Results 61 to 70 of about 22,939 (222)

Evaluating and improving firewalls for ip-telephony environments [PDF]

open access: yes, 2000
Firewalls are a well established security mechanism for providing access control and auditing at the borders between different administrative network domains.
Ackermann, Ralf   +2 more
core  

Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2012
Network intrusion detection systems (NIDSs) face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic.
Bazara I. A. Barry
doaj  

Competition in a Pure World of Internet Telephony [PDF]

open access: yes
From the angle of competition policy, Voice over IP looks like a panacea. It not only brings better service, but it also increases competitive pressure on former telecommunications monopolists. This paper points to the largely overlooked downside.
Christoph Engel
core  

An IPtel architecture based on the SIP protocol [PDF]

open access: yes, 2004
More and better accesses to the Internet increase the interest in using it to carry not only data but also voice and video. The IP Telephony (IPTel) was born in this context and offers a framework to create multimedia communication systems.
Carrapatoso, Eurico   +1 more
core  

Public Health Nurses' Time Allocation in Local Government Nursing Settings: A Self‐Reported Prospective Time Study

open access: yesJournal of Advanced Nursing, EarlyView.
ABSTRACT Aim To clarify how public health nurses allocate their time across various tasks and compare time‐use patterns between prefectural and municipal public health nurses in Japan, where distinct administrative mandates define their roles. Design A self‐reported, prospective time study.
Kyoko Yoshioka‐Maeda   +10 more
wiley   +1 more source

New opportunities for studying digital information transmission technologies using Cisco equipment [PDF]

open access: yesE3S Web of Conferences
The article describes a methodology for studying network technologies using Cisco equipment to create a model of a digital three-level information transmission network with further analysis of the network state and network traffic research.
Prosviryakova L. V.   +2 more
doaj   +1 more source

Economic Development Potential through IP Telephony for Namibia [PDF]

open access: yes
IP telephony, economic growth, telecommunications, ICT, Granger causality ...
Aochamub, Albertus   +2 more
core  

A study of a Java based framework for telecommunications services : a dissertation submitted in fulfilment of the requirements for the degree of Master of Science in Computer Science, Massey University, New Zealand [PDF]

open access: yes, 2000
Additional content held on disk with print copy in Library.In this report, we study some of the general issues surrounding the area of telecommunications service development including the history of telecommunications services, current service creation ...
Ferry, David Ian
core  

Non-Repudiation in Internet Telephony

open access: yes, 2007
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication.
Hett, Christian   +2 more
core   +1 more source

Thinking and Talking About War: How the Public in Six Countries Discusses the Outbreak of the War in Ukraine

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract The Russian aggression in Ukraine, launched on 24 February 2022, marked the return of conventional war in the European continent. While Western leaders have framed the ongoing conflict through a common narrative when speaking internationally, which varies in its national nuances, much less is known about the images and lenses that the European
Carlotta Mingardi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy