Qual-IT London

Displaying 1-5 of 5 results

  • White Papers // May 2013

    A Control Theoretic Approach to Analyzing Peer-to-Peer Searching

    A generic linear mathematical model is proposed to represent the dynamics of bandwidth usage, network topology, and host processing power in large scale Peer-to-Peer (P2P) networks. Feedback control theory is employed to analyze system stability and query controllability, as well as deriving an explicit solution for the bandwidth usage. The...

    Provided By Qual-IT London

  • White Papers // Jan 2013

    Polynomial-Complexity, Low-Delay Scheduling for SCFDMA-Based Wireless Uplink Networks

    Uplink scheduling/resource allocation under the single-carrier FDMA constraint is investigated, taking into account the queuing dynamics at the transmitters. Under the single-carrier constraint, the problem of MaxWeight scheduling, as well as that of determining if a given number of packets can be served from all the users, are shown to...

    Provided By Qual-IT London

  • White Papers // Nov 2012

    Security Provisions in CDMA2000 Networks

    Since the birth of the cellular industry, security has been a major concern for both service providers and subscribers. Service providers are primarily concerned with security to prevent fraudulent operations such as cloning or subscription fraud, while subscribers are mainly concerned with privacy issues. The security levels in today's wireless...

    Provided By Qual-IT London

  • White Papers // Apr 2012

    Aggregate Signcryption

    Signcryption schemes provide an efficient messaging system for data that needs to be sent with data confidentiality, data integrity and data origin authentication. However, the bandwidth overhead for the use of signcryption in a network in which a large number of messages need to be sent may be high. Motivated...

    Provided By Qual-IT London

  • White Papers // Jan 2011

    Traffic Management Strategies for Operators

    Nearly a decade after its debut, 3G has been widely deployed and supports over a billion subscribers. With the success of broadband, the 3G footprint continues to expand leading to an exponential increase in data traffic demand. The key question now is how can operators meet this demand? There is...

    Provided By Qual-IT London

  • White Papers // Nov 2012

    Security Provisions in CDMA2000 Networks

    Since the birth of the cellular industry, security has been a major concern for both service providers and subscribers. Service providers are primarily concerned with security to prevent fraudulent operations such as cloning or subscription fraud, while subscribers are mainly concerned with privacy issues. The security levels in today's wireless...

    Provided By Qual-IT London

  • White Papers // Jan 2011

    Traffic Management Strategies for Operators

    Nearly a decade after its debut, 3G has been widely deployed and supports over a billion subscribers. With the success of broadband, the 3G footprint continues to expand leading to an exponential increase in data traffic demand. The key question now is how can operators meet this demand? There is...

    Provided By Qual-IT London

  • White Papers // Apr 2012

    Aggregate Signcryption

    Signcryption schemes provide an efficient messaging system for data that needs to be sent with data confidentiality, data integrity and data origin authentication. However, the bandwidth overhead for the use of signcryption in a network in which a large number of messages need to be sent may be high. Motivated...

    Provided By Qual-IT London

  • White Papers // Jan 2013

    Polynomial-Complexity, Low-Delay Scheduling for SCFDMA-Based Wireless Uplink Networks

    Uplink scheduling/resource allocation under the single-carrier FDMA constraint is investigated, taking into account the queuing dynamics at the transmitters. Under the single-carrier constraint, the problem of MaxWeight scheduling, as well as that of determining if a given number of packets can be served from all the users, are shown to...

    Provided By Qual-IT London

  • White Papers // May 2013

    A Control Theoretic Approach to Analyzing Peer-to-Peer Searching

    A generic linear mathematical model is proposed to represent the dynamics of bandwidth usage, network topology, and host processing power in large scale Peer-to-Peer (P2P) networks. Feedback control theory is employed to analyze system stability and query controllability, as well as deriving an explicit solution for the bandwidth usage. The...

    Provided By Qual-IT London