Type

Database

Creator

Date

Thumbnail

My List

See more

Search results

977 records were found.

The previous chapters mainly examined methods to save energy at the mobile handset, either by using short-range cooperation between mobile terminals, or by performing smart vertical handovers between heterogeneous radio access technologies. These techniques can be beneficial to mobile systems, but they have to be performed based on informed decisions; meaning that mobile devices need to be cognitive. Modern devices already collect significant amounts of information, but they have limited capability to exploit such context/information, and handover decisions are merely based on signal strength, or are network controlled and based on network load. In this chapter, we aim to go beyond the state-of-the-art by envisioning mobile terminals with the capability to make informed decisions based on a reservoir of context information made availab...
Security has recently become an important issue that needs to be addressed in an era where governments are investing heavily into preventive measures against cyber-crime that includes denial of service attacks, tampering attacks and eavesdropping attacks, among others. These types of malpractice are foreseen as threats in future 5G scenarios, since confidential information will be downloaded, uploaded and processed via the upcoming 5G systems. Furthermore, the emergence of the 5G era requires the integration of multiple existing advanced technologies with innovative new techniques, which will result in many security breaches. Thus, in this chapter, we present representative examples of potential threats and attacks against the main components of 5G systems in order to shed light on the future security issues and challenges in the upcom...
Critical work on popular American women's fiction still has not reckoned adequately with the themes of interracialism present in these novels and with interracialism's bearing on the sentimental. This thesis considers an often overlooked body of women's popular sentimental fiction, published from 1860-1865, which is interested in themes of interracial romance or reproduction, in order to provide a fuller picture of the impact that the intersection of interracialism and sentimentalism has had on American identity. By examining the literary strategy of "miscegenated narration," or the heteroglossic cacophony of narrative voices and ideological viewpoints that interracialism produces in a narrative, I argue that the hegemonic ideologies of the sentimental romance are both "deterritorialized" and "reterritorialized," a conflicted impulse t...
This chapter discusses the instructional practice of a primary school teacher. It is based on a framework that we developed in the project “Professional Practices of Mathematics Teachers”, which relates the teacher’s intentions to her actions in an inquiry-based mathematics classroom. The framework covers the promotion of mathematics learning as well as the class management. It details the instructional actions of the teacher in terms of the launching of the mathematical task to the students, the support of the students’ work, the orchestration of the discussion of the task and the systematization of the mathematical learning process.
En este trabajo se desarrolla un algoritmo de segmentación para imá-genes obtenidas vía satélite. Para llevar a cabo esta segmentación, se modeliza la imagen mediante un grafo planar valorado. Se propone un algoritmo de coloración para grafos valorados que da lugar a una segmentación de la imagen. Este algoritmo de coloración se define por medio de una coloración binaria en grafos no valorados que van siendo determinados en cada iteración.
Recent studies have indicated that language identity is encapsulated in a more complicated manner to that represented by short term acoustic features. In particular, trajectory information over syllable-like durations have shown significant promise. This study introduces a novel three-tiered language identification approach which incorporates this information as well as acoustic context in the form of broad syllabic events. Experimental results using the CallFriend database demonstrate the effectiveness of these systems at providing complementary information to a GMM based system.