A survey of communication protocols for automatic meter reading applications

T Khalifa, K Naik, A Nayak - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Utility companies (electricity, gas, and water suppliers), governments, and researchers have
been urging to deploy communication-based systems to read meters, known as automatic …

Security and privacy issues in P2P streaming systems: A survey

G Gheorghe, R Lo Cigno, A Montresor - Peer-to-Peer Networking and …, 2011 - Springer
Abstract Streaming applications over Peer-To-Peer (P2P) systems have gained an
enormous popularity. Success always implies increased concerns about security, protection …

Proposed framework for evaluating quality of experience in a mobile, testbed-oriented living lab setting

K De Moor, I Ketyko, W Joseph, T Deryckere… - Mobile Networks and …, 2010 - Springer
The framework presented in this paper enables the evaluation of Quality of Experience
(QoE) in a mobile, testbed-oriented Living Lab setting. As a result, it fits within the shift …

Mobile-based traceability system for sustainable food supply networks

K Lin, D Chavalarias, M Panahi, T Yeh, K Takimoto… - Nature Food, 2020 - nature.com
Traceability is key to ensure food quality and safety from farm to fork, yet high
implementation costs and the complexity of the food supply chain pose challenges to its …

Failover, load sharing and server architecture in SIP telephony

K Singh, H Schulzrinne - Computer Communications, 2007 - Elsevier
We apply some of the existing web server redundancy techniques for high service
availability and scalability to the relatively new IP telephony context. The paper compares …

Wireless device for voice communication

T Hinrikus, G O'loughlin, M Sigurdsson… - US Patent …, 2011 - Google Patents
See application file for complete search historv. pp p ry user interface, and initiate a packet
data voice call with a (56) References Cited contact; a microprocessor arranged to execute …

Method of establishing a direct communication between a first wireless phone and a second wireless phone

LHM Rek - US Patent 8,103,215, 2012 - Google Patents
Method of communicating between a first wireless phone and a second wireless phone A
method of communicating between a first wireless phone (A) and a second wireless phone …

Information-theoretic secure multi-party computation with collusion deterrence

Z Wang, SCS Cheung, Y Luo - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Secure multi-party computation (MPC) has been established as the de facto paradigm for
protecting privacy in distributed computation. Among many secure MPC primitives, Shamir's …

Security challenges for peer-to-peer SIP

J Seedorf - IEEE Network, 2006 - ieeexplore.ieee.org
Recent research activities have proposed using a peer-to-peer network for user registration
and user location in session initiation protocol (SIP)-based voice-over-IP (VoIP) networks …

Efficient large-scale model checking

K Verstoep, HE Bal, J Barnat… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Model checking is a popular technique to systematically and automatically verify system
properties. Unfortunately, the well-known state explosion problem often limits the extent to …