IEEE Organizations related to Protocols

Back to Top


Conferences related to Protocols

Back to Top

2014 IEEE Radio and Wireless Symposium (RWS)

RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state -of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2013 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2012 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2011 IEEE Radio and Wireless Symposium (RWS)

    All aspects of components and systems related to radio and wireless networks.

  • 2010 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss various aspects of wireless communication systems and the state-of-the-art in both fields by exploring the connections between hardware design and system performance.


IEEE INFOCOM 2014 - IEEE Conference on Computer Communications

The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented in a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2013 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented in a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2012 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2011 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2010 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks.


NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium

Held in even-numbered years since 1988, NOMS continues to be the primary forum for technical exchange of research, standards, development, systems integrator, service providers, and user communities, presenting the latest approaches and technical solutions in the area of network operations and management.

  • NOMS 2012 - 2012 IEEE/IFIP Network Operations and Management Symposium

    Held in even-numbered years since 1988, NOMS 2012 will follow the 24 years tradition of NOMS and IM as the primary forum for technical exchange on network management in terms of research, standards, development, systems integration, service provider, and user communities. NOMS 2012 will present up-to-date approaches and technical solutions for new management paradigms to deal with the new management issues in future infrastructures such as Web 2.0 or beyond service environments and cloud computing platform

  • NOMS 2010 - 2010 IEEE/IFIP Network Operations and Management Symposium

    Held in even-numbered years since 1988, NOMS 2010 will follow the 22 years tradition of NOMS and IM as the primary forum for technical exchange on network management in terms of research, standards, development, systems integration, service provider, and user communities. NOMS 2010 will present up-to-date approaches and technical solutions for new management paradigms to deal with the new management issues in future infrastructures such as Web 2.0 or beyond service environments, cloud computing platforms or

  • NOMS 2008 - 2008 IEEE Network Operations and Management Symposium


2013 11th Workshop on Intelligent Solutions in Embedded Systems (WISES)

WISES is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems.

  • 2012 10th Workshop on Intelligent Solutions in Embedded Systems (WISES)

    Forum for discussing refereed papers among researchers and developers both from industry and academia. Topics include embedded systems architectures, novel hardware platforms, software, prototype platforms, tools and methodologies for analysis, exploration and validation.

  • 2011 Ninth Workshop on Intelligent Solutions in Embedded Systems (WISES)

    WISES 2011 is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems. The objective of this workshop is to present mature approaches and to provide a forum for the exchange and discussion of ideas, and thus, the sharing of experiences among researchers, practitioners, and application developers both from industry and academia.

  • 2010 8th Workshop on Intelligent Solutions in Embedded Systems (WISES)

    WISES2010 focuses on intelligent solutions in embedded systems. The objective is to present mature approaches and foster the exchange of ideas and experiences among researchers and application developers. Papers describing prototype implementations and deployments of embedded systems are particularly welcome in: embedded systems architecture, software for single or multi-core embedded systems, prototype platforms, applications and case studies, and tools and methodologies for analysis, explorati

  • 2009 Seventh Workshop on Intelligent Solutions in Embedded Systems (WISES 2009)

    WISES is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems.

  • 2008 International Workshop on Intelligent Solutions in Embedded Systems (WISES 2008)

    WISES 2008 is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems. The objective of this workshop is to present mature approaches and to provide a forum for the exchange and discussion of ideas, and thus, the sharing of experiences among researchers, practitioners, and application developers both from industry and academia.

  • 2007 International Workshop on Intelligent Solutions in Embedded Systems (WISES 2007)

    Topic of interest include, but are not limited to: Smart embedded (real-time) systems, Autonomous embedded systems, Sensor networks and sensor node hardware/software platforms, Software for embedded systems, Topology control and time synchronization, Fault tolerance, security and robustness, Network protocols and middleware for embedded systems, Standardisation of embedded software components, Data gathering, aggregation and dissemination, Prototypes


2013 IEEE 77th Vehicular Technology Conference (VTC Spring)

VTC will bring together individuals from academia, industry and government to discuss and exchange ideas in the fields of mobile, wireless and vehicular technology as well as the applications and services associated with such technology. Features include world-class plenary speakers, panel sessions, tutorials, and both technical and application-based sessions.

  • 2012 IEEE Vehicular Technology Conference (VTC 2012-Spring)

    VTC will bring together individuals from academia, industry and government to discuss and exchange ideas in the fields of mobile, wireless and vehicular technology as well as the applications and services associated with such technology. Features include world-class plenary speakers, panel sessions, tutorials, and both technical and application-based sessions.

  • 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring)

    VTC will bring together individuals from academia, industry and government to discuss and exchange ideas in the fields of mobile, wireless and vehicular technology as well as the applications and services associated with such technology. Features include world-class plenary speakers, panel sessions, tutorials, and both technical and application-based sessions.

  • 2010 IEEE Vehicular Technology Conference (VTC 2010-Spring)

    TBD

  • 2009 IEEE Vehicular Technology Conference (VTC 2009-Spring)

    TBD

  • 2008 IEEE Vehicular Technology Conference (VTC 2008-Spring)

    This conference will bring together various vehicular technologies, researchers and developers to discuss the current status of research, technical challenges, standards, fundamental issues, and future services and applications, presented in the form of technical sessions, panels and tutorials.


More Conferences

Periodicals related to Protocols

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Networking, IEEE/ACM Transactions on

Network architecture and design, communication protocols, network software, network technologies, network software, network technologies, network services and applications, and network operations and management.




Xplore Articles related to Protocols

Back to Top

Simplicity versus accuracy in a model of cache coherency overhead

S. J. Eggers IEEE Transactions on Computers, 1991

The important factors building a model of coherency overhead for a single-bus, shared memory multiprocessor are analyzed. Three architectural features are examined: the size of the coherency block, the cache size, and the type of bus operation used to carry out a particular coherency function. The experiments judge the effect of each architectural parameter on model accuracy by selectively including ...


Enterprise Software Service Emulation: Constructing Large-Scale Testbeds

Cameron Hine; Jean-Guy Schneider; Jun Han; Steve Versteeg 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED), 2016

Constructing testbeds for systems which are interconnected with large networks of other software services is a challenging task. It is particularly difficult to create testbeds facilitating evaluation of the non-functional qualities of a system, such as scalability, that can be expected in production deployments. Software service emulation is an approach for creating such testbeds where service behaviour is defined by ...


A generic end-to-end monitoring architecture for multimedia services

A. Cuadra; F. Garces; J. A. del Sol; G. Nieto 2009 IFIP/IEEE International Symposium on Integrated Network Management, 2009

This paper describes a generic architecture for monitoring multimedia services, such as IPTV, MobileTV or VoIP, by analyzing the traffic of real users from an end-to-end perspective. The main data source is the information gathered by different types of probes deployed all over the monitored network. In addition, these detailed records are correlated inside the core of the architecture in ...


pH Neutralization Through Internet

Kostas N. Tarchanidis; John N. Lygouras; Theodore Pachidis; Vassilis Kodogiannis; Christos G. Chatziandreoglou 2006 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems, 2006

This project uses an IDAC-1 board to sample and control the pH level in a tank. The whole control is performed through the Internet. The experimental arrangement is placed on the task location and the controlling computer is located in a different one. Internet is the transport media. The protocol used in this project is UDP/IP. The pH level is ...


Enhanced Playback of Automated Service Emulation Models Using Entropy Analysis

Steve Versteeg; Miao Du; John Bird; Jean-Guy Schneider; John Grundy; Jun Han 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED), 2016

Service virtualisation is a supporting tool for DevOps to generate interactive service models of dependency systems on which a system-under-test relies. These service models allow applications under development to be continuously tested against production-like conditions. Generating these virtual service models requires expert knowledge of the service protocol, which may not always be available. However, service models may be generated automatically ...


More Xplore Articles

Educational Resources on Protocols

Back to Top

eLearning

Simplicity versus accuracy in a model of cache coherency overhead

S. J. Eggers IEEE Transactions on Computers, 1991

The important factors building a model of coherency overhead for a single-bus, shared memory multiprocessor are analyzed. Three architectural features are examined: the size of the coherency block, the cache size, and the type of bus operation used to carry out a particular coherency function. The experiments judge the effect of each architectural parameter on model accuracy by selectively including ...


Enterprise Software Service Emulation: Constructing Large-Scale Testbeds

Cameron Hine; Jean-Guy Schneider; Jun Han; Steve Versteeg 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED), 2016

Constructing testbeds for systems which are interconnected with large networks of other software services is a challenging task. It is particularly difficult to create testbeds facilitating evaluation of the non-functional qualities of a system, such as scalability, that can be expected in production deployments. Software service emulation is an approach for creating such testbeds where service behaviour is defined by ...


