environments that remained absent, so far. The derived formulas for the pdf of AOA of the multipaths at BS can be used further in performance assessment for smart antennas. uniform distribution and the Gaussian distribution. In uniformly distributed scattering region, scatterers are assumed to have constant density throughout the scattering area, while in Gaussian distributed scatterers, the majority of scattering points are situated close to MS and the density of scattering points decreases as the distance from MS increases. Assuming scatterers to be uniformly distributed simplifies the analysis and manipulation. These models are very specific to the corresponding environments, therefore, none of them can be considered as a general model that can be used to model all types of cellular environments. In (4), an elliptical model was proposed which could be altered to be used as a circular one, as well, with change in eccentricity of the ellipse in uniformly distributed scattering environment. The model was suitable for macrocell and quasi-macrocell
深入了解移动无线信道,特别是对无线通信建模和先进的技术系统设计至关重要。在本文中,我们采用最近提出的偏心散射物理信道模型,从均匀分布的散射体中推导出基站(BS)多径到达角(AOA)的概率密度函数(pdf),适用于皮cell、微cell和宏cell环境。偏心散射模型只要选择适当的模型参数,就可以很容易地对任何胞胞环境进行建模。这提供了一种统一的方法来模拟迄今为止仍然不存在的所有细胞环境。所得公式可进一步用于智能天线的性能评估。均匀分布和高斯分布。在均匀分布的散射区域中,假设散射体在整个散射区域具有恒定的密度,而在高斯分布的散射体中,大多数散射点位于质谱仪附近,并且随着与质谱仪距离的增加,散射点的密度减小。假设散射体均匀分布简化了分析和操作。这些模型都是非常特定于相应的环境,因此,它们都不能被认为是一个通用的模型,可以用来模拟所有类型的细胞环境。在(4)中,提出了一种椭圆模型,在均匀分布的散射环境中,随着椭圆偏心率的变化,椭圆模型也可以转换为圆形模型。该模型适用于大细胞和准大细胞
{"title":"Modeling spatial aspects of mobile channel in uniformly distributed scatterers","authors":"M. Simsim, N. Khan, P. Rapajic","doi":"10.1109/CONTEL.2005.185851","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185851","url":null,"abstract":"It is essential to have deep understanding of the mobile radio channel in particular for radio communication modeling and advanced technology system design. In his paper we employ the recently proposed Eccentro-Scattering physical channel model to derive the probability density functions (pdf) of Angle of Arrival (AOA) of the multipaths at Base Station (BS) from uniformly distributed scatterers for picocell, microcell, and macrocell environments. The Eccentro-Scattering model is easily employed to model any cellular environment with appropriate choice of few model parameters. This provides a unified approach to model all cellular environments that remained absent, so far. The derived formulas for the pdf of AOA of the multipaths at BS can be used further in performance assessment for smart antennas. uniform distribution and the Gaussian distribution. In uniformly distributed scattering region, scatterers are assumed to have constant density throughout the scattering area, while in Gaussian distributed scatterers, the majority of scattering points are situated close to MS and the density of scattering points decreases as the distance from MS increases. Assuming scatterers to be uniformly distributed simplifies the analysis and manipulation. These models are very specific to the corresponding environments, therefore, none of them can be considered as a general model that can be used to model all types of cellular environments. In (4), an elliptical model was proposed which could be altered to be used as a circular one, as well, with change in eccentricity of the ellipse in uniformly distributed scattering environment. The model was suitable for macrocell and quasi-macrocell","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134205950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information modeling of trouble: a service provider view 故障的信息建模:服务提供者视图
S. Markovits, M. Lam, R. Braun
This paper focuses on providing an information model view of the Trouble component of the assurance domain. This is derived using an understanding of the TMF eTOM processes and the associated SID Information Model through its application to the Trouble processes. We begin by examining existing standards and adapt and/or derive entities which are used within these processes and develop some entities which are undefined or unavailable currently in the SID definitions. We describe an implementation that leverages the use of the SID information model principles to enhance Trouble assurance. The environment in which Telecommunication Service Providers (SP) operate is rapidly changing. Previously only technology centric, providing mainly voice connectivity the SP is now required to be more customer centric, facilitating anywhere anyhow anytime media rich services where voice is only one option in the user experience . Customers, demanding more are concerned with the effectiveness, timeliness and quality of services bound by commercial agreements. To meet these demands there is a requirement for SP to inter-work with all the stakeholders. These include not only the customer but Value Chain participants such content providers, service aggregators, partners, and technology providers. Trouble management is an integrating support component of assurance used to assist in service malfunction situations
本文的重点是提供保证域的故障组件的信息模型视图。这是通过对TMF eTOM过程的理解和相关的SID信息模型(通过其对Trouble过程的应用程序)派生出来的。我们首先检查现有的标准,调整和/或派生在这些流程中使用的实体,并开发一些在SID定义中未定义或当前不可用的实体。我们描述了一个利用SID信息模型原理来增强故障保证的实现。电信服务提供商(SP)的运营环境正在迅速变化。以前只以技术为中心,主要提供语音连接,现在要求SP更加以客户为中心,随时随地提供丰富的媒体服务,语音只是用户体验的一个选择。客户对商业协议所约束的服务的有效性、及时性和质量要求更高。为了满足这些需求,SP需要与所有利益相关者相互合作。这不仅包括客户,还包括价值链参与者,如内容提供商、服务聚合商、合作伙伴和技术提供商。故障管理是保证的集成支持组件,用于在服务故障情况下提供帮助
{"title":"Information modeling of trouble: a service provider view","authors":"S. Markovits, M. Lam, R. Braun","doi":"10.1109/CONTEL.2005.185933","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185933","url":null,"abstract":"This paper focuses on providing an information model view of the Trouble component of the assurance domain. This is derived using an understanding of the TMF eTOM processes and the associated SID Information Model through its application to the Trouble processes. We begin by examining existing standards and adapt and/or derive entities which are used within these processes and develop some entities which are undefined or unavailable currently in the SID definitions. We describe an implementation that leverages the use of the SID information model principles to enhance Trouble assurance. The environment in which Telecommunication Service Providers (SP) operate is rapidly changing. Previously only technology centric, providing mainly voice connectivity the SP is now required to be more customer centric, facilitating anywhere anyhow anytime media rich services where voice is only one option in the user experience . Customers, demanding more are concerned with the effectiveness, timeliness and quality of services bound by commercial agreements. To meet these demands there is a requirement for SP to inter-work with all the stakeholders. These include not only the customer but Value Chain participants such content providers, service aggregators, partners, and technology providers. Trouble management is an integrating support component of assurance used to assist in service malfunction situations","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131625969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey of IPv6 site multihoming proposals IPv6站点多归属方案综述
P. Savola, T. Chown
Site multihoming is a method by which an Internet end-site, for example an enterprise network, may connect to multiple service providers simultaneously. There are many reasons why multihoming is desirable, e.g. service resilience, network load balancing or provider independence. In the IPv4 Internet, multihoming has been achieved by use of relatively simple techniques, including networks advertising their network prefixes - whether such prefixes are independent of the Internet Service Providers (ISPs) or not - to the Internet global routing infrastructure. With the introduction of IPv6 the vast increase in the number of potential site prefixes means that for scalable site multihom- ing we cannot repeat such IPv4 multihoming practices. Thus new IPv6 multihoming solutions are required. In this paper we present an overview of currently proposed solutions and explore the challenges and motivations of site multihoming. Such a review is timely because multihoming remains a key perceived obstacle to widespread IPv6 deployment in mission-critical environments.
