首页 > 最新文献

2008 10th International Conference on Advanced Communication Technology最新文献

英文 中文
Sensor Network Node Management and Implementation 传感器网络节点管理与实现
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494007
Young-Bag Moon, Jong Young Lee, Sang Joon Park
The configuration of the u-sensor network is comprised of sink node, and the sensor node and gateway so that the USN (ubiquitous sensor network) application service can be provided. The middleware function need for a sink and sensor node for the sensor network management In the middleware function, it is required of the network topology management, the sensing data processing, a failure and power management, and etc. And it is designed in order to perform the network management through the u- sensor network overall. In this paper, it described about the design about the topology, event data, failure, power management for a sink and sensor node management and implementation issue. The topology configuration and all kinds of management data of sensor network nodes were shown through an implementation in the PAN network management GUI (graphical user interface).
u型传感器网络的配置由汇聚节点、传感器节点和网关组成,以提供USN (ubiquitous sensor network)应用服务。中间件功能主要包括网络拓扑管理、传感数据处理、故障和电源管理等功能。并通过u传感器网络整体实现网络管理。本文介绍了该设计中关于拓扑、事件数据、故障、电源管理以及传感器节点的管理与实现等问题。通过在PAN网络管理GUI(图形用户界面)中的实现,显示了传感器网络节点的拓扑结构和各种管理数据。
{"title":"Sensor Network Node Management and Implementation","authors":"Young-Bag Moon, Jong Young Lee, Sang Joon Park","doi":"10.1109/ICACT.2008.4494007","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494007","url":null,"abstract":"The configuration of the u-sensor network is comprised of sink node, and the sensor node and gateway so that the USN (ubiquitous sensor network) application service can be provided. The middleware function need for a sink and sensor node for the sensor network management In the middleware function, it is required of the network topology management, the sensing data processing, a failure and power management, and etc. And it is designed in order to perform the network management through the u- sensor network overall. In this paper, it described about the design about the topology, event data, failure, power management for a sink and sensor node management and implementation issue. The topology configuration and all kinds of management data of sensor network nodes were shown through an implementation in the PAN network management GUI (graphical user interface).","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133841941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Future Automotive Insurance System based on Telematics Technology 基于远程信息处理技术的未来汽车保险系统
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493851
Daesub Yoon, Jong-woo Choi, Hyunsuk Kim, Juwan Kim
With the proliferation of vehicles and advancement of information technology, the technology of telematics, which provides valuable services to people by collecting and analyzing the information from drivers, vehicles and Telematics environments (e.g. traffic information, road condition, weather information, etc.), has been a hot research area in IT and automotive recently. There are needs for telematics makes more profitable. Telematics based insurance services could be one possible business model. In this paper, we have investigated trends of telematics based insurance services in the industry and discussed required technologies for telematics based insurance services. Finally, we summarized the framework for insurance telematics which we had developed.
随着车辆的激增和信息技术的进步,通过收集和分析来自驾驶员、车辆和车载信息环境(如交通信息、路况信息、天气信息等)的信息,为人们提供有价值的服务的车载信息处理技术已成为近年来信息技术和汽车领域的研究热点。人们需要远程信息处理技术,使其更有利可图。基于远程信息处理的保险服务可能是一种可能的商业模式。在本文中,我们调查了行业中基于远程信息处理的保险服务的趋势,并讨论了基于远程信息处理的保险服务所需的技术。最后,我们总结了我们开发的保险远程信息处理框架。
{"title":"Future Automotive Insurance System based on Telematics Technology","authors":"Daesub Yoon, Jong-woo Choi, Hyunsuk Kim, Juwan Kim","doi":"10.1109/ICACT.2008.4493851","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493851","url":null,"abstract":"With the proliferation of vehicles and advancement of information technology, the technology of telematics, which provides valuable services to people by collecting and analyzing the information from drivers, vehicles and Telematics environments (e.g. traffic information, road condition, weather information, etc.), has been a hot research area in IT and automotive recently. There are needs for telematics makes more profitable. Telematics based insurance services could be one possible business model. In this paper, we have investigated trends of telematics based insurance services in the industry and discussed required technologies for telematics based insurance services. Finally, we summarized the framework for insurance telematics which we had developed.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"707 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132948081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Design of Location-based Directory Facilitator in Context-Aware Environment 上下文感知环境下基于位置的目录促进器的设计
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494204
S. Na, Dong-Uk Kim, Yoe-Jin Yoon, D. Shin
In ubiquitous computing environments, the basic information such as types or locations of services should be provided in advance to use distributed services and devices efficiently. Using a combination of developed agent technology and service discovery to efficiently and flexibly manage distributed services, devices, and users is a trend. In this paper, we analyze the DF's searching method and designed ubiquitous location-based service in context-aware environment, because context-aware environment provides a suitable method to gather requested information in an appropriate way.
