IEEE Organizations related to Protocols

Back to Top


Conferences related to Protocols

Back to Top

2014 IEEE Radio and Wireless Symposium (RWS)

RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state -of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2013 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2012 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2011 IEEE Radio and Wireless Symposium (RWS)

    All aspects of components and systems related to radio and wireless networks.

  • 2010 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss various aspects of wireless communication systems and the state-of-the-art in both fields by exploring the connections between hardware design and system performance.


IEEE INFOCOM 2014 - IEEE Conference on Computer Communications

The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented in a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2013 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented in a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2012 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2011 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks. Material is presented a program of technical sessions, panel discussions and workshops.

  • IEEE INFOCOM 2010 - IEEE Conference on Computer Communications

    The IEEE Conference on Computer Communications addresses key topics and issues related to computer communications, with emphasis on traffic management and protocols for both wired and wireless networks.


NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium

Held in even-numbered years since 1988, NOMS continues to be the primary forum for technical exchange of research, standards, development, systems integrator, service providers, and user communities, presenting the latest approaches and technical solutions in the area of network operations and management.

  • NOMS 2012 - 2012 IEEE/IFIP Network Operations and Management Symposium

    Held in even-numbered years since 1988, NOMS 2012 will follow the 24 years tradition of NOMS and IM as the primary forum for technical exchange on network management in terms of research, standards, development, systems integration, service provider, and user communities. NOMS 2012 will present up-to-date approaches and technical solutions for new management paradigms to deal with the new management issues in future infrastructures such as Web 2.0 or beyond service environments and cloud computing platform

  • NOMS 2010 - 2010 IEEE/IFIP Network Operations and Management Symposium

    Held in even-numbered years since 1988, NOMS 2010 will follow the 22 years tradition of NOMS and IM as the primary forum for technical exchange on network management in terms of research, standards, development, systems integration, service provider, and user communities. NOMS 2010 will present up-to-date approaches and technical solutions for new management paradigms to deal with the new management issues in future infrastructures such as Web 2.0 or beyond service environments, cloud computing platforms or

  • NOMS 2008 - 2008 IEEE Network Operations and Management Symposium


2013 11th Workshop on Intelligent Solutions in Embedded Systems (WISES)

WISES is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems.

  • 2012 10th Workshop on Intelligent Solutions in Embedded Systems (WISES)

    Forum for discussing refereed papers among researchers and developers both from industry and academia. Topics include embedded systems architectures, novel hardware platforms, software, prototype platforms, tools and methodologies for analysis, exploration and validation.

  • 2011 Ninth Workshop on Intelligent Solutions in Embedded Systems (WISES)

    WISES 2011 is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems. The objective of this workshop is to present mature approaches and to provide a forum for the exchange and discussion of ideas, and thus, the sharing of experiences among researchers, practitioners, and application developers both from industry and academia.

  • 2010 8th Workshop on Intelligent Solutions in Embedded Systems (WISES)

    WISES2010 focuses on intelligent solutions in embedded systems. The objective is to present mature approaches and foster the exchange of ideas and experiences among researchers and application developers. Papers describing prototype implementations and deployments of embedded systems are particularly welcome in: embedded systems architecture, software for single or multi-core embedded systems, prototype platforms, applications and case studies, and tools and methodologies for analysis, explorati

  • 2009 Seventh Workshop on Intelligent Solutions in Embedded Systems (WISES 2009)

    WISES is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems.

  • 2008 International Workshop on Intelligent Solutions in Embedded Systems (WISES 2008)

    WISES 2008 is a platform for presentation of innovative approaches that provide intelligent solutions in embedded systems. The objective of this workshop is to present mature approaches and to provide a forum for the exchange and discussion of ideas, and thus, the sharing of experiences among researchers, practitioners, and application developers both from industry and academia.

  • 2007 International Workshop on Intelligent Solutions in Embedded Systems (WISES 2007)

    Topic of interest include, but are not limited to: Smart embedded (real-time) systems, Autonomous embedded systems, Sensor networks and sensor node hardware/software platforms, Software for embedded systems, Topology control and time synchronization, Fault tolerance, security and robustness, Network protocols and middleware for embedded systems, Standardisation of embedded software components, Data gathering, aggregation and dissemination, Prototypes


2013 IEEE 77th Vehicular Technology Conference (VTC Spring)

VTC will bring together individuals from academia, industry and government to discuss and exchange ideas in the fields of mobile, wireless and vehicular technology as well as the applications and services associated with such technology. Features include world-class plenary speakers, panel sessions, tutorials, and both technical and application-based sessions.

