Conferences related to Networking

Back to Top

2017 11th European Conference on Antennas and Propagation (EUCAP)

The conference addresses all scientific and application topics in the area of electromagnetic antennas and radio propagation whatever the frequency.


2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2017 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2017 19th European Conference on Power Electronics and Applications (EPE'17 ECCE Europe)

Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for the smarter grid, energy efficiency, technologies for sustainable energy systems, converters and power supplies


2017 20th International Conference on Electrical Machines and Systems (ICEMS)

This conference aims to provide a forum for researchers, scientists, and engineers to present their latest R&D achievements and to exchange useful information and experiences in the field of electrical machines and systems, including electrical machines of all types and all aspects (such as new structures, materials, and analysis and design methods), power electronic converters, motion control, electrical drive, and application systems, as well as other relevant areas.


2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS)

The 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS) will be held in Batumi, Georgia on December 5-8, 2017. As the flagship conference of IEEE Circuits and Systems Society in Region 8 of IEEE (Europe, Middle East, and Africa), ICECS 2017 will consist of tutorials, plenary lectures, regular, special and poster sessions focusing on recent trends, emerging technologies and advances in all aspects of:¿ Circuits ¿ Systems ¿ Signals ¿ Mathematical Methods ¿ Computational Methods ¿ Applications


More Conferences

Periodicals related to Networking

Back to Top

Antennas and Propagation, IEEE Transactions on

Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Networking

Back to Top

Xplore Articles related to Networking

Back to Top

A new open-hole buried heterostructure process for the fabrication of photonic integrated circuits

Y. Sun; X. M. Ji; Z. Chen; J. Z. Yan; J. X. Cai; M. Raj; F. -S. Choa The 16th Annual Meeting of the IEEE Lasers and Electro-Optics Society, 2003. LEOS 2003., 2003

We have successfully fabricated several batches of open-hole buried heterostructure (BH) lasers using self-align technique with a hole of about 3 μm opening. This new processing technology have in the active region, a traditional buried heterostructure (BH) with semiinsulating InP which works as a current block material. While in the passive region, the semiinsulating InP is the waveguide cladding material. ...


Sentiment analysis of economic news in Bahasa Indonesia using majority vote classifier

Zamahsyari; Arif Nurwidyantoro 2016 International Conference on Data and Software Engineering (ICoDSE), 2016

Internet acts as a media to publicite news, which divided into various categories, such as politics, economics, sports, and health. Each has tendency to publish the news with positive or negative sentiment. News sentiment has ability to affect people's opinion about a topic or government policy. Economy is one interesting topic which has direct impact to Indonesian citizen. Hence, this ...


The Remote Surveillance System Based on the Processor -- S3C2410

Xue-Qin Wu; Hong-Jun Chen 2012 International Conference on Computer Science and Electronics Engineering, 2012

This thesis brings forward to a resolution of embedded remote surveillance based on the demand of reality. The system is centering on the embedded Linux and S3C2410, and basing on the Wi-Fi network to build the embedded remote surveillance, which can capture video signal from USB digital camera and transport the signal to client through Wi-Fi network. The way of ...


Lossless Image Compression Based on Integer Wavelet Transform and Context Prediction

Runhai Jiao 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010

In this paper, we analyze the correlation between wavelet coefficients. In order to use both inter-band and intra-band correlation, we build context prediction model for significance and refinement bits. Combining with sign bit prediction model of JPEG2000, we propose a lossless image compression algorithm. Compression experimental results show that our algorithm outperforms both JPEG2000 and JPEG-LS international standard.


Delay modeling and analysis in DTN multicasting

Lei Yin; Yuan-da Cao; Ke Long 2009 ISECS International Colloquium on Computing, Communication, Control, and Management, 2009

The main character of Delay Tolerant Networks (DTNs) is that there is not an end-to-end path from the source node to the destinations due to the intermittent connections and mobility of nodes. In this paper, we construct the mathematic model based on queue with vacation theory to analyze the impact of buffer management strategy on DTN multicast routing, and then ...


More Xplore Articles

Educational Resources on Networking

Back to Top

eLearning

A new open-hole buried heterostructure process for the fabrication of photonic integrated circuits

Y. Sun; X. M. Ji; Z. Chen; J. Z. Yan; J. X. Cai; M. Raj; F. -S. Choa The 16th Annual Meeting of the IEEE Lasers and Electro-Optics Society, 2003. LEOS 2003., 2003

We have successfully fabricated several batches of open-hole buried heterostructure (BH) lasers using self-align technique with a hole of about 3 μm opening. This new processing technology have in the active region, a traditional buried heterostructure (BH) with semiinsulating InP which works as a current block material. While in the passive region, the semiinsulating InP is the waveguide cladding material. ...


Sentiment analysis of economic news in Bahasa Indonesia using majority vote classifier

Zamahsyari; Arif Nurwidyantoro 2016 International Conference on Data and Software Engineering (ICoDSE), 2016

Internet acts as a media to publicite news, which divided into various categories, such as politics, economics, sports, and health. Each has tendency to publish the news with positive or negative sentiment. News sentiment has ability to affect people's opinion about a topic or government policy. Economy is one interesting topic which has direct impact to Indonesian citizen. Hence, this ...


The Remote Surveillance System Based on the Processor -- S3C2410

Xue-Qin Wu; Hong-Jun Chen 2012 International Conference on Computer Science and Electronics Engineering, 2012

This thesis brings forward to a resolution of embedded remote surveillance based on the demand of reality. The system is centering on the embedded Linux and S3C2410, and basing on the Wi-Fi network to build the embedded remote surveillance, which can capture video signal from USB digital camera and transport the signal to client through Wi-Fi network. The way of ...


Lossless Image Compression Based on Integer Wavelet Transform and Context Prediction

Runhai Jiao 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010

In this paper, we analyze the correlation between wavelet coefficients. In order to use both inter-band and intra-band correlation, we build context prediction model for significance and refinement bits. Combining with sign bit prediction model of JPEG2000, we propose a lossless image compression algorithm. Compression experimental results show that our algorithm outperforms both JPEG2000 and JPEG-LS international standard.


Delay modeling and analysis in DTN multicasting

Lei Yin; Yuan-da Cao; Ke Long 2009 ISECS International Colloquium on Computing, Communication, Control, and Management, 2009

The main character of Delay Tolerant Networks (DTNs) is that there is not an end-to-end path from the source node to the destinations due to the intermittent connections and mobility of nodes. In this paper, we construct the mathematic model based on queue with vacation theory to analyze the impact of buffer management strategy on DTN multicast routing, and then ...


More eLearning Resources

IEEE-USA E-Books

  • Narrating Neoliberalism: Tales of Promiscuous Assemblage

    This chapter contains sections titled: Civilization and the Official Story, Market Manners, Gossiping Civil Perversion

  • Waves and Forms

    Technical objects constrain what users do with them. They are not neutral entities but embody information, choices, values, assumptions, or even mistakes embedded by designers. What happens when a technology is designed in one culture and used in another? What happens, for example, when a Chinese user is confronted by Roman-alphabet-embedded interfaces? In this book, Basile Zimmermann examines the relationship between technical objects and culture in contemporary China, drawing on concepts from science and technology studies (STS). He presents a new theoretical framework for "culture" based on the notions of _waves _and _forms_, which provides a powerful descriptive toolkit for technology and culture. The materials Zimmermann uses to develop and illustrate his theoretical arguments come from three groups of case studies about the use of technical devices in today's China. The first and most extensive group consists of observations of electronic music devices in Be jing; the second is a study of a Chinese networking site, "Happy Network"; and the third is a collection of personal, small-scale observations on the way Chinese characters behave when located in alphabet-encoded devices such as mobile phones, web pages, or printed documents. Zimmermann discusses well-known frameworks from STS and combines them with propositions and topics from Chinese studies. Each of the case studies advances his theoretical argument. Zimmermann's account shows how cultural differences can be integrated into STS research, and how sinologists can turn their attention from ancient texts and traditional art to everyday things in present-day China.