在泛在计算环境中,为了高效地使用分布式服务和设备,需要提前提供服务类型或位置等基本信息。将已开发的代理技术与服务发现技术相结合,高效灵活地管理分布式服务、设备和用户是一种趋势。本文分析了DF的搜索方法,设计了上下文感知环境下泛在的基于位置的服务,因为上下文感知环境提供了一种合适的方法以合适的方式收集请求信息。
{"title":"Design of Location-based Directory Facilitator in Context-Aware Environment","authors":"S. Na, Dong-Uk Kim, Yoe-Jin Yoon, D. Shin","doi":"10.1109/ICACT.2008.4494204","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494204","url":null,"abstract":"In ubiquitous computing environments, the basic information such as types or locations of services should be provided in advance to use distributed services and devices efficiently. Using a combination of developed agent technology and service discovery to efficiently and flexibly manage distributed services, devices, and users is a trend. In this paper, we analyze the DF's searching method and designed ubiquitous location-based service in context-aware environment, because context-aware environment provides a suitable method to gather requested information in an appropriate way.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116615853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance of Ranging Channel Accesses in WiBro Systems WiBro系统中测距信道访问性能研究
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493785
Young-Keum Song, Dongwoo Kim
Ranging schemes have been used for timing synchronization and power control between a base station (BS) and personal subscriber stations (PSS). They are also used for bandwidth request and handoff in WiBro systems. In this paper, we present the ranging mechanism in WiBro in a view of contention resolution for ranging access. Performances of success rate and delay are assessed since they greatly affect the system capability. We investigate the performance by simulation using the parameters specified in a WiBro standard. A result shows that the average delay in ranging access is in a range of 110-700 ms depending on different scenarios.
测距方案已被用于基站(BS)和个人用户站(PSS)之间的定时同步和功率控制。它们也用于WiBro系统中的带宽请求和切换。本文从争用解决的角度提出了WiBro的测距机制。由于成功率和延迟对系统性能的影响较大,因此对其性能进行了评估。我们使用WiBro标准中指定的参数通过模拟来研究性能。结果表明,根据不同的场景,测距访问的平均延迟在110 ~ 700 ms之间。
{"title":"Performance of Ranging Channel Accesses in WiBro Systems","authors":"Young-Keum Song, Dongwoo Kim","doi":"10.1109/ICACT.2008.4493785","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493785","url":null,"abstract":"Ranging schemes have been used for timing synchronization and power control between a base station (BS) and personal subscriber stations (PSS). They are also used for bandwidth request and handoff in WiBro systems. In this paper, we present the ranging mechanism in WiBro in a view of contention resolution for ranging access. Performances of success rate and delay are assessed since they greatly affect the system capability. We investigate the performance by simulation using the parameters specified in a WiBro standard. A result shows that the average delay in ranging access is in a range of 110-700 ms depending on different scenarios.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116955757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Time-Frequency Code Detection in UWB system 超宽带系统中的时频码检测
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494205
Sung-Woo Choi, Sangsung Choi
The MB-OFDM UWB is a wireless technology that can transmit information at the maximum data rate of 480 Mbps. In this system, channelization for different piconets is achieved by using different time-frequency codes for different piconets. So, when a new device wants to enter a present piconet, it should detect the time-frequency code of that piconet. we propose a new method that controls physical layer using a modified time-frequency code, which makes it easy to detect the used time-frequency code.
MB-OFDM超宽带是一种能够以480mbps的最大数据速率传输信息的无线技术。在该系统中,通过对不同的皮网使用不同的时频编码来实现不同皮网的信道化。因此,当一个新设备想要进入一个现有的皮康网时,它应该检测该皮康网的时频码。我们提出了一种使用改进时频码控制物理层的新方法,使所用时频码易于检测。
{"title":"Time-Frequency Code Detection in UWB system","authors":"Sung-Woo Choi, Sangsung Choi","doi":"10.1109/ICACT.2008.4494205","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494205","url":null,"abstract":"The MB-OFDM UWB is a wireless technology that can transmit information at the maximum data rate of 480 Mbps. In this system, channelization for different piconets is achieved by using different time-frequency codes for different piconets. So, when a new device wants to enter a present piconet, it should detect the time-frequency code of that piconet. we propose a new method that controls physical layer using a modified time-frequency code, which makes it easy to detect the used time-frequency code.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experience of USN MAC based on 424MHz band IEEE 802.15.4 基于424MHz频段IEEE 802.15.4的USN MAC经验
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493776
Kyeseon Lee, Nae-Su Kim, D. Kim
In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.
在建筑外,关于传感器网络应用的要求越来越高,但在建筑外构建传感器网络存在频率难的问题。经过传感器网络物理层和MAC层标准处理的IEEE802.15.4标准发布的频段为2.4 GHz和868 / 915 MHz。在国内可以使用的频率是2.4 GHz。”2.4 GHz节点在建筑物外部难以操作。在韩国,可以作为窄带使用的频段是424和447兆赫。因此,需要能够在国内运行的424或447 MHz频段的传感器节点。
{"title":"Experience of USN MAC based on 424MHz band IEEE 802.15.4","authors":"Kyeseon Lee, Nae-Su Kim, D. Kim","doi":"10.1109/ICACT.2008.4493776","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493776","url":null,"abstract":"In the building outside, the requirement about the sensor network applications increases, but it is difficult to build the sensor network in the building outside the frequency problem. The frequency band issued for the IEEE802.15.4 processed with the physical layer of the sensor network and standard of the MAC layer is 2.4 GHz and 868 / 915 MHz. As to the frequency, which we can use within Korea, 2.4 GHz is unique. 2.4 GHz node is difficult to operate in the building outside. In Korea, the frequency band that we can use as the narrow band is 424 and 447 MHz band. Therefore, the sensor node of 424 or 447 MHz band can operate in Korea was needed.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Inter-Cell Interference Management for Downlink FH-OFDMA Systems 下行FH-OFDMA系统的自适应小区间干扰管理
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493944
Jin Bae Park, Y. Sang, Seong-Lyun Kim, K. S. Kim
For a cellular system, the system throughput as well as the throughput at a cell edge are among the most important evaluation measures for the requirements on the system performance. Several inter-cell interference mitigation techniques have been proposed to meet the cell-edge users' needs in downlink. Each interference mitigation scheme has been found that they have pros and cons at the same time. In this paper, an adaptive inter-cell interference management scheme is proposed for an LDPC-coded FH-OFDMA system to combat the inter-cell interference in downlink cellular environment. Based on the knowledge on other cells that we can utilize without dynamic cooperation between cells, different decoding methods can be applied to maximize the performance for the cell-edge users. It is shown that a significant gain can be obtained, especially at the cell boundary using the proposed scheme.
对于蜂窝系统来说,系统吞吐量和蜂窝边缘吞吐量是对系统性能需求最重要的评估指标之一。为了满足下行链路中蜂窝边缘用户的需求,提出了几种蜂窝间干扰缓解技术。每种干扰缓解方案都有各自的优点和缺点。针对ldpc编码的FH-OFDMA系统下行小区环境中的小区间干扰,提出了一种自适应小区间干扰管理方案。基于对其他小区的了解,我们可以不需要小区之间的动态合作,采用不同的解码方法来最大限度地提高小区边缘用户的性能。结果表明,使用该方案可以获得显著的增益,特别是在单元边界处。
{"title":"Adaptive Inter-Cell Interference Management for Downlink FH-OFDMA Systems","authors":"Jin Bae Park, Y. Sang, Seong-Lyun Kim, K. S. Kim","doi":"10.1109/ICACT.2008.4493944","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493944","url":null,"abstract":"For a cellular system, the system throughput as well as the throughput at a cell edge are among the most important evaluation measures for the requirements on the system performance. Several inter-cell interference mitigation techniques have been proposed to meet the cell-edge users' needs in downlink. Each interference mitigation scheme has been found that they have pros and cons at the same time. In this paper, an adaptive inter-cell interference management scheme is proposed for an LDPC-coded FH-OFDMA system to combat the inter-cell interference in downlink cellular environment. Based on the knowledge on other cells that we can utilize without dynamic cooperation between cells, different decoding methods can be applied to maximize the performance for the cell-edge users. It is shown that a significant gain can be obtained, especially at the cell boundary using the proposed scheme.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Security Limitations of SSO in OpenID OpenID中单点登录的安全性限制
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494089
Hyun-Kyung Oh, Seunghun Jin
As the Internet becomes a way of social life, there are lots of accounts which a user has to manage. To receive the Web service, people have to register each Web site. It is the OpenID to resolve these burdensome. The OpenID provides the single sign-on service which a user can be authenticated in several Web sites by submitting the password of OpenID to authentication server only once. In this paper, we analyze the single sign-on in OpenID and show an experiment of vulnerability of OpenID.
