Results 11 to 20 of about 66,947 (210)

DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]

open access: yes, 2018
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele   +3 more
core   +4 more sources

Mobile Audiovisual Terminal: System Design and Subjective Testing in DECT and UMTS networks [PDF]

open access: yes, 2000
It is anticipated that there will shortly be a requirement for multimedia terminals that operate via mobile communications systems. This paper presents a functional specification for such a terminal operating at 32 kb/s in a digital European cordless
Cosmas, J, Gill, D, Pearmain, A
core   +1 more source

Is Explicit Congestion Notification usable with UDP? [PDF]

open access: yes, 2015
We present initial measurements to determine if ECN is usable with UDP traffic in the public Internet. This is interesting because ECN is part of current IETF proposals for congestion control of UDPbased interactive multimedia, and due to the ...
Hildebrand J.   +4 more
core   +3 more sources

Voice quality estimation in combined radio-VoIP networks for dispatching systems [PDF]

open access: yes, 2016
The voice quality modelling assessment and planning field is deeply and widely theoretically and practically mastered for common voice communication systems, especially for the public fixed and mobile telephone networks including Next Generation Networks
Kučerák, Ján, Vodrážka, Jiří
core   +1 more source

Stark Echo Modulation for Quantum Memories

open access: yes, 2016
Quantum memories for optical and microwave photons provide key functionalities in quantum processing and communications. Here we propose a protocol well adapted to solid state ensemble based memories coupled to cavities.
Arcangeli, A., Ferrier, A., Goldner, Ph.
core   +1 more source

Customer Retention in Service Industry [PDF]

open access: yes, 2020
Customer retention is previously considered as the last resort of a company in traditional marketing approach rather than a way to improve long term profit (Krishnan & Govindarajan, 2013).
Abu Seman, Noor Aslinda   +2 more
core   +1 more source

Using the Community Resilience Model and Project ECHO to Build Resiliency in Direct Support Professionals: Protocol for a Longitudinal Survey

open access: yesJMIR Research Protocols
Background Individuals with intellectual disabilities or autism spectrum disorder (ID/A) sometimes require supportive services from direct support professionals (DSPs). The supportive care provided to individuals with ID/A by DSPs can vary from assistance with daily living activities to navigating society.
Kristina Puzino Lenker   +6 more
openaire   +3 more sources

Quantum optical memory protocols in atomic ensembles

open access: yes, 2018
We review a series of quantum memory protocols designed to store the quantum information carried by light into atomic ensembles. In particular, we show how a simple semiclassical formalism allows to gain insight into various memory protocols and to ...
Abella   +125 more
core   +1 more source

Acoustic echo and noise canceller for personal hands-free video IP phone [PDF]

open access: yes, 2016
This paper presents implementation and evaluation of a proposed acoustic echo and noise canceller (AENC) for videotelephony-enabled personal hands-free Internet protocol (IP) phones.
Akira Nakagawa   +4 more
core   +2 more sources

Efficient quantum memory using a weakly absorbing sample

open access: yes, 2013
A light-storage experiment with a total (storage and retrieval) efficiency $\eta=58 \pm 5%$ is carried out by enclosing a sample, with a single pass absorption of 10%, in an impedance-matched cavity.
Kröll, Stefan   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy