Topic
Mobile telephony
About: Mobile telephony is a research topic. Over the lifetime, 38008 publications have been published within this topic receiving 553646 citations.
Papers published on a yearly basis
Papers
More filters
•
18 Jun 2009
TL;DR: In this article, real-time device location information, destination information, and location history are used to adjust mobile communications service parameters such as handoffs, channel assignment, multipath fading response parameters, data rates, transmission modes, opportunistic scheduling parameters, location-based services and location update rates.
Abstract: Described technologies are generally related to predicting future mobile device locations and using the predictive information to optimize mobile communications service parameters. Mobile device locations may be predicted using real-time device location information, destination information, and location history. Predicted location information for a given device, and possibly other devices as well, may be used to adjust mobile communications service parameters such as handoffs, channel assignment, multipath fading response parameters, data rates, transmission modes, opportunistic scheduling parameters, location-based services, and location update rates.
123 citations
••
TL;DR: In this article, a paradigm shift of wireless security to the surveillance and intervention of infrastructure-free suspicious and malicious wireless communications, by exploiting legitimate eavesdropping and jamming jointly, is presented.
Abstract: Conventional wireless security assumes wireless communications are legitimate, and aims to protect them against malicious eavesdropping and jamming attacks. However, emerging infrastructure- free mobile communication networks can be illegally used (e.g., by criminals or terrorists) but are difficult to monitor, thus imposing new challenges in public security. To tackle this issue, this article presents a paradigm shift of wireless security to the surveillance and intervention of infrastructure-free suspicious and malicious wireless communications, by exploiting legitimate eavesdropping and jamming jointly. In particular, proactive eavesdropping (via jamming) is proposed to intercept and decode information from suspicious communication links for the purpose of inferring their intentions and deciding further measures against them. Cognitive jamming (via eavesdropping) is also proposed to disrupt, disable, and even spoof the targeted malicious wireless communications to achieve various intervention tasks.
123 citations
••
TL;DR: In this article, computer simulations of high-capacity mobile radio systems using different channel assignment philosophies are described, which initiate call attempts and move vehicles about randomly according to prescribed statistical distributions.
Abstract: Computer simulations of high-capacity mobile radio systems using different channel assignment philosophies are described. These simulations initiate call attempts and move vehicles about randomly according to prescribed statistical distributions. Base stations and radio channels are assigned to serve mobiles and system operating statistics are accumulated. Relationships between systems parameters obtained from the simulation are presented. Performance of a dynamic channel assignment system (DYNSYS) which has all channels available at all base stations is compared with performance of a fixed-channel assignment system (FIXSYS) which reserves channel subsets for use at specific base stations. For uniform spatial distributions of call attempts and 40-channel systems with reuse intervals of four base station radio coverage areas, the DYNSYS outperforms the FIXSYS at blocking rates up to 13 percent. For example, at a 3 percent blocking rate the DYNSYS provides 20 percent more calls “on” in the system.
123 citations
•
06 Aug 2008TL;DR: In this paper, a contact center is provided that can service customers on premises via a mobile kiosk, which can be carried by the customer or by an on-site customer service representative.
Abstract: A contact center is provided that can service customers on premises via a mobile kiosk. The mobile kiosk may be carried by the customer or by an on-site customer service representative. The mobile kiosk may be enqueued in the contact center contact queue such that enhanced customer service can be provided through interfacing with the enterprise database, vendor databases, as well as assigning an appropriately skilled contact center agent to the customer contact.
123 citations
•
01 May 2002
TL;DR: In this article, a polling system for voting, auction bidding, opinion surveying, and the like, communicable with mobile communications devices for performing information collection responsive to input from the mobile communication devices, utilizing an existing short message service (SMS) and/or Internet wireless applications protocol (WAP), and information processing means for processing and analyzing the information collected.
Abstract: A polling system for voting, auction bidding, opinion surveying, and the like, communicable with mobile communications devices for performing information collection responsive to input from the mobile communications devices, utilizing an existing short message service (SMS) and/or Internet wireless applications protocol (WAP), and information processing means for processing and analyzing the information collected. The information so collected is stored, organized, analyzed, transmitted to the mobile communication devices using SMS, or through the Internet using WAP, or to Internet-connected devices of any kind. The polling results can be transmitted and graphically displayed in a smooth integration with existing presentation tools such as PowerPoint™ thereby achieving instantaneous polling results for pollsters, feedback to respondents, and visual display for mass media presentations.
122 citations