Sciweavers

2560 search results - page 14 / 512
» Securing VO Management
Sort
View
CSREASAM
2006
14 years 9 days ago
Application of Gaussian Estimation for Devising Reliable Vulnerability Assessment on SIP-based VoIP Infrastructure
The Session Initiation Protocol (SIP) is an application-layer protocol commonly used in VoIP for communication over the Internet. In this paper we describe a method to assess a pa...
Mohammad Chowdhury, Bon Sy, Rasheed Ahmad
IWIA
2006
IEEE
14 years 5 months ago
Present and Future Challenges Concerning DoS-attacks against PSAPs in VoIP Networks
Nowadays, voice over IP (VoIP) telephony networks are connected to classic public switched telephony networks (PSTNs). Emergency calls from VoIP peers to PSTN public service answe...
Nils Aschenbruck, Matthias Frank, Peter Martini, J...
CCGRID
2007
IEEE
14 years 5 months ago
Executing Large Parameter Sweep Applications on a Multi-VO Testbed
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Seamless channel transition for pyramid-based near-VoD services
Periodic broadcasting is known as an efficient technique for delivering popular videos by reducing bandwidth requirement for transmitting streaming video to simultaneous viewers. ...
Wei-De Chien, Kai-Chao Yang, Jia-Shung Wang
AICT
2006
IEEE
128views Communications» more  AICT 2006»
14 years 5 months ago
Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers
IP Telephony based on Peer-to-Peer (P2P) technology has being gaining attentions for its innovative approach to providing VoIP service. At the same time, it has raised many new re...
Feng Cao, David A. Bryan, Bruce Lowekamp