A survey of communication protocols for automatic meter reading applications
Utility companies (electricity, gas, and water suppliers), governments, and researchers have
been urging to deploy communication-based systems to read meters, known as automatic …
been urging to deploy communication-based systems to read meters, known as automatic …
Security and privacy issues in P2P streaming systems: A survey
Abstract Streaming applications over Peer-To-Peer (P2P) systems have gained an
enormous popularity. Success always implies increased concerns about security, protection …
enormous popularity. Success always implies increased concerns about security, protection …
Proposed framework for evaluating quality of experience in a mobile, testbed-oriented living lab setting
The framework presented in this paper enables the evaluation of Quality of Experience
(QoE) in a mobile, testbed-oriented Living Lab setting. As a result, it fits within the shift …
(QoE) in a mobile, testbed-oriented Living Lab setting. As a result, it fits within the shift …
Mobile-based traceability system for sustainable food supply networks
Traceability is key to ensure food quality and safety from farm to fork, yet high
implementation costs and the complexity of the food supply chain pose challenges to its …
implementation costs and the complexity of the food supply chain pose challenges to its …
Failover, load sharing and server architecture in SIP telephony
K Singh, H Schulzrinne - Computer Communications, 2007 - Elsevier
We apply some of the existing web server redundancy techniques for high service
availability and scalability to the relatively new IP telephony context. The paper compares …
availability and scalability to the relatively new IP telephony context. The paper compares …
Wireless device for voice communication
T Hinrikus, G O'loughlin, M Sigurdsson… - US Patent …, 2011 - Google Patents
See application file for complete search historv. pp p ry user interface, and initiate a packet
data voice call with a (56) References Cited contact; a microprocessor arranged to execute …
data voice call with a (56) References Cited contact; a microprocessor arranged to execute …
Method of establishing a direct communication between a first wireless phone and a second wireless phone
LHM Rek - US Patent 8,103,215, 2012 - Google Patents
Method of communicating between a first wireless phone and a second wireless phone A
method of communicating between a first wireless phone (A) and a second wireless phone …
method of communicating between a first wireless phone (A) and a second wireless phone …
Information-theoretic secure multi-party computation with collusion deterrence
Secure multi-party computation (MPC) has been established as the de facto paradigm for
protecting privacy in distributed computation. Among many secure MPC primitives, Shamir's …
protecting privacy in distributed computation. Among many secure MPC primitives, Shamir's …
Security challenges for peer-to-peer SIP
J Seedorf - IEEE Network, 2006 - ieeexplore.ieee.org
Recent research activities have proposed using a peer-to-peer network for user registration
and user location in session initiation protocol (SIP)-based voice-over-IP (VoIP) networks …
and user location in session initiation protocol (SIP)-based voice-over-IP (VoIP) networks …
Efficient large-scale model checking
Model checking is a popular technique to systematically and automatically verify system
properties. Unfortunately, the well-known state explosion problem often limits the extent to …
properties. Unfortunately, the well-known state explosion problem often limits the extent to …