A framework to access networked appliances in wide area networks

M Rahman, D Braun… - … Communications and …, 2005 - ieeexplore.ieee.org
… considered within the scope of a signaling protocol including presence based messaging, …
, contains enough information to route the request to the appropriate entity per the request

[PDF][PDF] DUMmIES‰

P Gregory - 2006 - Citeseer
… IP-based communications systems together over long distances… Internet standards as a
model, and used a text-based request/… or deny others to see their presence based on time of day, …

[PDF][PDF] Covert channels in ad hoc networking: an analysis using the optimized link state routing protocol

J Edwards - 2012 - repository.library.carleton.ca
… This thesis builds on previous methods of wormhole … covert channel communication
between ad hoc nodes within the … data through the observation of AODV route requests with no …

Dynamic service orchestration in the IP multimedia subsystem

R Spiers - 2017 - open.uct.ac.za
… a network operator greater flexibility in routing service requests, … content and the new services
being used over the internet. … over the Internet which allow end users to communicate with …

IMS and Convergence Management

K Kawakami, K Kenyoshi, T Misu - … Networks, Services, and …, 2010 - Wiley Online Library
… W-CDMA network, and through a relay router in the access type IP … Verifies if the QoS resource
request is within the permitted … This kind of call forwarding is called “presence-based call …

Realistic applications for wireless sensor networks

JA Stankovic, AD Wood, T He - … aspects of distributed computing in sensor …, 2011 - Springer
… had networked sensor systems that operate largely within … access and the system’s policies
such that the requests can be … in every room are called presence-based CAR. Those based …

A framework for converged video services in the IP Multimedia Subsystem

D Patnaik, A Deshpande, A Poonawalla… - … on Internet …, 2009 - ieeexplore.ieee.org
… to which the incoming requests should be routed. This allows … a unified communication
platform between the Internet and … 2.0, social networking and presencebased applications. We …

[图书][B] Solar: Building a context fusion network for pervasive computing

G Chen - 2005 - search.proquest.com
… to predict human presence based on historical observations. In … are local and intra-service
communications are hidden. … We saw a similar wide variance across the 20 requests within a …

Availability in bittorrent systems

G Neglia, G Reina, H Zhang, D Towsley… - … Communications, 2007 - ieeexplore.ieee.org
systems in the Internet [10], [11], [12], [13], [14]. In [10] the authors investigate peers availability
through … In this paper we refer to this request as an announce request. In order to support …

Safeguarding the Connected Future: Security in Internet of Things (IoT)

P Maheshwary, T Malche - Internet of Things Security, 2022 - taylorfrancis.com
… control over the IoT system. In this attack, the attacker takes advantage of unsecured network
communications … It runs over UDP instead of TCP and follows the request–response model. …