Results 11 to 20 of about 339,350 (261)

Robust Decentralized Cooperative Resource Allocation for High-Dense Robotic Swarms by Reducing Control Signaling Impact

open access: yesIEEE Access, 2022
High throughput, low latency, and high reliability in proximity communications for swarm robotics can be achieved using decentralized cooperative resource allocation schemes.
C. Santiago Morejon Garcia   +6 more
doaj   +1 more source

Stabilising control strategy for cyber-physical power systems

open access: yesIET Cyber-Physical Systems, 2019
The cyber-physical nature of electric power systems has increased immensely over the past decades, with advanced communication infrastructure paving the way.
Etinosa Ekomwenrenren   +4 more
doaj   +1 more source

Fog Computing as an Enabler for Immersive Media: Service Scenarios and Research Opportunities

open access: yesIEEE Access, 2019
Immersive media services, such as augmented reality and virtual reality (AR/VR),a 360-degree video, and free-viewpoint video (FVV), are popular today. They require massive data storage, ultrahigh computing power, and ultralow latency.
Dongho You   +8 more
doaj   +1 more source

Strategic Communication Networks [PDF]

open access: yesReview of Economic Studies, 2009
We consider situations in which individuals would like to choose an action which is close to that of others, as well as close to a state of nature, with the ideal proximity to the state varying across agents. Before this coordination game is played, a cheap-talk communication stage is offered to the individuals who decide to whom they reveal their ...
Jeanne Hagenbach, Frédéric Koessler
openaire   +4 more sources

A Mathematical Model for Efficient and Fair Resource Assignment in Multipath Transport

open access: yesFuture Internet, 2019
Multipath transport protocols are aimed at increasing the throughput of data flows as well as maintaining fairness between users, which are both crucial factors to maximize user satisfaction.
Andreas Könsgen   +3 more
doaj   +1 more source

Evaluating Forwarding Protocols in Opportunistic Networks: Trends, Advances, Challenges and Best Practices

open access: yesFuture Internet, 2019
A variety of applications and forwarding protocols have been proposed for opportunistic networks (OppNets) in the literature. However, the methodology of evaluation, testing and comparing these forwarding protocols are not standardized yet, which leads ...
Vishnupriya Kuppusamy   +3 more
doaj   +1 more source

Experimental Evaluation of IEEE 802.15.4z UWB Ranging Performance under Interference

open access: yesSensors, 2022
The rise of precise wireless localization for industrial and consumer use is continuing to challenge a significant amount of research. Recently the new ultra-wideband standard IEEE 802.15.4z was released to increase both the robustness and security of ...
Janis Tiemann   +2 more
doaj   +1 more source

Delay-based and QoS-aware packet scheduling for RT and NRT multimedia services in LTE downlink systems

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
Guaranteeing Quality of Service (QoS) for heterogeneous traffic is a major challenge in the Fourth Generation (4G) mobile networks. Therein, the absence of sophisticated resources allocation process at the base station jeopardizes QoS in terms of latency
Nadim K. M. Madi   +3 more
doaj   +1 more source

Adaptive User Grouping Based on EVM Prediction for Efficient & Robust Massive MIMO in TDD

open access: yesIEEE Access, 2019
Massive multiple-input, multiple-output (Ma-MIMO) offers significant capacity improvements for sub-6GHz wireless access. Evaluating the practicalities for real-world deployments and identifying solutions is the next critical step in the roll-out of this ...
Wael Boukley Hasan   +4 more
doaj   +1 more source

Simulation of communications networks [PDF]

open access: yesProceedings of the 24th conference on Winter simulation - WSC '92, 1992
This paper discusses how simulation is used to design and analyze communications networks. Topics discussed include: network issues addressed by simulation, simulation software for network modeling, techniques for building valid and credible models, and statistical considerations. A comprehensive example is also given.
Averill M. Law, Michael G. McComas
openaire   +1 more source

Home - About - Disclaimer - Privacy