QoE management of multimedia streaming services in future networks: A tutorial and survey

AA Barakabitze, N Barman, A Ahmad… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The highly demanding Over-The-Top (OTT) multimedia applications pose increased
challenges to Internet Service Providers (ISPs) for assuring a reasonable Quality of …

Standardized protocol stack for the internet of (important) things

MR Palattella, N Accettura, X Vilajosana… - … surveys & tutorials, 2012 - ieeexplore.ieee.org
We have witnessed the Fixed Internet emerging with virtually every computer being
connected today; we are currently witnessing the emergence of the Mobile Internet with the …

Internet of things from hype to reality

A Rayes, S Salam - Springer, 2017 - Springer
Technology is becoming embedded in nearly everything in our lives. Just look around you
and you will see how the Internet has affected many aspects of our existence. Virtually …

Real-time human pose recognition in parts from single depth images

J Shotton, A Fitzgibbon, M Cook, T Sharp… - CVPR …, 2011 - ieeexplore.ieee.org
We propose a new method to quickly and accurately predict 3D positions of body joints from
a single depth image, using no temporal information. We take an object recognition …

Smart grid communications: Overview of research challenges, solutions, and standardization activities

Z Fan, P Kulkarni, S Gormus… - … Surveys & Tutorials, 2012 - ieeexplore.ieee.org
Optimization of energy consumption in future intelligent energy networks (or Smart Grids)
will be based on grid-integrated near-real-time communications between various grid …

[图书][B] 6LoWPAN: The wireless embedded Internet

Z Shelby, C Bormann - 2011 - books.google.com
" It is stunningly thorough and takes readers meticulously through the design, configuration
and operation of IPv6-based, low-power, potentially mobile radio-based networking."—Vint …

A data-oriented (and beyond) network architecture

T Koponen, M Chawla, BG Chun… - Proceedings of the …, 2007 - dl.acm.org
The Internet has evolved greatly from its original incarnation. For instance, the vast majority
of current Internet usage is data retrieval and service access, whereas the architecture was …

[图书][B] Domain-specific modeling: enabling full code generation

S Kelly, JP Tolvanen - 2008 - books.google.com
"[The authors] are pioneers.... Few in our industry have their breadth of knowledge and
experience."—From the Foreword by Dave Thomas, Bedarra Labs Domain-Specific …

[HTML][HTML] Datagram transport layer security version 1.2

E Rescorla, N Modadugu - 2012 - rfc-editor.org
RFC 6347: Datagram Transport Layer Security Version 1.2 [RFC Home] [TEXT|PDF|HTML] [Tracker]
[IPR] [Errata] [Info page] Obsoleted by: 9147 PROPOSED STANDARD Updated by: 7507 …

Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …