Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "discovery" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
A Comprehensive Survey on Resource Management in Internet of Things
Autorzy:
Bhajantri, Lokesh B.
S., Gangadharaiah
Powiązania:
https://bibliotekanauki.pl/articles/1839312.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
Internet of Things
resource allocation
resource discovery
resource management
Opis:
Efficient resource management is a challenging task in distributed systems, such as the Internet of Things, fog, edge, and cloud computing. In this work, we present a broad overview of the Internet of Things ecosystem and of the challenges related to managing its resources. We also investigate the need for efficient resource management and the guidelines given/suggested by Standard Development Organizations. Additionally, this paper contains a comprehensive survey of the individual phases of resource management processes, focusing on resource modeling, resource discovery, resource estimation, and resource allocation approaches based on performance parameters or metrics, as well as on architecture types. This paper presents also the architecture of a generic resource management enabler. Furthermore, we present open issues concerning resource management, pointing out the directions of future research related to the Internet of Things.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 4; 27-43
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The use of quantitative association rules in cellular network planning
Autorzy:
Okoniewski, M.
Powiązania:
https://bibliotekanauki.pl/articles/307803.pdf
Data publikacji:
2003
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data mining
quantitative association rules
knowledge discovery process
cellular network planning
Opis:
This paper describes the problem of planning cellular network base stations with optimization to traffic requirements. This research problem was a main incentive to add some development to the theory of association rules. The new form of quantitative and multi-dimensional association rules, unlike other approaches, does not require the discretization of real value attributes as a preprocessing step. They are discovered with data driven algorithm that gives precise and complete results and has polynomial complexity for a given dimensionality.
Źródło:
Journal of Telecommunications and Information Technology; 2003, 3; 121-124
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic multicast IPsec by using a proactive IPsec discovery protocol and a group key management
Autorzy:
Aurisch, T.
Ginzler, T.
Martini, P.
Ogden, R.
Tran, T.
Seifert, H.
Powiązania:
https://bibliotekanauki.pl/articles/308087.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
secure group communication group key management
multicast IPsec
automatic IPSec device discovery
Opis:
Internet protocol based networking is gaining ground in armed forces, leading to a concept described by the NATO as network centric capabilities (NCC). The goal is to enable state-of-the-art, affordable and powerful electronic information services to the troops. A tighter connection of the forces is expected to further enhance the joined strike capabilities. Providing secure information exchange within groups of armed forces is one aspect of the NCC concept. Such group communication is enabled by the multicast feature of the IP technology. Security requirements are met by using the IP security (IPsec) architecture. IPsec enables secure communication between secure private networks via an unsecured public text network. While secure unicast transmission with IPsec is common, only few achievements have been made to secure multicast transmissions. The protection of multicast data traffic of a group in an automated way is described in this document. We utilize an automatic detection of IPsec devices and an efficient key management protocol to reach our aim.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 2; 77-83
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On IPv6 Experimentation in Wireless Mobile Ad Hoc Networks
Autorzy:
Grajzer, M.
Głąbowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/309525.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
IPv6 simulation
IPv6 wireless testbed
MANET experimentation
MANET protocols evaluation
Neighbor Discovery ++ (ND++)
NS-3
Opis:
With the growing interest towards the Internet of Things IPv6-based mobile ad hoc networks (MANETs) become a key enabling technology offering the possibility of automated, unsupervised network configuration and operation. Such a functionality calls for an accurate and reliable testing of the newly proposed solutions, which is challenging due to the dynamic, decentralized and ad hoc nature of MANETs. In this work selected topics are presented on performing IPv6 protocols experimentation in wireless, IPv6-only mobile ad hoc networks – including both simulation – and testbed-based evaluation. Based on the authors experience with the evaluation of the extended IPv6 Neighbor Discovery protocol (ND++) proposed during the course of research, the selection of an opensource simulation environment is presented and a comparison between simulation and emulation experimentation methods is provided. Benefits and drawbacks of both these methodologies for testing IPv6 solutions are depicted. Moreover, the important aspects of topology and mobility considerations are considered. Finally the authors pro.ose a testing approach that would allow for a detailed and accurate evaluation by means of open-source, easily accessible and low-cost methodologies.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 3; 71-81
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies