Access-Network Association Policies for Media Streaming in Heterogeneous Environments
We study the design of media streaming applications in the presence of multiple heterogeneous wireless access methods with different throughputs and costs. Our objective is to analytically characterize the trade-off between the usage cost and the Quality
Medard, Muriel +3 more
core +1 more source
Synergy between adaptive channel coding and media access control for wireless ATM [PDF]
In this paper, we propose mechanisms to exploit the synergy between the Media Access Control (MAC) layer and the physical layer for wireless ATM applications.
Kwok, YK, Lau, VKN
core +1 more source
KORELASI MEDIA SOSIAL TIKTOK DALAM PEMBENTUKAN KARAKTER PADA MAHASISWA PGSD
A popular social media platform is TikTok. Total downloads of the Tiktok app in 2022 were 500 million times. Indonesia became the country with the most downloads at 11%.
Erwin Putera Permana
doaj +1 more source
Collision resolution algorithm based on time-series forecasting for cognitive wireless networks
A novel prediction-based collision resolution algorithm for self-similar traffic in cognitive wireless networks was formulated.The packet collision was resolved by combining the tree splitting scheme and the prediction theory.Through theoretical analysis
Shuang-mao YANG, Wei GUO, Wei TANG
doaj +2 more sources
Dynamic cooperative media access control for wireless networks
AbstractCooperative communications can obtain spatial diversity, high channel capacity, and reliable transmission without multiple antennas, and thus, it has become a hot topic in recent years. Different from existing research, this paper pays attention on cooperative media access control (MAC) mechanism, which considers both physical gain and MAC ...
Bin Cao +3 more
openaire +1 more source
The Control of Porting in Two-Sided Markets [PDF]
A sizable literature has grown up in recent years focusing on two-sided markets in which economies of scale combined with complementarities between a platform and its associated ‘software’ or ‘services’ can generate indirect network effects (that is ...
Pollock, Rufus
core +2 more sources
Encryption Based Access Control Model in Cloud: a Survey [PDF]
Cloud computing is known as “Utility”. Cloud Computing enabling users to remotely store their data in a server and provide services on-demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have
Aluvalu, R. (Rajanikanth) +1 more
core
How to promote informal learning in the workplace? The need for incremental design methods
Informal Learning in the Workplace (ILW) is ensured by the everyday work activities in which workers are engaged. It accounts for over 75 per cent of learning in the workplace.
Marty, Jean-Charles +2 more
core +1 more source
Making Waves: Media's Potential for Girls in the Global South [PDF]
There are around 600 million adolescent girls living in developing countries. Doubly marginalised because oftheir gender and age, many live a bleak existence -- excluded from access to basic public services, unable to shape the decisions that affect ...
Caroline Sugg
core
Multi-channel MAC protocol based on network partitioning for wireless sensor networks
The limited amount of available orthogonal channels and noise interference are two major issues to constrain performances of multi-channel MAC protocols in wireless sensor networks (WSN).In conjunction with features of data gathering networks,a ...
Bin CHENG +3 more
doaj +2 more sources