  • 2012 IEEE Vehicular Technology Conference (VTC 2012-Spring)

    VTC will bring together individuals from academia, industry and government to discuss and exchange ideas in the fields of mobile, wireless and vehicular technology as well as the applications and services associated with such technology. Features include world-class plenary speakers, panel sessions, tutorials, and both technical and application-based sessions.

  • 2011 IEEE Vehicular Technology Conference (VTC 2011-Spring)

    VTC will bring together individuals from academia, industry and government to discuss and exchange ideas in the fields of mobile, wireless and vehicular technology as well as the applications and services associated with such technology. Features include world-class plenary speakers, panel sessions, tutorials, and both technical and application-based sessions.

  • 2010 IEEE Vehicular Technology Conference (VTC 2010-Spring)

    TBD

  • 2009 IEEE Vehicular Technology Conference (VTC 2009-Spring)

    TBD

  • 2008 IEEE Vehicular Technology Conference (VTC 2008-Spring)

    This conference will bring together various vehicular technologies, researchers and developers to discuss the current status of research, technical challenges, standards, fundamental issues, and future services and applications, presented in the form of technical sessions, panels and tutorials.


More Conferences

Periodicals related to Protocols

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Knowledge and Data Engineering, IEEE Transactions on

Artificial intelligence techniques, including speech, voice, graphics, images, and documents; knowledge and data engineering tools and techniques; parallel and distributed processing; real-time distributed processing; system architectures, integration, and modeling; database design, modeling, and management; query design, and implementation languages; distributed database control; statistical databases; algorithms for data and knowledge management; performance evaluation of algorithms and systems; data communications aspects; system ...


Networking, IEEE/ACM Transactions on

Network architecture and design, communication protocols, network software, network technologies, network software, network technologies, network services and applications, and network operations and management.




Xplore Articles related to Protocols

Back to Top

Variant Enhanced Dynamic Frame Slotted ALOHA Algorithm for Fast Object Identification in RFID System

Qingsong Peng; Ming Zhang; Weimin Wu 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

This paper analyses the practical faults existing in enhanced dynamic frame slotted ALOHA (EDFSA) algorithms, and discusses the strategy to improve the efficiency of anti-collision algorithm in RFID system. EDFSA algorithm divides the tags into a number of groups and allows only one group of tags to respond when the number of tags is much larger than optimal efficiency tags. ...


Theoretic framework of network feedback control with long delays

B. G. Kim; S. S. Joo; H. H. Lee Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops, 2000

It is well known that feedback control may be difficult in a network with long propagation delays (with large bandwidth-delay products). The focus of this article is to provide a theoretical framework of various feedback-based congestion control techniques. Two broad classes of control algorithms are presented: source- and switch (network)-intelligence models. In a source- intelligence model, traffic sources adjust their ...


Coupling of simulators for the investigation of car-to-x communication aspects

Henrik Schumacher; Moritz Schack; Thomas Kürner 2009 IEEE Asia-Pacific Services Computing Conference (APSCC), 2009

Accompanied by the continuous progression of the maturity of car-to-x communication protocols and corresponding system architectures, the need for integrated network simulation approaches which consider realistic channel modeling on the one hand and appropriate mobility models on the other hand becomes more and more observable. Moreover, in order to analyze the impacts of car-to-x applications on the behavior of vehicles, ...


Client-server application for the operator panel Weintek and the control system Siemens Simotion

Jaroslav Antoš; Martin Bušek Proceedings of the 2014 15th International Carpathian Control Conference (ICCC), 2014

This article describes the communication between the Weintek touch panel and the Siemens Simotion programmable logic controller. This communication is based on the Client-Server architecture. These particular devices from these particular producers ordinarily are not supposed to communicate between each other. With a designed application this communication is possible. Because of this, it is possible to use a robust Simotion ...


To Send or Not to Send - Learning MAC Contention

SaiDhiraj Amuru; Yuanzhang Xiao; Mihaela van der Schaar; R. Michael Buehrer 2015 IEEE Global Communications Conference (GLOBECOM), 2015

The exponential back-off mechanism, proposed for reducing MAC- layer contention in the 802.11 standard, is sub-optimal in terms of the network throughput. This back-off mechanism and its improved variants are especially inefficient under unknown dynamics such as packet arrivals and user entry/exit. In this paper, we formulate the problem of optimizing this back- off mechanism as a Markov decision process, ...


