Results 51 to 60 of about 5,018 (225)

SIP threats detection system [PDF]

open access: yes, 2010
The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony.
Vozňák, Miroslav, Řezáč, Filip
core  

Sustainability in Healthcare: The Role of Digital Technologies for Improving Patient Engagement

open access: yesBusiness Ethics, the Environment &Responsibility, EarlyView.
ABSTRACT Sustainability in healthcare is getting considerable research attention as systems worldwide tend to balance environmental, social, and economic factors. In this context, digital technologies have demonstrated significant potential to enhance engagement among different consumer groups across various industries.
Francesco Schiavone   +4 more
wiley   +1 more source

The Reliability Analysis for Corporative IP-Telephony System with Functional Safety

open access: yesБезопасность информационных технологий, 2011
The article is devoted to issues of reliability modeling for fault tolerant corporative IP-telephony system. Two reliability models are presented based on the minimal paths and minimal cuts technique. Two reliability models are proposed based on the link
A. E. Alexandrovich   +2 more
doaj  

Telephony Over IP: A QoS Measurement-Based End to End Control Algorithm [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
This paper presents a method for admitting voice calls in Telephony over IP (ToIP) scenarios. This method, called QoS-Weighted CAC, aims to guarantee Quality of Service to telephony applications.
Luigi Alcuri, Francesco Saitta
doaj  

Treating preschooler behavioural sleep problems via parent‐mediated telehealth: A randomized controlled trial

open access: yesBritish Journal of Clinical Psychology, EarlyView.
Abstract Objectives Behavioural sleep problems in the preschool developmental period (ages 3–5 years) are highly prevalent and associated with a myriad of deleterious consequences including anxiety, in the short‐ and long‐term. This study examined a parent‐focused behavioural sleep intervention for children aged from 3 to 5 years, delivered ...
Amy Shiels   +2 more
wiley   +1 more source

Empirical Data from Mobile and IP Telephony

open access: yesJournal of Communications Software and Systems, 2008
Over the recent years enormous changes in the telecommunication services, techniques, regulations and markets have taken place. However, even with many new exciting services the telephony service is still popular.
Poul E. Heegaard
doaj  

Diffusion of IP Telephony in Undergraduate Private Colleges [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2007
Over the summer of 2000 Menlo College implemented enterprise wide Internet Protocol (IP) Telephony (Voice over Internet Protocol [VoIP]). More than five years have passed, and analysts are predicting that in the near future the only available Private ...
Patrick C. Olson, PhD   +3 more
doaj  

EVALUATION OF PRODUCTIVITY VIRTUALIZATION TECHNOLOGIES OF SWITCHING EQUIPMENT TELECOMMUNICATIONS NETWORKS

open access: yesInformation and Telecommunication Sciences, 2020
Background. To date, the effectiveness of the use of virtualization technologies for the deployment of the organization's infrastructure of any complexity is beyond doubt.
Oleksandr Romanov   +3 more
doaj   +1 more source

Exploring the gap between sensor‐detected (SDH) and person‐reported hypoglycaemia (PRH): The voice of people living with diabetes

open access: yesDiabetic Medicine, EarlyView.
Abstract Background and Aims In people with insulin‐treated diabetes experiencing hypoglycaemia, the multicentre Hypo‐METRICS study found that 60% of sensor‐detected hypoglycaemic episodes (SDH) were asymptomatic, and over 40% of person‐reported hypoglycaemia (PRH) occurred at glucose levels ≥70 mg/dL (3.9 mmol/L).
Monika Cigler   +21 more
wiley   +1 more source

What’s the Hang Up? The Future of VoIP Regulation and Taxation in New Hampshire [PDF]

open access: yes, 2006
Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to
Winstanley, Kate
core   +1 more source

Home - About - Disclaimer - Privacy