  • Hacking at the Periphery

    In Networking Peripheries, Anita Chan shows how digital cultures flourish beyond Silicon Valley and other celebrated centers of technological innovation and entrepreneurship. The evolving digital cultures in the Global South vividly demonstrate that there are more ways than one to imagine what digital practice and global connection could look like. To explore these alternative developments, Chan investigates the diverse initiatives being undertaken to "network" the nation in contemporary Peru, from attempts to promote the intellectual property of indigenous artisans to the national distribution of digital education technologies to open technology activism in rural and urban zones.Drawing on ethnographic accounts from government planners, regional free-software advocates, traditional artisans, rural educators, and others, Chan demonstrates how such developments unsettle dominant conceptions of information classes and innovations zones. Government efforts to turn rural artisans into a new creative class progress alongside technology activists' efforts to promote indigenous rights through information tactics; plans pressing for the state wide adoption of open source--based technologies advance while the One Laptop Per Child initiative aims to network rural classrooms by distributing laptops. As these cases show, the digital cultures and network politics emerging on the periphery do more than replicate the technological future imagined as universal from the center.

  • No title

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-awar computer architectures.

  • Polyvocal Networks: Advocating Free Software in Latin America

    This chapter contains sections titled: Speaking through Software, Network Spokesmen, Network Narrators, Letters, Legislation, and Disrupting Progress Accounts, Accounting for Local Government, Summoning Citizens, Democracy, and Code, Articulating Identities of Possibility, Repercussions: Microsoft and Other Interventions, Speaking for and through the Network

  • “General‐Purpose” Mobility Models

    **This book highlights the practices for designing effective protocols/applications for next generation wireless networks** In this book, the author provides the reader with an overview of mobility modeling, encompassing both theoretical and practical aspects related to the challenging mobility modeling task. The first part of the book introduces next generation wireless networks, providing motivations for the need of carefully modeling mobility as part of the network performance evaluation process. In addition, it describes "general-purpose" mobility models (i.e., models that are not tailored to specific application scenarios), including both theoretical and practical aspects. Furthermore, the author explores mobility models tailored to specific application scenarios of next generation wireless networks. In particular, the author considers WLAN/mesh networks, vehicular networks, wireless sensor networks, and opportunistic networks. For each considere application scenario, the book briefly presents the state-of-the-art and prospective of the corresponding technology as well as a representative set of mobility models. Finally, the book offers two case studies, which illustrate exemplary situations in which a deep understanding of mobility modeling can be used to devise a "perfect" wireless network simulation methodology (Case study 1), and to characterize fundamental properties of message routing in opportunistic networks, also including social human behavior (Case study 2). _Key Features:_ * Offers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and opportunistic networks * Demonstrates the practices for designing effective protocol/applications for next generation wireless networks * Includes case studies showcasing the im ortance of properly understanding fundamental mobility model properties in wireless network performance evaluation _Mobility Models for Next Generation Wireless Networks_ will be an invaluable guide for researchers and engineers in the field of wireless networking, and graduate students in computer science and engineering. It will also be of interest to wireless professionals and networking system developers.

  • Culture, Chinese Studies, and STS

    Technical objects constrain what users do with them. They are not neutral entities but embody information, choices, values, assumptions, or even mistakes embedded by designers. What happens when a technology is designed in one culture and used in another? What happens, for example, when a Chinese user is confronted by Roman-alphabet-embedded interfaces? In this book, Basile Zimmermann examines the relationship between technical objects and culture in contemporary China, drawing on concepts from science and technology studies (STS). He presents a new theoretical framework for "culture" based on the notions of _waves _and _forms_, which provides a powerful descriptive toolkit for technology and culture. The materials Zimmermann uses to develop and illustrate his theoretical arguments come from three groups of case studies about the use of technical devices in today's China. The first and most extensive group consists of observations of electronic music devices in Be jing; the second is a study of a Chinese networking site, "Happy Network"; and the third is a collection of personal, small-scale observations on the way Chinese characters behave when located in alphabet-encoded devices such as mobile phones, web pages, or printed documents. Zimmermann discusses well-known frameworks from STS and combines them with propositions and topics from Chinese studies. Each of the case studies advances his theoretical argument. Zimmermann's account shows how cultural differences can be integrated into STS research, and how sinologists can turn their attention from ancient texts and traditional art to everyday things in present-day China.

