• No results found

[PDF] Top 20 Enabling multi-hop remote method invocation in device-to-device networks

Has 10000 "Enabling multi-hop remote method invocation in device-to-device networks" found on our website. Below are the top 20 most common "Enabling multi-hop remote method invocation in device-to-device networks".

Enabling multi-hop remote method invocation in device-to-device networks

Enabling multi-hop remote method invocation in device-to-device networks

... enables remote method execution routing on device-to-device net- works ...a device from one group can talk to a device from another group through a virtual ...and remote ... See full document

22

On the interference alignment with limited feedback for device to device networks

On the interference alignment with limited feedback for device to device networks

... To reduce or eliminate the interference of D2D net- works, Lu Yang et al. propose two interference alignment schemes to manage the interference between D2D com- munications and cellular communications [18]. The first one ... See full document

6

Caching deployment algorithm based on user preference in device-to-device networks

Caching deployment algorithm based on user preference in device-to-device networks

... Today’s internet traffic is dominated by content distribution and retrieval. With the rapid explosion of the data volume and content diversity, it becomes challenging to deliver high quality service to the end user ... See full document

6

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing in Wireless Sensor Networks

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing in Wireless Sensor Networks

... sensor networks in the inter hop verification could sustain many problems with transformation of data packets so we propose E-STAR for establishing stable and reliable routes in heterogeneous multi ... See full document

5

On the Analysis of Cellular Networks with Caching and Coordinated Device-to-Device Communication

On the Analysis of Cellular Networks with Caching and Coordinated Device-to-Device Communication

... wireless networks is geared towards developing intelligent ways of data dissemination by deviating from the traditional host centric network architecture to a more versatile information centric ...Direct ... See full document

8

Security Analysis of Mobile Payment Systems

Security Analysis of Mobile Payment Systems

... attacker to perform a relay attack. Both are based on the challenge response protocol. The first is a manual challenge response protocol which asks the user to enter the challenge manually in the payment application. ... See full document

139

To Acquire the High Competence Wsn Device to Device Communication for 5g Cellular Networks

To Acquire the High Competence Wsn Device to Device Communication for 5g Cellular Networks

... of affairs are supplied for opposition- primarily based UL SCMA. SCMA is compared to OFDMA in phrases of connectivity and drop charge under an awesome latency requirement. The simulation outcomes reveal that ... See full document

9

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

... Increasing the cost of collecting non- interfering groups is just the opposite version of cost that reduces fusion. We can design a similar approximation algorithm as in the previous section by selecting the lowest ... See full document

7

Java RMI in a Mobile Environment

Java RMI in a Mobile Environment

... a remote object implementation that uses a TCP based stream protocol for carrying out method invocations from clients to servers and must be extended to create a remote ...its remote ... See full document

71

Line Powered Remote Access Device

Line Powered Remote Access Device

... Note: The “Priority 1” and “Priority 2” access codes can work well together. As an example, one group of users can be given the “Priority 2” access code, and hence only have the ability to dial within the PABX system. ... See full document

6

Remote Sensing and Unmanned Aerial Device for Early Forest Fire Detection

Remote Sensing and Unmanned Aerial Device for Early Forest Fire Detection

... up in forests and bushes so that early fire eradication can be done. The scalable characteristic of fires makes it essential that forest fires have to be detected early to stop it from expanding. The information is also ... See full document

5

Multi-Device  for  Signal

Multi-Device for Signal

... each device remains independent in its ratcheting process, because in real life, one does not want to wait for all - or even a small part - of its devices to interact together before sending a ...master ... See full document

45

Device to device communication in cellular networks : multi hop path selection and performance

Device to device communication in cellular networks : multi hop path selection and performance

... loss is 5 dB. It is found that for small D2D communication distances, both SPR and RBR achieve lower outage probabilities than IAR. This is intuitive as the IAR routing algorithm stipulates that even when communicating ... See full document

177

Remote Port Security Device User’s Manual

Remote Port Security Device User’s Manual

... The RPSD Lock device prevents unauthorized access to the RMATS channel on your PBX. In administering the RPSD, keep in mind that access via telephone lines is not the only means of breaching the security of your ... See full document

109

Remote Port Security Device User’s Guide

Remote Port Security Device User’s Guide

... Lucent Technologies technicians are the personnel from Lucent Technologies who install the Remote Port Security Device (RPSD) Lock at the customer premises. It is assumed that Lucent Technologies ... See full document

156

RAD-AMP Amplified Remote Access Device

RAD-AMP Amplified Remote Access Device

... gives remote workers access to most PABX/KSU features from their home or cell ...call. Remote call center personnel can “Log-In” and Log-Out” or change their forwarding number as their location ...Tones, ... See full document

8

Efficiency of broadcasting in vehicular networks by means of
5G device to device communications

Efficiency of broadcasting in vehicular networks by means of 5G device to device communications

... There has been a considerable increase in the demand of high data rates among wireless networks since the integration of multiple services and new applications into cellular communications. Satisfying the basic ... See full document

78

User preference aware caching deployment for device-to-device caching networks

User preference aware caching deployment for device-to-device caching networks

... social networks and the recommendation systems ...caching networks, there are existing some caching strategies that take into account the users interest preferences [3], [32], ... See full document

13

Cross-device media: a review of second screening and multi-device television

Cross-device media: a review of second screening and multi-device television

... Television affords great social interaction (both colocated and remote). Though affected by genre (see [31] for more) it gives us a common talking point and brings together families in their living room. Therefore ... See full document

24

Java Remote Method Invocation (RMI)

Java Remote Method Invocation (RMI)

... the remote call is called the client object. The remote object is called the server ...the remote method is the client for that ...the remote method ... See full document

6

Show all 10000 documents...