随着互联网成为社会生活的一种方式,用户必须管理大量的账户。要接收Web服务,人们必须注册每个Web站点。正是OpenID解决了这些麻烦。OpenID提供单点登录服务,用户只需向身份验证服务器提交一次OpenID密码,就可以在多个网站上进行身份验证。本文对OpenID中的单点登录进行了分析,并对OpenID的漏洞进行了实验。
{"title":"The Security Limitations of SSO in OpenID","authors":"Hyun-Kyung Oh, Seunghun Jin","doi":"10.1109/ICACT.2008.4494089","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494089","url":null,"abstract":"As the Internet becomes a way of social life, there are lots of accounts which a user has to manage. To receive the Web service, people have to register each Web site. It is the OpenID to resolve these burdensome. The OpenID provides the single sign-on service which a user can be authenticated in several Web sites by submitting the password of OpenID to authentication server only once. In this paper, we analyze the single sign-on in OpenID and show an experiment of vulnerability of OpenID.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Towards A Secure Distribute Storage System 迈向安全的分布式存储系统
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4494090
M. Zhang, De-sheng Zhang, He-qun Xian, Chi Chen, D. Feng
Today's storage paradigm is shifting from the closed and managed mode to be more open and dynamic. Network storage system can be made up of a group of loosely coupled and heterogeneous storage resources. But this openness exposes the data directly to the unknown or unmanaged storage servers. Thus it is more necessary and challenging in these storage systems to ensure data security. In this paper we propose a new secure network storage system architecture which adds a layer of management nodes between users and storage nodes. This architecture is able to provide reliable and secure data storage services while storage servers are suffering from various types of intrusion. The architecture greatly reduces the scope of trust from a large scale of storage nodes to a few management nodes, and provides a flexible access control mechanism, which ensures the data privacy, integrity and availability while preserves the flexibility, efficiency and scalability.
今天的存储模式正在从封闭和管理模式转向更加开放和动态。网络存储系统可以由一组松散耦合的异构存储资源组成。但是这种开放性将数据直接暴露给未知的或未管理的存储服务器。因此,在这些存储系统中,确保数据的安全性就显得更加必要和具有挑战性。本文提出了一种新的安全网络存储系统架构,在用户和存储节点之间增加了一层管理节点。这种架构能够在存储服务器免受各种入侵的情况下,提供可靠、安全的数据存储服务。该架构将大规模存储节点的信任范围大大缩小到少数管理节点,并提供灵活的访问控制机制,在保证数据保密性、完整性和可用性的同时,保持了数据的灵活性、高效性和可扩展性。
{"title":"Towards A Secure Distribute Storage System","authors":"M. Zhang, De-sheng Zhang, He-qun Xian, Chi Chen, D. Feng","doi":"10.1109/ICACT.2008.4494090","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4494090","url":null,"abstract":"Today's storage paradigm is shifting from the closed and managed mode to be more open and dynamic. Network storage system can be made up of a group of loosely coupled and heterogeneous storage resources. But this openness exposes the data directly to the unknown or unmanaged storage servers. Thus it is more necessary and challenging in these storage systems to ensure data security. In this paper we propose a new secure network storage system architecture which adds a layer of management nodes between users and storage nodes. This architecture is able to provide reliable and secure data storage services while storage servers are suffering from various types of intrusion. The architecture greatly reduces the scope of trust from a large scale of storage nodes to a few management nodes, and provides a flexible access control mechanism, which ensures the data privacy, integrity and availability while preserves the flexibility, efficiency and scalability.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Link-based service customization for NGN NGN基于链路的业务定制
Pub Date : 2008-04-22 DOI: 10.1109/ICACT.2008.4493711
Vu Truong Thanh, Y. Urano
In this paper we describe a framework to automatically customize an ongoing communication service whenever a terminal discovers a new link (either wireless or wire-line), which can be used for communication as a secondary link to the Internet. This framework makes use of the information that the server can obtain, as well as the ability to communicate using two links simultaneously at the terminal in order to provide more flexibility for the future communication service. This framework is general enough so that it can be applied to either next generation network or 3G mobile networks.
在本文中,我们描述了一个框架,当终端发现一个新的链路(无线或有线)时,它可以自动自定义一个正在进行的通信服务,它可以作为到Internet的次要链路用于通信。该框架利用了服务器可以获取的信息,以及在终端使用两条链路同时通信的能力,为未来的通信服务提供了更大的灵活性。该框架具有足够的通用性,因此可以应用于下一代网络或3G移动网络。
{"title":"Link-based service customization for NGN","authors":"Vu Truong Thanh, Y. Urano","doi":"10.1109/ICACT.2008.4493711","DOIUrl":"https://doi.org/10.1109/ICACT.2008.4493711","url":null,"abstract":"In this paper we describe a framework to automatically customize an ongoing communication service whenever a terminal discovers a new link (either wireless or wire-line), which can be used for communication as a secondary link to the Internet. This framework makes use of the information that the server can obtain, as well as the ability to communicate using two links simultaneously at the terminal in order to provide more flexibility for the future communication service. This framework is general enough so that it can be applied to either next generation network or 3G mobile networks.","PeriodicalId":448615,"journal":{"name":"2008 10th International Conference on Advanced Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 10th International Conference on Advanced Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1