Branding/Logomark minus arrow-point-to-down Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 Icon/List no author result Created with Sketch.
Loading Scinapse...
Papers 7864
1 page of 787 pages (7,864 results)
Newest
Lucas Bondan2
Estimated H-index: 2
,
Muriel Figueredo Franco1
Estimated H-index: 1
+ 10 AuthorsElias Procópio Duarte10
Estimated H-index: 10
The emergence of NFV has drawn the attention of academia, standardization bodies, and industry, because of the possibility of reducing capital and operational costs while introducing innovation in computer networks. To enable developers to independently publish and distribute VNFs, marketplaces akin to online application stores are essential. Research efforts in several aspects are necessary to enable wider adoption of such online application stores in emerging NFVbased computer networks. This a...
Source Cite
Su Yee Aye1
Estimated H-index: 1
,
Boon Poh Ng14
Estimated H-index: 14
The article explains the orientational beamforming concept from a perspective of spread-spectrum communication not in the frequency domain but in the spatial domain. In the orientational beamforming concept, radiated signal energy is spread over a certain part of or the entire angular range by a transmit array with randomly (practically pseudo-random) distributed antennas. At the receiving end, an identical pseudo-random array is employed so that the matching of the antenna distributions between...
Source Cite
Tom Alexander , Wojciech Mazurczyk19
Estimated H-index: 19
+ 1 AuthorsAlberto Perotti
The rise of the fifth generation of mobile wireless communications (5G) is driving significant scientific and technological progress in the area of mobile systems and networks. This first appearance of the new Mobile Communications and Networks Series addresses some of the most significant aspects of 5G networks, providing key insights into relevant system and network design challenges, as well as the advanced signal processing algorithms and efficient protocols.
Source Cite
Diogo Oliveira1
Estimated H-index: 1
,
Nasir Ghani22
Estimated H-index: 22
+ 2 AuthorsElias Bou-Harb8
Estimated H-index: 8
Large-scale nuclear electromagnetic pulse (EMP) attacks and natural disasters can cause extensive network failures across wide geographic regions. Although operational networks are designed to handle most single or dual faults, recent efforts have also focused on more capable multi-failure disaster recovery schemes. Concurrently, advances in software-defined networking (SDN) technologies have delivered highly-adaptable frameworks for implementing new and improved service provisioning and recover...
Source Cite
Khaled Ben Letaief54
Estimated H-index: 54
Source Cite
Access control is a building block for the overall security of any communication system. When it comes to device-to-device communication, decentralized approaches for access control will allow governing a mass of devices in a scalable mode. Common understanding and standardization of application-level access control is also primordial for the incoming era of cooperating devices in the IoT. This article introduces different architectural models for decentralized device access control, their secur...
Source Cite
Salah Eddine Elayoubi10
Estimated H-index: 10
,
Sana Ben Jemaa9
Estimated H-index: 9
+ 1 AuthorsAna Galindo-Serrano12
Estimated H-index: 12
This article investigates the slicing concept in the 5G RAN with the related challenges and research problems. The objective is to identify the plausible options for implementing the slicing concept at the RAN level by the mobile network operator to respond to the needs of verticals. We start by identifying the different slice granularity options, that is, how to define slices by combining customer and service needs. We then present how the 5G NR features can be used for facilitating slice imple...
Source Cite
Xi Yang , Michail Matthaiou26
Estimated H-index: 26
+ 3 AuthorsShi Jin31
Estimated H-index: 31
Although mmWave systems promise to offer larger bandwidth and unprecedented peak data rates, their practical implementation faces several hardware challenges compared to sub-6 GHz communication systems. These hardware constraints can seriously undermine the performance and deployment progress of mmWave systems and thus necessitate disruptive solutions in the cross-design of analog and digital modules. In this article, we discuss the importance of different hardware constraints and propose a nove...
Download PDF Cite
Zhaolong Ning12
Estimated H-index: 12
,
Xiangjie Kong13
Estimated H-index: 13
+ 2 AuthorsXiaojie Wang3
Estimated H-index: 3
The proliferation of IoTs beside the emergence of various cloud services push the horizon of edge computing. By offering cloud capabilities at the network edge closer to mobile devices, edge computing is a promising paradigm to resolve several vital challenges in IoTs, such as bandwidth saturation, energy constraints, low latency transmission, and data security and privacy. To provide a comprehensive understanding of edge computing supported by the integration of IoTs and cloud computing, that i...
1 Citations Source Cite
Borja Nogales , Iván Vidal7
Estimated H-index: 7
+ 3 AuthorsArturo Azcorra17
Estimated H-index: 17
Management and orchestration of virtual resources and functions, commonly referred to as MANO, are key functionalities of NFV environments. This article describes the design and deployment of the NFV MANO platform of 5TONIC, the open research and innovation laboratory on 5G technologies founded by Telefonica and IMDEA Networks. This NFV MANO platform provides 5TONIC trials and experiments with access to a functional production-like NFV environment, enabling experimentation with novel NFV product...
Source Cite
12345678910