站点多主是Internet终端站点(例如企业网络)可以同时连接到多个服务提供者的一种方法。需要多宿主的原因有很多,例如服务弹性、网络负载平衡或提供者独立性。在IPv4互联网中,多宿主是通过使用相对简单的技术实现的,包括网络向互联网全球路由基础设施发布其网络前缀——无论这些前缀是否独立于互联网服务提供商(isp)。随着IPv6的引入,潜在站点前缀数量的大量增加意味着对于可扩展的站点多宿主,我们不能重复这样的IPv4多宿主实践。因此需要新的IPv6多宿主解决方案。在本文中,我们概述了目前提出的解决方案,并探讨了站点多归属的挑战和动机。这样的审查是及时的,因为多宿主仍然是在关键任务环境中广泛部署IPv6的关键障碍。
{"title":"A survey of IPv6 site multihoming proposals","authors":"P. Savola, T. Chown","doi":"10.1109/CONTEL.2005.185815","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185815","url":null,"abstract":"Site multihoming is a method by which an Internet end-site, for example an enterprise network, may connect to multiple service providers simultaneously. There are many reasons why multihoming is desirable, e.g. service resilience, network load balancing or provider independence. In the IPv4 Internet, multihoming has been achieved by use of relatively simple techniques, including networks advertising their network prefixes - whether such prefixes are independent of the Internet Service Providers (ISPs) or not - to the Internet global routing infrastructure. With the introduction of IPv6 the vast increase in the number of potential site prefixes means that for scalable site multihom- ing we cannot repeat such IPv4 multihoming practices. Thus new IPv6 multihoming solutions are required. In this paper we present an overview of currently proposed solutions and explore the challenges and motivations of site multihoming. Such a review is timely because multihoming remains a key perceived obstacle to widespread IPv6 deployment in mission-critical environments.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Project management maturity of selected organizations in Croatia 克罗地亚选定组织的项目管理成熟度
H. Supić
Project management maturity models (PMMM) are a part of the PM development process, and present a relatively new concept. PMMMs are used to assess and plan strategically the PM development and required resources in an organization. Maturity models can also be used as a performance benchmark among different organizations and industries. Our fieldwork assessed the average PM maturity level of Croatian organizations, correlated the maturity with the basic organization characteristics, like ownership, market, size and industry, and explored the relation between PM process maturity and PM environment maturity. Croatian organizations are at low maturity levels (mostly 1 and 2 out of 5, average 1.75). There are differences in maturity among industries and the different sizes and markets in which organizations operate. The differences indicate that there is a link between the higher performance of an organization and its PM maturity level. The research showed that there is a very high correlation between the maturity of the PM processes and PM environment, and maturity can almost be considered the same from both perspectives. There is high recognition and high expectation regarding the development of PM practice within organizations. However, declining budgets and closed approach to maturing in PM might indicate hesitation. PM alone cannot improve the competitiveness of Croatian organizations, but its promotion should be an important element in the overall business environment
项目管理成熟度模型(PMMM)是项目管理开发过程的一部分,提出了一个相对较新的概念。项目管理模型用于战略性地评估和计划组织中的项目管理开发和所需资源。成熟度模型还可以用作不同组织和行业之间的性能基准。我们的实地工作评估了克罗地亚组织的平均项目管理成熟度水平,将成熟度与组织的基本特征(如所有权、市场、规模和行业)相关联,并探讨了项目管理过程成熟度和项目管理环境成熟度之间的关系。克罗地亚的组织处于较低的成熟度水平(多数为1和2 / 5,平均为1.75)。不同行业、不同规模和不同市场的组织在成熟度上存在差异。这些差异表明,组织的高绩效与其项目管理成熟度水平之间存在联系。研究表明,项目管理过程的成熟度与项目管理环境之间存在非常高的相关性,从这两个角度来看,成熟度几乎可以被认为是相同的。组织内部对项目管理实践的发展有很高的认可和期望。然而,预算的下降和对PM成熟的封闭方法可能表明犹豫。PM本身不能提高克罗地亚组织的竞争力,但它的推广应该是整个商业环境中的一个重要因素
{"title":"Project management maturity of selected organizations in Croatia","authors":"H. Supić","doi":"10.1109/CONTEL.2005.185978","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185978","url":null,"abstract":"Project management maturity models (PMMM) are a part of the PM development process, and present a relatively new concept. PMMMs are used to assess and plan strategically the PM development and required resources in an organization. Maturity models can also be used as a performance benchmark among different organizations and industries. Our fieldwork assessed the average PM maturity level of Croatian organizations, correlated the maturity with the basic organization characteristics, like ownership, market, size and industry, and explored the relation between PM process maturity and PM environment maturity. Croatian organizations are at low maturity levels (mostly 1 and 2 out of 5, average 1.75). There are differences in maturity among industries and the different sizes and markets in which organizations operate. The differences indicate that there is a link between the higher performance of an organization and its PM maturity level. The research showed that there is a very high correlation between the maturity of the PM processes and PM environment, and maturity can almost be considered the same from both perspectives. There is high recognition and high expectation regarding the development of PM practice within organizations. However, declining budgets and closed approach to maturing in PM might indicate hesitation. PM alone cannot improve the competitiveness of Croatian organizations, but its promotion should be an important element in the overall business environment","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115271040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An insight into challenges of international and multicultural knowledge transfers within ict industry 洞察信息通信技术行业内国际和多元文化知识转移的挑战
S. Krajnović, D. Huljenic
The paper analyses some of the critical knowledge management business factors and challenges in research and development centers within the ICT industry. In today's highly competitive world, knowledge has become the dominant source of competitive advantage. The paper stresses the importance of knowledge management for a long-term success of an organization. Furthermore, it elaborates on the critical importance of knowledge transfer and knowledge sharing culture. The challenges of international and multicultural knowledge transfers are presented and analyzed. The authors propose some basic principles for management and measurement of such knowledge transfers and corresponding transfer projects are proposed. The analysis is performed on the examples of ICT Ericsson research and development centers in Croatia and Ireland.
