Sciweavers

265 search results - page 22 / 53
» Security Patterns for Voice over IP Networks
Sort
View
CCS
2010
ACM
13 years 9 months ago
PinDr0p: using single-ended audio features to determine call provenance
The recent diversification of telephony infrastructure allows users to communicate through landlines, mobile phones and VoIP phones. However, call metadata such as Caller-ID is ei...
Vijay A. Balasubramaniyan, Aamir Poonawalla, Musta...
GLOBECOM
2010
IEEE
13 years 7 months ago
An Experimental Comparison of Burst Packet Transmission Schemes in IEEE 802.11-Based Wireless Mesh Networks
Abstract--Wireless mesh networks (WMNs) are wireless multihop networks comprised of mesh routers, which relay traffic on behalf of clients and other nodes. Using the standard IEEE ...
Peter Dely, Andreas Kassler, Nico Bayer, Dmitry Si...
CSREASAM
2006
13 years 10 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
PUC
2010
138views more  PUC 2010»
13 years 3 months ago
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web
In this paper, we describe the design and implementation of an audio wiki application accessible via both the Public Switched Telephone Network and the Internet. The application ex...
Constantinos Kolias, Vassilis Kolias, Ioannis Anag...
ICAS
2009
IEEE
184views Robotics» more  ICAS 2009»
14 years 3 months ago
Open IMS Core with VoIP Quality Adaptation
—As IMS becomes more available to academia and industry, the requirements for IMS clients are growing faster than ever. From all IMS components, IMS clients are vital components ...
Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiy...