Network Synchronization for Mobile Device-to-Device Systems
نویسندگان
چکیده
منابع مشابه
Performance Analysis of Device to Device Communications Overlaying/Underlaying Cellular Network
Minimizing the outage probability and maximizing throughput are two important aspects in device to device (D2D) communications, which are greatly related to each other. In this paper, first, the exact formulas of the outage probability for D2D communications underlaying or overlaying cellular network are derived which jointly experience Additive White Gaussian Noise (AWGN) and Rayleigh multipat...
متن کاملMobile Device Encryption Systems
The initially consumer oriented iOS and Android platforms, and the newly available Windows Phone 8 platform start to play an important role within business related areas. Within the business context, the devices are typically deployed via mobile device management (MDM) solutions, or within the bring-your-own-device (BYOD) context. In both scenarios, the security depends on many platform securit...
متن کاملSystems-level Support for Mobile Device Connectivity
SYSTEMS-LEVEL SUPPORT FOR MOBILE DEVICE CONNECTIVITYbyAnthony J. Nicholson Chair: Brian D. Noble The rise of handheld computing devices has inspired a great deal of research aimed at addressing the unique problems posed by their mobile, “always-on” nature. In order to help mobile devices navigate a complex world of overlapping, uneven public wireless coverage, one must be mindful of the...
متن کاملContent synchronization using device-to-device communication in smart cities
With the acceleration of high data demand from mobile users and urbanization, Device-to-Device (D2D) communication networks have emerged as a new paradigm to alleviate the traffic load on the cellular networks. Due to high mobility of devices, establishing and ensuring the success of D2D transmission in an intermittently connected network is a major challenge. In this paper, we consider the cha...
متن کاملDevice-Centric Monitoring for Mobile Device Management
The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Communications
سال: 2017
ISSN: 0090-6778,1558-0857
DOI: 10.1109/tcomm.2016.2639504