Learn More
—Relay technology is a candidate for extending the coverage or enhancing the throughput of next-generation cellular systems. In the downlink of an LTE-A relay network, a relay node (RN) normally reserves a small buffer for each user equipment (UE) such that the RN can minimize the number of forwarding packets during UE handover. The small buffer and a(More)
Incorporating time to the security management system is an important step to streamline its integration with other resource management functions in the real-time distributed systems. In addition to protecting its security properties, minimizing operational overheads of security management is also a major design issue. In this paper, we propose a timed zero(More)
In this study, a classic L2 learning orientation framework and a multi-faceted implementation intention construct were used to predict self-regulation. Attention was particularly paid to the way in which different types of implementation intentions predicted the self-regulatory capacity. A two-phase research design was executed. A pilot was conducted to(More)
With the advances in wireless communication technology, mobile applications are gradually being introduced as part of our life. IEEE 802.11 is one of the most popular wireless communication technologies. Prior studies toward layer-2 and layer-3 handoffs assume that Extend Service Set (ESS) exactly matches a dedicated subnet. However, an inter-ESS with(More)
Currently, most of the Internet retailers or companies build their online stores at online malls. But before an online store is built, the mall will request retailer/company to open an account for accessing the store online. So a retailer/company who has joined n stores at an online mall will open n accounts. Also these retailers and companies often extend(More)
  • 1