A generic end-to-end monitoring architecture for multimedia services

A. Cuadra; F. Garces; J. A. del Sol; G. Nieto 2009 IFIP/IEEE International Symposium on Integrated Network Management, 2009

This paper describes a generic architecture for monitoring multimedia services, such as IPTV, MobileTV or VoIP, by analyzing the traffic of real users from an end-to-end perspective. The main data source is the information gathered by different types of probes deployed all over the monitored network. In addition, these detailed records are correlated inside the core of the architecture in ...


pH Neutralization Through Internet

Kostas N. Tarchanidis; John N. Lygouras; Theodore Pachidis; Vassilis Kodogiannis; Christos G. Chatziandreoglou 2006 IEEE Symposium on Virtual Environments, Human-Computer Interfaces and Measurement Systems, 2006

This project uses an IDAC-1 board to sample and control the pH level in a tank. The whole control is performed through the Internet. The experimental arrangement is placed on the task location and the controlling computer is located in a different one. Internet is the transport media. The protocol used in this project is UDP/IP. The pH level is ...


Enhanced Playback of Automated Service Emulation Models Using Entropy Analysis

Steve Versteeg; Miao Du; John Bird; Jean-Guy Schneider; John Grundy; Jun Han 2016 IEEE/ACM International Workshop on Continuous Software Evolution and Delivery (CSED), 2016

Service virtualisation is a supporting tool for DevOps to generate interactive service models of dependency systems on which a system-under-test relies. These service models allow applications under development to be continuously tested against production-like conditions. Generating these virtual service models requires expert knowledge of the service protocol, which may not always be available. However, service models may be generated automatically ...


More eLearning Resources

IEEE-USA E-Books

  • Mobile Video Streaming

    Mobile networks have constraints such as energy consumption, limited radio spectrum, radio propagation characteristics, and interference. It is not possible to deliver video streaming data without adaptation at client or server or network. This chapter aims at describing the challenges in delivering video in mobile network. It also presents various adaptation technologies for mobile video streaming, and identifies a few potential research problems to improve mobile video steaming service. First, an overview of a mobile broadband architecture is provided. Next, the chapter talks about video streaming protocols. HyperText Transfer Protocol (HTTP) and Real???Time Streaming Protocol (RTSP) are two popular protocols used for video streaming. The chapter illustrates how video optimizer (VO) and content delivery network (CDN)???based delivery techniques are applied in mobile networks to deliver video streaming in an effective manner while maintaining good quality of experience (QoE).

  • Boring Protocols

    Java is a new object-oriented programming language that was developed by Sun Microsystems for programming the Internet and intelligent appliances. In a very short time it has become one of the most widely used programming languages for education as well as commercial applications.Design patterns, which have moved object-oriented programming to a new level, provide programmers with a language to communicate with others about their designs. As a result, programs become more readable, more reusable, and more easily extensible.In this book, Matthias Felleisen and Daniel Friedman use a small subset of Java to introduce pattern-directed program design. With their usual clarity and flair, they gently guide readers through the fundamentals of object-oriented programming and pattern-based design. Readers new to programming, as well as those with some background, will enjoy their learning experience as they work their way through Felleisen and Friedman's dialogue.

  • A Perspective on the Design of Power Control for Mobile Ad Hoc Networks

    One major challenge in the design of mobile ad hoc networks (MANETs) is how to simultaneously provide high network throughput and low energy communications between mobile nodes. Transmission power control (TPC) has a great potential to achieve this goal. In this paper, we investigate the issue of TPC in MANETs and examine various TPC approaches proposed in the literature. We give insight into the efficiency of such approaches and their ability to attain their design objectives. We discuss the factors that influence the selection of the transmission power, including the important interaction between the routing (network) and the medium access control (MAC) layers. Protocols that account for such interaction are presented. We argue that using the minimum transmission power does not deliver the maximum throughput in MANETs. The impact of mobility on the design of power controlled MAC protocols is also addressed. Various complementary approaches and optimizations are highlighted and discussed, including the use of rate control, directional antennas, spread spectrum technology, and power saving modes. Finally, we outline several directions for future research in this area.

