Subscriber Information

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6045 Experts worldwide ranked by ideXlab platform

Wolfgang Lugmayr - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Agents in the Mobile Telephone Network Management
    Telecommunication Systems, 2001
    Co-Authors: Igor Brusic, Vesna Hassler, Wolfgang Lugmayr
    Abstract:

    The paper discusses the application of mobile agents in the management of mobile telephone (cellular) networks. We propose the use of mobile agents for collecting Subscriber Information, such as location area identifier and cell identifier. By using a Subscriber profile containing these data the signaling messages caused by location update could be reduced. We also propose a method to improve the quality of network coverage by collecting measurements data by a mobile agent in the mobile station (mobile phone) or at the mobile switching center. By analyzing these data the network provider would be able to discover areas without proper radio signal coverage (black holes), thereby avoiding expensive and time-consuming measurements done by specially equipped vehicles. In addition, we discuss the basic infrastructure requirements for deployment of the mobile agent technology in cellular networks.

  • HICSS - Deployment of mobile agents in the mobile telephone network management
    Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000
    Co-Authors: Igor Brusic, Vesna Hassler, Wolfgang Lugmayr
    Abstract:

    Mobile agents are autonomous, asynchronous and, optionally, intelligent software entities which can migrate to and reside in a number of network nodes. In our proposal mobile agents are used for collecting Subscriber Information on the terminal side in mobile communication networks. Mobile agents are sent out by the network part for collecting Information, such as location area identifier and cell identifier, from the area the Subscriber is passing by (e.g. base station). By using a Subscriber profile containing these data the number of signaling messages caused by location update could be reduced. Also, by analyzing these data the network provider would be able to discover areas without proper radio signal coverage. For future generations of mobile networks, such as the European Universal Mobile Telecommunication System (UMTS), the proposed use of mobile agents could be enhanced by the possibility of using mobile stations as relay stations.

Igor Brusic - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Agents in the Mobile Telephone Network Management
    Telecommunication Systems, 2001
    Co-Authors: Igor Brusic, Vesna Hassler, Wolfgang Lugmayr
    Abstract:

    The paper discusses the application of mobile agents in the management of mobile telephone (cellular) networks. We propose the use of mobile agents for collecting Subscriber Information, such as location area identifier and cell identifier. By using a Subscriber profile containing these data the signaling messages caused by location update could be reduced. We also propose a method to improve the quality of network coverage by collecting measurements data by a mobile agent in the mobile station (mobile phone) or at the mobile switching center. By analyzing these data the network provider would be able to discover areas without proper radio signal coverage (black holes), thereby avoiding expensive and time-consuming measurements done by specially equipped vehicles. In addition, we discuss the basic infrastructure requirements for deployment of the mobile agent technology in cellular networks.

  • HICSS - Deployment of mobile agents in the mobile telephone network management
    Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000
    Co-Authors: Igor Brusic, Vesna Hassler, Wolfgang Lugmayr
    Abstract:

    Mobile agents are autonomous, asynchronous and, optionally, intelligent software entities which can migrate to and reside in a number of network nodes. In our proposal mobile agents are used for collecting Subscriber Information on the terminal side in mobile communication networks. Mobile agents are sent out by the network part for collecting Information, such as location area identifier and cell identifier, from the area the Subscriber is passing by (e.g. base station). By using a Subscriber profile containing these data the number of signaling messages caused by location update could be reduced. Also, by analyzing these data the network provider would be able to discover areas without proper radio signal coverage. For future generations of mobile networks, such as the European Universal Mobile Telecommunication System (UMTS), the proposed use of mobile agents could be enhanced by the possibility of using mobile stations as relay stations.

Zheng Jun - One of the best experts on this subject based on the ideXlab platform.

  • Evolution of Policy Mechanism for Monternet
    Computer Engineering, 2006
    Co-Authors: Zheng Jun
    Abstract:

    The evolution of policy mechanism of monternet is introduced in this article,and the detailed process of how to guard short message and WAP service provided by SP are discussed.From the analysis of these processes,it can be understand how to solve Subscriber Information management and data service billing by China mobile.These mechanisms are used in current network and give perfect result.

Vesna Hassler - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Agents in the Mobile Telephone Network Management
    Telecommunication Systems, 2001
    Co-Authors: Igor Brusic, Vesna Hassler, Wolfgang Lugmayr
    Abstract:

    The paper discusses the application of mobile agents in the management of mobile telephone (cellular) networks. We propose the use of mobile agents for collecting Subscriber Information, such as location area identifier and cell identifier. By using a Subscriber profile containing these data the signaling messages caused by location update could be reduced. We also propose a method to improve the quality of network coverage by collecting measurements data by a mobile agent in the mobile station (mobile phone) or at the mobile switching center. By analyzing these data the network provider would be able to discover areas without proper radio signal coverage (black holes), thereby avoiding expensive and time-consuming measurements done by specially equipped vehicles. In addition, we discuss the basic infrastructure requirements for deployment of the mobile agent technology in cellular networks.

  • HICSS - Deployment of mobile agents in the mobile telephone network management
    Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000
    Co-Authors: Igor Brusic, Vesna Hassler, Wolfgang Lugmayr
    Abstract:

    Mobile agents are autonomous, asynchronous and, optionally, intelligent software entities which can migrate to and reside in a number of network nodes. In our proposal mobile agents are used for collecting Subscriber Information on the terminal side in mobile communication networks. Mobile agents are sent out by the network part for collecting Information, such as location area identifier and cell identifier, from the area the Subscriber is passing by (e.g. base station). By using a Subscriber profile containing these data the number of signaling messages caused by location update could be reduced. Also, by analyzing these data the network provider would be able to discover areas without proper radio signal coverage. For future generations of mobile networks, such as the European Universal Mobile Telecommunication System (UMTS), the proposed use of mobile agents could be enhanced by the possibility of using mobile stations as relay stations.

Prashant Palvia - One of the best experts on this subject based on the ideXlab platform.

  • The social influence model of technology adoption
    Communications of the ACM, 2010
    Co-Authors: Sandra A. Vannoy, Prashant Palvia
    Abstract:

    Introduction Human innovation, in combination with the internet, networking, and communications technologies have produced a new platform for social and business networking, formation of community, and communication. This emerging phenomenon is generally known as social computing. While there is no widely accepted definition of social computing, we define it as: intra-group social and business actions practiced through group consensus, group cooperation, and group authority, where such actions are made possible through the mediation of Information technologies, and where group interaction causes members to conform and influences others to join the group. In this article, we examine the adoption of Information technologies in the context of social computing. Most current Information systems research on individual technology adoption has focused upon the adoption of technology in organizations and has utilized such technology acceptance models as the TRA and TAM. It has been suggested, however, that a new perspective on adoption may be necessary to fully capture the nature of technology acceptance in social computing situations, where the technology is embraced rather than simply accepted by the user, and where the action made possible by technology is seen as a behavior embedded in society. Few studies have investigated technology adoption targeting the individual at the level of society, community, or lifestyle experience. There is little research that approaches adoption in the context of social computing, and to our knowledge, no models have been developed to investigate this phenomenon. This study addresses this gap by developing social constructs and providing a theoretically grounded model for technology adoption in the context of social computing. We develop a cross-disciplinary model of technology adoption to address the multi-faceted context of social computing. Our model suggests that social computing action, social computing consensus, social computing cooperation, and social computing authority are antecedents to social influence, and augment usefulness and ease of use. In social influence, group membership legitimizes actions and the individual is guided by the group's rules of practice. Social influence leads to technology adoption. Technology adoption incorporates two essential elements, the embracement of the technology by individuals and its embedment in society. Each of the model's constructs will be explained in further detail. As Figure 1 demonstrates, while technology may influence society, society often exerts influence on technology. Consider SMS text messaging. A technology that was originally intended to deliver Subscriber Information was adopted by end users as a vehicle for social behavior. Peer-to-peer (P2P) file swapping offers another example. A technology that was intended to provide an efficient mechanism for remote file access was adopted by end users to create music sharing networks. The strength of social influence is evident, as text messaging has now outpaced voice mobile calling as well as email. Similarly, sales of traditional music media such as CDs are declining as the number of music downloads and uploads via P2P networks continue to increase. As the Internet, networking, and communications technologies become increasingly embraced by individuals and embedded in everyday lives and activities, technologically enabled social structures are emerging that are changing the way individuals interact and communicate, and are facilitating fundamental changes to business practices. People socialize and network via their Web browsers by joining social networking sites such as MySpace.com and LinkedIn.com. Text messaging has created a form of communication that has its own user-defined language and protocols. A recent study by Cision on the influence of Web blogs on mainstream media showed that the mention of blogs in top magazines and newspapers has increased from just over 2,000 in 2005 to over 13,000 in 2008. In a 2006 study, Forrester Research found that although social computing is in infancy, societal changes are being witnessed, as individuals increasingly take cues from one another, in addition to traditional sources of authority, such as corporations, media, political institutions or religions. Social computing mechanisms such as blogs, e-Bay-esque Web sites, Web-based forums such as MySpace.com, text messaging, and instant messaging are often utilized instead of traditional sources of news, purchasing, and social interaction. Unauthorized P2P file sharing provides an example of how technology is used in the formation and organization of groups with shared interests. Through cooperation with a particular action, communities based upon the shared interest of music exchange are created by the consensus of the group that it is acceptable to use the Internet and communication technologies to share music among group members. Though the action is illegal in the traditional sense, the decentralized nature of P2P makes regulation difficult and largely immunizes its activities against established forms of authority. Furthermore, unauthorized file sharing has become socially acceptable (embedded) due to the new authority imposed by the group. The embracement and embedment of P2P file sharing is evident as the number of P2P networks continues to grow. Individuals have historically exchanged music via low quality mechanisms such as magnetic tape; however, the development of file formats such as .mp3 that could carry music of high quality and the adoption of P2P transferred some portion of the power wielded by the entertainment industry to the consumer. P2P file exchange has provided a means for obtaining music outside of mechanisms sanctioned by the entertainment industry, such as purchasing CDs or obtaining .mp3 files from legitimate sources. As social computing becomes prevalent, creating new ways to examine human behavior in the context of Information technology becomes important. Parameswaran and Whinston9 suggest that social computing has brought about a much more complex model of computing that may not fit within the confines of current knowledge. Current research on IT adoption focuses largely upon the concepts of usefulness and ease of use, which may not fully explain technology adoption in the context of social computing. Due to the social influence inherent in social computing and the embedment and embracement of technology in the lives of individuals and the interactions of society, it has become important to examine technology adoption from a cross-disciplinary and multifaceted context, and in terms of social and business interactions.