Sciweavers

265 search results - page 13 / 53
» Security Patterns for Voice over IP Networks
Sort
View
TRIDENTCOM
2008
IEEE
14 years 3 months ago
Empirical evaluation of VoIP aggregation over a fixed WiMAX testbed
The WiMAX Reference Network Architecture can be used in point-to-point and point-to-multipoint network topologies, and is suitable for providing last-mile, building-to-building, a...
Kostas Pentikousis, Esa Piri, Jarno Pinola, Frerk ...
ICDCS
2010
IEEE
14 years 29 days ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
EIT
2009
IEEE
14 years 28 days ago
Secure end-to-end communication over GSM and PSTN networks
GSM (Global System for Mobiles) is the most widely spread mobile communication system in the world. An important objective in mobile communication systems is secure speech communic...
Saad Islam, Fatima Ajmal, Salman Ali, Jawad Zahid,...

Presentation
1066views
15 years 7 months ago
Recent Advances in Networking
Latest developments in computer networking and telecommunications are covered in this course via class lectures and assigned readings. Generally topics include developments in the ...
Raj Jain
NETWORKING
2000
13 years 10 months ago
Smart Delivery of Multimedia Content for Wireless Applications
Packet-oriented access to cellular networks enables us to deliver multimedia content to mobile users. As cellular networks will continue to deliver circuit switched voice for some ...
Theo Kanter, Per Lindtorp, Christian Olrog, Gerald...