2002
DOI: 10.1002/bltj.2211
|View full text |Cite
|
Sign up to set email alerts
|

Wireless data networking, standards, and applications

Abstract: Mobile communications is now so pervasive that, in some countries, mobile phones outnumber landline phones. Penetration rates of over 50% have been reached in many markets. This paper is focused on the standards, network platforms, and applications that are driving this phenomenon in terms of how these elements are providing new capabilities and services for network operators and end users. We review the wireless standards that support high-speed packet internetworking for efficient delivery of voice, Internet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2002
2002
2009
2009

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 1 publication
0
1
0
1
Order By: Relevance
“…As wireless telephony becomes the normal mode of communication, especially as it is augmented with the capabilities of 3G, demand for wireless services beyond voice will multiply. 1 The wireless technology of the future will be shaped increasingly by the requirements of these additional services. We have already mentioned the use of ultra-low-cost radio technologies that will allow ordinary devices to communicate at short range.…”
Section: The Widening Role Of Wireless Telephony: Geolocation Technologymentioning
confidence: 99%
“…As wireless telephony becomes the normal mode of communication, especially as it is augmented with the capabilities of 3G, demand for wireless services beyond voice will multiply. 1 The wireless technology of the future will be shaped increasingly by the requirements of these additional services. We have already mentioned the use of ultra-low-cost radio technologies that will allow ordinary devices to communicate at short range.…”
Section: The Widening Role Of Wireless Telephony: Geolocation Technologymentioning
confidence: 99%
“…Assim, tem-se: , b kji (0) e b kji (1) são as informações do usuário interferente que participa da integração e definem-se e τ = τ para τ ≥ 0 e τ = T + τ para τ < 0. jil T 1 m mT 2 jil II vx hU kjil, 2 jil II vx hU kjil, kji 2 IQ QI, hUvx kjil, 2 QQ II, hUvx…”
Section: Média E Variância De β Huvxunclassified