By Topic

IEEE Potentials

Issue 4 • Date Oct/Nov 2001

Filter Results

Displaying Results 1 - 9 of 9
  • On the path to 3G

    Publication Year: 2001, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    The authors discuss two complementary technologies at the forefront of the road to third generation systems; these are the General Packet Radio Service (GPRS) and Wireless Application Protocol (WAP) systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regulating the rules of engagement

    Publication Year: 2001, Page(s):22 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (61 KB) | HTML iconHTML

    Regulation is a public policy term that covers a wide range of political and economic concepts. This is according to The Heritage Foundation. This organization states that government regulations can be divided into two distinct categories-“economic” regulations and “social” ones. Features of each are discussed including the aspects of globalization and the properties of rul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice over IP

    Publication Year: 2001, Page(s):36 - 40
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB) | HTML iconHTML

    The authors begin by discussing the components of voice over IP (VoIP). They go on to consider SS7, H.323, SIP (session initiation protocol), voice coders, ITU-T specifications, RTP (real time transport protocol), gateway control, wireless networks, quality of service, packet loss, jitter, latency and bit rate View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile data management

    Publication Year: 2001, Page(s):11 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB) | HTML iconHTML

    The management of data in the mobile computing environment offers new challenging problems. Existing software needs to be upgraded to accommodate this environment. To do so, the critical parameters need to be understood and defined. We have surveyed some problems and existing solutions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A private matter [privacy in society]

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (57 KB) | HTML iconHTML

    Discusses the gradual erosion of privacy in society and the ways in which individuals are being monitored. The constitutional right to privacy is mentioned based on provisions within the Bill of Rights and amendments. The relationship between globalization and privacy is finally considered View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer viruses

    Publication Year: 2001, Page(s):16 - 19
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    Computer viruses have been around since the mid 1980s. Over 40,000 different viruses have been cataloged so far and the number of viruses is increasing dramatically. The damage they cause is estimated to be several billions of U.S. dollars per year. Most often, the origin of the virus is difficult to trace. Various kinds of anti-virus software have been developed which detect viruses and take corr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The benefit of cost analysis

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (55 KB) | HTML iconHTML

    The author discusses safety levels and the response of society to safety, including the economic cost of optimum levels of safety, the estimation and judgement of safety, the use of cost-effective analysis and the application of a decision analysis approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A psyche game [fears and anxieties]

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (68 KB) | HTML iconHTML

    Discusses the effects of propaganda on a person's fears and anxieties. Topics considered include post traumatic stress disorder, risk factors and methods of healing View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The medium access control sublayer

    Publication Year: 2001, Page(s):30 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    The authors begin by giving a brief overview of the physical layer, the data link layer, the network layer, the transport layer and the application layer, before going on to discuss the MAC sublayer (a subset of the data link layer) in more detail. Static allocation protocols are considered as are FDM, TDM, dynamic allocation protocols, ALOHA, CSMA, reservation protocols, wireless network protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com