  • Multicasting, Geocasting, and Anycasting in Sensor and Actuator Networks

    This chapter contains sections titled: Multicasting Geocasting with Guaranteed Delivery Rate-Based Multicasting Anycasting with Guaranteed Delivery References

  • Routing Algorithms for EnergyEfficient Reliable Packet Delivery in Multihop Wireless Networks

    Algorithms for minimum-energy routing in wireless networks typically select minimum cost multihop paths. In scenarios where the transmission power is fixed, each link has the same cost and the minimum hop path is selected. In situations where the transmission power can be varied with the distance of the link, the link cost is higher for longer hops; the energy aware routing algorithms select a path with a large number of small distance hops. In this chapter, we argue that such a formulation based solely on the energy spent in a single transmission is not able to find minimum energy paths for end to end reliable packet transmissions. The proper metric should include the total energy (including that expended for any retransmissions necessary) spent in reliably delivering the packet to its final destination. We first examine how link error rates affect this retransmission aware metric, and how it leads to an efficient choice between a path with a large number of short distance hops and another with a smaller number of large distance hops. Such studies motivate the definition of a link cost that is a function of both the energy required for a single transmission attempt across the link and the link error rate. This cost function captures the cumulative energy expended in reliable data transfer, for both reliable and unreliable link layers. Through detailed simulations, we show that such schemes can lead to up to 30-70% energy savings over best known current schemes, under realistic environments. We next describe how these techniques can be applied to work with on demand routing protocols. In particular, we focus on one specific on demand routing protocol, namely Ad hoc On Demand routing protocol (AODV), and show how it should be adapted to compute energy efficient reliable paths. We perform a detailed study of the AODV protocol and our energy efficient variants, under var ious noise and node mobility conditions. Our results show that even in low noise environments there are specific scenarios where an unmodified on demand protocol will achieve significantly lower throughput in comparison to our modified variants. Our results show that our proposed variants of on demand routing protocols can achieve between 10% to orders of magnitude improvement in energy efficiency of reliable data paths.

  • No title

    This Synthesis Lecture presents a discussion of Quality of Service (QoS) in wireless networks over unlicensed spectrum. The topic is presented from the point of view of protocols for wireless networks (e.g., 802.11) rather than the physical layer point of view usually discussed for cellular networks in the licensed wireless spectrum. A large number of mobile multimedia wireless applications are being deployed over WiFi (IEEE 802.11) and Bluetooth wireless networks and the number will increase in the future as more phones, tablets, and laptops are equipped with these unlicensed spectrum wireless interfaces. Achieving QoS objectives in wireless networks is challenging due to limited wireless resources, wireless nodes interference, wireless shared media, node mobility, and diverse topologies. The author presents the QoS problem as (1) an optimization problem with different constraints coming from the interference, mobility, and wireless resource constraints and (2) an algorithmic problem with fundamental algorithmic functions within wireless resource management and protocols. Table of Contents: Preface / Basics of Quality of Service in Wireless Networks / QoS-Aware Resource Allocation / Bandwidth Management / Delay Management / Routing / Acknowledgment / References / Author Biography

  • Protocols and Programs

    This chapter contains sections titled: Actions, Protocols and Contexts, Programs, Specifications, Exercises, Notes

  • Sink Mobility in Wireless Sensor Networks

    This chapter contains sections titled: Introduction Energy Hole Problem Energy Efficiency by Sink Mobility Sink Mobility in Delay-Tolerant Networks Sink Mobility in Real-Time Networks References

  • Front Matter

    The prelims comprise: Half???Title Page Series Page Title Page Copyright Page Dedication Page Table of Contents Preface

  • About the Author

    "Meet the challenge of protecting your telecommunications network management system with SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT. Leading expert Moshe Rozenblit explains pertinent security-related features to use in your products and offers practical solutions to enable you to plan, implement, and manage the evolution of your network security mechanisms and to better manage security components from several suppliers to ensure overall security of your network management. This book provides a comprehensive discussion of security for telecommunications network management including these featured topics: * Overview of network management for security professionals * Introduction to security mechanisms for network managers * A complete account of OSI-based security management * In-depth analysis of security operations for telecommunications networks * Insights into how to integrate security of network management, management of security-related information, and network operations * The latest security for all standard protocols used in network management: CMIP, CORBA, EDI, and SNMP * Astute comparison of security options and their tradeoffs. SECURITY FOR TELECOMMUNICATIONS NETWORK MANAGEMENT is intended to assist network architects, operations planners, system designers, software engineers, and operation systems developers in understanding and addressing the security implications of the telecommunications network (TMN) in the telecommunications industry, as well as in finance, large manufacturing, military, and government environments."



Standards related to Protocols

Back to Top

No standards are currently tagged "Protocols"


Jobs related to Protocols

Back to Top