More Xplore Articles

Educational Resources on Protocols

Back to Top

eLearning

Variant Enhanced Dynamic Frame Slotted ALOHA Algorithm for Fast Object Identification in RFID System

Qingsong Peng; Ming Zhang; Weimin Wu 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), 2007

This paper analyses the practical faults existing in enhanced dynamic frame slotted ALOHA (EDFSA) algorithms, and discusses the strategy to improve the efficiency of anti-collision algorithm in RFID system. EDFSA algorithm divides the tags into a number of groups and allows only one group of tags to respond when the number of tags is much larger than optimal efficiency tags. ...


Theoretic framework of network feedback control with long delays

B. G. Kim; S. S. Joo; H. H. Lee Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops, 2000

It is well known that feedback control may be difficult in a network with long propagation delays (with large bandwidth-delay products). The focus of this article is to provide a theoretical framework of various feedback-based congestion control techniques. Two broad classes of control algorithms are presented: source- and switch (network)-intelligence models. In a source- intelligence model, traffic sources adjust their ...


Coupling of simulators for the investigation of car-to-x communication aspects

Henrik Schumacher; Moritz Schack; Thomas Kürner 2009 IEEE Asia-Pacific Services Computing Conference (APSCC), 2009

Accompanied by the continuous progression of the maturity of car-to-x communication protocols and corresponding system architectures, the need for integrated network simulation approaches which consider realistic channel modeling on the one hand and appropriate mobility models on the other hand becomes more and more observable. Moreover, in order to analyze the impacts of car-to-x applications on the behavior of vehicles, ...


Client-server application for the operator panel Weintek and the control system Siemens Simotion

Jaroslav Antoš; Martin Bušek Proceedings of the 2014 15th International Carpathian Control Conference (ICCC), 2014

This article describes the communication between the Weintek touch panel and the Siemens Simotion programmable logic controller. This communication is based on the Client-Server architecture. These particular devices from these particular producers ordinarily are not supposed to communicate between each other. With a designed application this communication is possible. Because of this, it is possible to use a robust Simotion ...


To Send or Not to Send - Learning MAC Contention

SaiDhiraj Amuru; Yuanzhang Xiao; Mihaela van der Schaar; R. Michael Buehrer 2015 IEEE Global Communications Conference (GLOBECOM), 2015

The exponential back-off mechanism, proposed for reducing MAC- layer contention in the 802.11 standard, is sub-optimal in terms of the network throughput. This back-off mechanism and its improved variants are especially inefficient under unknown dynamics such as packet arrivals and user entry/exit. In this paper, we formulate the problem of optimizing this back- off mechanism as a Markov decision process, ...


More eLearning Resources

IEEE-USA E-Books

  • Modeling

    Complex communicating computer systems -- computers connected by data networks and in constant communication with their environments -- do not always behave as expected. This book introduces behavioral modeling, a rigorous approach to behavioral specification and verification of concurrent and distributed systems. It is among the very few techniques capable of modeling systems interaction at a level of abstraction sufficient for the interaction to be understood and analyzed. Offering both a mathematically grounded theory and real-world applications, the book is suitable for classroom use and as a reference for system architects. The book covers the foundation of behavioral modeling using process algebra, transition systems, abstract data types, and modal logics. Exercises and examples augment the theoretical discussion. The book introduces a modeling language, mCRL2, that enables concise descriptions of even the most intricate distributed algorithms and protocols. Using behavioral xioms and such proof methods as confluence, cones, and foci, readers will learn how to prove such algorithms equal to their specifications. Specifications in mCRL2 can be simulated, visualized, or verified against their requirements. An extensive mCRL2 toolset for mechanically verifying the requirements is freely available online; this toolset has been successfully used to design and analyze industrial software that ranges from healthcare applications to particle accelerators at CERN. Appendixes offer material on equations and notation as well as exercise solutions.

  • The Self-Governing Internet: Coordination by Design

    This chapter contains sections titled: Introduction, Coordination of the 99 Percent: The Decentralized Nature of the Internet, Protocols: A Coordination Tool, Coordination of the 1 Percent: Internet Administration Today, Evaluating Proposals for Change, Summary and Conclusion, Notes, References

  • Analysis of Mobility Protocols for Multimedia

    This chapter provides comprehensive analysis of several generations of mobility protocols (e.g., 1G, 2G, 3G, and 4G) in order to extrapolate the common abstract functions during a mobility event. It describes how discovery, configuration, authentication, security association, and media routing functions associated with a mobile's handoff are performed for each of the cellular and IP-based mobility protocols and then maps the respective network parameters for these mobility protocols to each of the common mobility functions. A comparative analysis and extrapolation of the abstract primitives can help to design an optimized mobility system with a given resource constraints and build the optimization mechanisms for each these mobility functions.

  • EnergyEfficient Algorithms in Wireless Sensor Networks

    This chapter contains sections titled: Introduction LTP: A Hop-by-Hop Data Propagation Protocol PFR - A Probabilistic Forwarding Protocol The Energy Balance Problem EBP: The Energy Balance Protocol VTRP: The Variable Transmission Range Protocol Some Recent Relevant Work Acknowledgments Bibliography

  • A Scalability Study of Shared Virtual Memory Systems

    This chapter contains sections titled: Protocols, Prototype Implementations, Performance, Related Work, Conclusions, Acknowledgments

  • VoiceOver Packets in a Packet Network

    This chapter contains sections titled: An Overview of the Concept Data Transmission versus Conventional Digital Telephony Drawbacks and Challenges for Transmitting Voice on Data Packets VoIP, Introductory Technical Description Media Gateway Controller and Its Protocols Review Exercises References

  • Acronyms

    The Department of Defense and the military continually grapple with complex scientific, engineering, and technological problems. Defense systems analysis offers a way to reach a clearer understanding of how to approach and think about complex problems. It guides analysts in defining the question, capturing previous work in the area, assessing the principal issues, and understanding how they are linked. The goal of defense systems analysis is not necessarily to find a particular solution but to provide a roadmap to a solution, or an understanding of the relative value of alternative solutions. In this book, experts in the field--all of them with more than twenty years of experience-- offer insights, advice, and concrete examples to guide practitioners in the art of defense systems analysis. The book describes general issues in systems analysis and analysis protocols in specific defense areas. It offers a useful overview of the process, a discussion of different venues, and prac ical advice running a study and reporting its results. It discusses red teaming (the search for vulnerabilities that might be exploited by an adversary) and its complement, blue teaming (the search for solutions to known shortcomings). It describes real-world defense systems analysis for both traditional and nontraditional areas, including air defense and ballistic missile defense systems, bioterrorism defense, space warfare, and interplanetary communications. _Perspectives on Defense Systems Analysis_ is a very readable resource for analysts and engineers in industry, government, and research.

  • No title

    The literary imagination may take flight on the wings of metaphor, but hard- headed scientists are just as likely as doe-eyed poets to reach for a metaphor when the descriptive need arises. Metaphor is a pervasive aspect of every genre of text and every register of speech, and is as useful for describing the inner workings of a "black hole" (itself a metaphor) as it is the affairs of the human heart. The ubiquity of metaphor in natural language thus poses a significant challenge for Natural Language Processing (NLP) systems and their builders, who cannot afford to wait until the problems of literal language have been solved before turning their attention to figurative phenomena. This book offers a comprehensive approach to the computational treatment of metaphor and its figurative brethren--including simile, analogy, and conceptual blending--that does not shy away from their important cognitive and philosophical dimensions. Veale, Shutova, and Beigman Klebanov approach me aphor from multiple computational perspectives, providing coverage of both symbolic and statistical approaches to interpretation and paraphrase generation, while also considering key contributions from philosophy on what constitutes the "meaning" of a metaphor. This book also surveys available metaphor corpora and discusses protocols for metaphor annotation. Any reader with an interest in metaphor, from beginning researchers to seasoned scholars, will find this book to be an invaluable guide to what is a fascinating linguistic phenomenon.

  • System Evaluation

    This chapter evaluates the overall handoff system, where many of the handoff optimization techniques for the handoff components function together to build a complete handoff system. It first illustrates experimental results from a few systems for both inter-technology and intra-technology handoffs and then validates some of the optimization techniques using Petri nets. This chapter demonstrates how Petri nets can model some behavioral properties of the handoff system, such as deadlocks. It also compares the performance of various scheduling techniques, namely proactive, sequential and parallel, that could be applied to overall handoff system.

  • Systems Analysis of Mobility Events

    This chapter analyzes the handoff operations and explains discrete mobility events resulting from a mobile's handoff. Based on this analysis fundamental taxonomy of handover functions and their relationships are derived. This taxonomy also provides a basis for describing and characterizing optimization in each layer of the protocol stack. Experimental results of the handoff delays for the application layer and network layer mobility protocols are provided based on this handover taxonomy. Discrete operations of the mobility event are analyzed in order to design a formal mobility systems model that can be used to evaluate handoff optimization.



Standards related to Protocols

Back to Top

No standards are currently tagged "Protocols"


Jobs related to Protocols

Back to Top