• Aucun résultat trouvé

[PDF] Top 20 Operations, administration and maintenance (OAM) features for reliable and available wireless (RAW) networks

Has 10000 "Operations, administration and maintenance (OAM) features for reliable and available wireless (RAW) networks" found on our website. Below are the top 20 most common "Operations, administration and maintenance (OAM) features for reliable and available wireless (RAW) networks".

Operations, administration and maintenance (OAM) features for reliable and available wireless (RAW) networks

Operations, administration and maintenance (OAM) features for reliable and available wireless (RAW) networks

... defined and established, the adoption of radios for mission critical applications is lagging due to the fuzzy transmission characteristics of the wireless ...automation and safety ... Voir le document complet

7

Operations, Administration and Maintenance (OAM) features for RAW

Operations, Administration and Maintenance (OAM) features for RAW

... Operation, Administration, and Maintenance (OAM) features recommended to construct a predictable communication infrastructure on top of a collection of wireless ...problems, and ... Voir le document complet

12

A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks

A Centralized Controller for Reliable and Available Wireless Schedules in Industrial Networks

... B. Features The controller currently supports the semantics of TSCH data cells, which are the more complicated ones since they have explicit sender and receiver nodes, and are the ones which mainly ... Voir le document complet

10

Data collection and management solution for wireless sensor networks

Data collection and management solution for wireless sensor networks

... agricultural and environmental WSN applications are also numerous and ...solution for a specific application, our approach aims at the design of a complete versatile and adaptive solution ... Voir le document complet

7

Edge caching and network slicing for wireless cellular networks.

Edge caching and network slicing for wireless cellular networks.

... 5G wireless cellular system satisfy these stringent technical requirements in addition to exploiting new spectrum bands ...(mmWave)) and techniques for improving spectrum and energy ...traffic ... Voir le document complet

199

Secure key renewal and revocation for Wireless Sensor Networks

Secure key renewal and revocation for Wireless Sensor Networks

... revocation and renewal mechanisms in ...informed and it sends a broadcast message containing a list of keys to ...involved and does not need to know the network topology before the ...authentication ... Voir le document complet

5

Recharging wireless sensor networks using drones and wireless power transfer

Recharging wireless sensor networks using drones and wireless power transfer

... PROBLEM Wireless sensor networks are capable of periodically monitoring their vicinity and reporting important infor- mation about the integrity and security of their environ- ...batteries ... Voir le document complet

3

Fatigue evaluation in maintenance and assembly operations by digital human simulation

Fatigue evaluation in maintenance and assembly operations by digital human simulation

... factors and er- gonomics as early as ...current available human simulation tools, while indeed the physical capacity varies along time in an operation and the change of the physical capacity depends ... Voir le document complet

13

Reliable streaming protocol for lossy networks

Reliable streaming protocol for lossy networks

... ONCLUSIONS AND F UTURE DIRECTIONS In this paper, we presented R EST , a new reliable mechanism for streaming applications in challenged ...Tetrys and RLNC, reliability is ensured even in case ... Voir le document complet

7

Reliable Steganalysis Using a Minimum Set of Samples and Features

Reliable Steganalysis Using a Minimum Set of Samples and Features

... of features used: What are the sufficient and most relevant features for the actual classification problem? 3) the steganography method: Is there an important influ- ence of the stego ... Voir le document complet

14

2009 — Seamless, reliable, video multicast in wireless ad hoc networks

2009 — Seamless, reliable, video multicast in wireless ad hoc networks

... architecture for multiple trees video streaming over wireless ad hoc networks is shown in Figure ...MDC, for transmitting them over wireless ad hoc ...is available for ... Voir le document complet

199

Configuring and securing wireless networks

Configuring and securing wireless networks

... our wireless network is in ...OEB and Tow Tank areas and may be viewed using the Wi-Spy ...point for determining whether a new source of RF energy has been ...group and microwaves ... Voir le document complet

43

Systems and Techniques for Multicell-MIMO and Cooperative Relaying in Wireless Networks

Systems and Techniques for Multicell-MIMO and Cooperative Relaying in Wireless Networks

... phase) and calculates the trans- mission parameters which are then sent to the corresponding BSs for the transmission to take place (transmission ...CU and the CU to BSs low latency links are ... Voir le document complet

169

Super-reliable loss networks

Super-reliable loss networks

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ... Voir le document complet

61

Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas

Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas

... detection and model ...development and to guarantee the model ...tools for the formalization of BN models in order to integrate various dimensions (technical, organization, information, decision, ... Voir le document complet

18

Design and optimization of wireless backhaul networks

Design and optimization of wireless backhaul networks

... Traditionally, networks are always designed to meet the peak-hour traffic ...content, and the original data are recovered on downstream routers based on the cache synchronization between the sending ... Voir le document complet

149

A new proposal for reliable unicast and multicast transport in Delay Tolerant Networks

A new proposal for reliable unicast and multicast transport in Delay Tolerant Networks

... link and require all parts of a file to follow the same path to the ...nodes and the end- to-end delivery delay of data to its ...mechanism and uses time-delayed SACKs to deal with asymmetric ... Voir le document complet

7

Bayesian networks applications on dependability, risk analysis and maintenance

Bayesian networks applications on dependability, risk analysis and maintenance

... Cornalbaa and Giudicib (2004) who present a work in which BN approach is used in order to develop a statistical model to measure and, consequently, predict, the operational risks to which a banking ... Voir le document complet

7

Adaptive channels for wireless networks

Adaptive channels for wireless networks

... This model of operation, shown in figure 4-4, provides a clean interface where the user applications supply their requirements, the virtual network device reports [r] ... Voir le document complet

73

Design and Analysis of Virtualization Framework for Wireless Sensor Networks

Design and Analysis of Virtualization Framework for Wireless Sensor Networks

... Sensor Networks; Virtualization; Overlay Networks; Wireless Sensor Network Virtualization; ...NTRODUCTION Wireless Sensor Networks (WSNs) are combinations of micro-electro-mechanical ... Voir le document complet

3

Show all 10000 documents...