Sciweavers

1368 search results - page 15 / 274
» Modeling the Telephone Call Network
Sort
View
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
LCN
2003
IEEE
14 years 3 months ago
Measuring the Impact of Slow User Motion on Packet Loss and Delay over IEEE 802.11b Wireless Links
IEEE 802.11b compliant WLAN technology is increasingly used for cordless telephone services. Often, a WLAN phone is moved during a call. In the present paper we explore to what ex...
Christian Hoene, André Günther, Adam W...
JISE
2008
151views more  JISE 2008»
13 years 9 months ago
Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs
Supporting telephone services using wireless LAN as the access network is an important application nowadays. The SIP and IEEE 802.11e are the two most promising protocols to suppo...
Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei ...
INTERNET
2002
106views more  INTERNET 2002»
13 years 9 months ago
Providing Emergency Services in Internet Telephony
Assisting during emergencies is one of the important functions of the telephone system. Emergency communications has three components: summoning help during emergencies, coordinat...
Henning Schulzrinne, Knarig Arabshian
SIGUCCS
2009
ACM
14 years 2 months ago
Frontline support at Princeton University: a centralized and decentralized approach
Frontline support and maintenance for desktop hardware and software systems at Princeton University has been uniquely structured, allowing the benefits of centralization and the f...
Maureen A. Novozinsky, Evelyne S. Roach, Leila M. ...