本文分析了信息通信技术产业中研发中心的一些关键知识管理业务因素和挑战。在当今高度竞争的世界中,知识已成为竞争优势的主要来源。本文强调了知识管理对组织长期成功的重要性。进一步阐述了知识转移和知识共享文化的重要性。提出并分析了国际和多元文化知识转移的挑战。作者提出了知识转移管理和度量的基本原则,并提出了相应的转移项目。本文以爱立信在克罗地亚和爱尔兰的研发中心为例进行了分析。
{"title":"An insight into challenges of international and multicultural knowledge transfers within ict industry","authors":"S. Krajnović, D. Huljenic","doi":"10.1109/CONTEL.2005.185867","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185867","url":null,"abstract":"The paper analyses some of the critical knowledge management business factors and challenges in research and development centers within the ICT industry. In today's highly competitive world, knowledge has become the dominant source of competitive advantage. The paper stresses the importance of knowledge management for a long-term success of an organization. Furthermore, it elaborates on the critical importance of knowledge transfer and knowledge sharing culture. The challenges of international and multicultural knowledge transfers are presented and analyzed. The authors propose some basic principles for management and measurement of such knowledge transfers and corresponding transfer projects are proposed. The analysis is performed on the examples of ICT Ericsson research and development centers in Croatia and Ireland.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"162 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113972979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IP-oriented QoS in next generation networks: application to wireless networks 下一代网络中面向ip的QoS:在无线网络中的应用
P. Lorenz
{"title":"IP-oriented QoS in next generation networks: application to wireless networks","authors":"P. Lorenz","doi":"10.1007/978-3-540-24663-3_8","DOIUrl":"https://doi.org/10.1007/978-3-540-24663-3_8","url":null,"abstract":"","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120817041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and implementation of an enhanced security layer for Bluetooth 蓝牙增强安全层的设计与实现
Panu Hämäläinen, N. Liu, R. Sterling, Marko Hännikäinen, Timo Hämäläinen
This paper proposes a new Enhanced Security Layer (ESL) for Bluetooth. The security level is increased by replacing the encryption with AES and adding in- tegrity protection. As ESL is placed on the top of the standard controller interface, it can be integrated into any Bluetooth implementation. A prototype implementation of ESL is presented. The security processing is implemented in hardware for high performance. The design consumes fewer resources and has higher throughput (214 Mb/s) than the standard design. The programming interface supports straightforward application development.
提出了一种新的蓝牙增强安全层(ESL)。通过使用AES代替加密和增加完整性保护,提高了安全级别。由于ESL位于标准控制器接口的顶部,因此它可以集成到任何蓝牙实现中。给出了ESL的原型实现。安全处理在硬件中实现,以获得高性能。与标准设计相比,该设计消耗的资源更少,吞吐量更高(214mb /s)。编程接口支持直接的应用程序开发。
{"title":"Design and implementation of an enhanced security layer for Bluetooth","authors":"Panu Hämäläinen, N. Liu, R. Sterling, Marko Hännikäinen, Timo Hämäläinen","doi":"10.1109/CONTEL.2005.185956","DOIUrl":"https://doi.org/10.1109/CONTEL.2005.185956","url":null,"abstract":"This paper proposes a new Enhanced Security Layer (ESL) for Bluetooth. The security level is increased by replacing the encryption with AES and adding in- tegrity protection. As ESL is placed on the top of the standard controller interface, it can be integrated into any Bluetooth implementation. A prototype implementation of ESL is presented. The security processing is implemented in hardware for high performance. The design consumes fewer resources and has higher throughput (214 Mb/s) than the standard design. The programming interface supports straightforward application development.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116520313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1