  • Cellular Networks

    This chapter contains sections titled: Introduction General Architecture of a Cellular Network Mechanisms to Support a Mobile Environment Protocol Stack in Cellular Networks Physical Layer in TDMA Air Interface Physical Layer in CDMA Air Interface Achieving Higher Data Rates in Cellular Networks Deployment of Cellular Networks Questions Problems

  • Recoding Identity: Free Software and the Local Ethics of Play

    This chapter contains sections titled: Play and Potential, Software Choice and Ethics of the Self, The Danger of Play

  • Random Walk Models

    **This book highlights the practices for designing effective protocols/applications for next generation wireless networks** In this book, the author provides the reader with an overview of mobility modeling, encompassing both theoretical and practical aspects related to the challenging mobility modeling task. The first part of the book introduces next generation wireless networks, providing motivations for the need of carefully modeling mobility as part of the network performance evaluation process. In addition, it describes "general-purpose" mobility models (i.e., models that are not tailored to specific application scenarios), including both theoretical and practical aspects. Furthermore, the author explores mobility models tailored to specific application scenarios of next generation wireless networks. In particular, the author considers WLAN/mesh networks, vehicular networks, wireless sensor networks, and opportunistic networks. For each considere application scenario, the book briefly presents the state-of-the-art and prospective of the corresponding technology as well as a representative set of mobility models. Finally, the book offers two case studies, which illustrate exemplary situations in which a deep understanding of mobility modeling can be used to devise a "perfect" wireless network simulation methodology (Case study 1), and to characterize fundamental properties of message routing in opportunistic networks, also including social human behavior (Case study 2). _Key Features:_ * Offers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and opportunistic networks * Demonstrates the practices for designing effective protocol/applications for next generation wireless networks * Includes case studies showcasing the im ortance of properly understanding fundamental mobility model properties in wireless network performance evaluation _Mobility Models for Next Generation Wireless Networks_ will be an invaluable guide for researchers and engineers in the field of wireless networking, and graduate students in computer science and engineering. It will also be of interest to wireless professionals and networking system developers.



Standards related to Networking

Back to Top

IEEE Recommended Practice for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 15.2: Coexistence of Wireless Personal Area Networks with Other Wireless Devices Operating in Unlicensed Frequency Bands

To develop a Recommended Practice for an IEEE 802.15 Wireless Personal Area network that coexists with other selected wireless devices operating in unlicensed frequency bands. To suggest modifications to other IEEE 802.15 standard(s) to enhance coexistence with other selected wireless devices operating in unlicensed frequency bands. To suggest recommended practices for IEEE 802.11 devices to facilitate coexistence with IEEE 802.15 ...


IEEE Standard Environmental and Testing Requirements for Communications Networking Devices in Electric Power Substations

Original This project covers communications networking devices installed in electric power substations. Such devices include modems


IEEE Standard Environmental and Testing Requirements for Communications Networking Devices in Electric Power Substations Amendment 1: Add Requirements for Altitude and Altitude Derating Factors


IEEE Standard Environmental and Testing Requirements for Communications Networking Devices in Electric Power Substations - Corrigendum 1

The scope is to delete one paragraph to bring IEEE 1613 in conformance with the recently balloted revision to IEEE C37.90, an effort by the Power Systems Relaying Committee.


IEEE Standard for Conformance to IEEE 802.16 - Part 4: Protocol Implementation Conformance Statement (PICS) Proforma for Frequencies below 11 GHz

This standard represents the Protocol Implementation Conformance Statement (PICS) Proforma, per ISO/IEC Standard 9646-7 (1995) and ITU-T X.296, for conformance specification of base stations and subscriber stations based upon the air interface specified in IEEE P802.16-REVd for frequencies below 11 GHz.


More Standards

Jobs related to Networking

Back to Top