Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
The Potential of Digitalization to Improve the Skills of Agri-Food Market Participants: Technical and Economic Opportunities of Multicasting and Internet Television
Automatic Documentation and Mathematical Linguistics (SPADML), Volume 57, Issue 6Pages 309–332https://doi.org/10.3103/S0005105523060031AbstractThis article deals with the potential of digitalization to improve participants’ skills in the agri-food market. The topic of improving technical mechanisms and software technologies aimed at the qualitative development of e-education in Russia is ...
- research-articleJanuary 2023
On the use of deep learning in software defect prediction
Journal of Systems and Software (JSSO), Volume 195, Issue Chttps://doi.org/10.1016/j.jss.2022.111537Abstract Context:Automated software defect prediction (SDP) methods are increasingly applied, often with the use of machine learning (ML) techniques. Yet, the existing ML-based approaches require manually extracted features, which ...
Highlights- Most studies applied supervised Deep Learning (DL).
- Two third of the studies ...
- research-articleOctober 2022
Specifying and Verifying SDP Protocol Based Zero Trust Architecture Using TLA+
ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information EngineeringPages 35–43https://doi.org/10.1145/3558819.3558826Software Defined Perimeter (SDP) is a prevalent security framework designed by Cloud Security Alliance (CSA) for Zero Trust Network Access (ZTNA) which aims to prevent novel threats in cloud environment. But there are few studies on the verification of ...
- rfcFebruary 2022
RFC 9143: Negotiating Media Multiplexing Using the Session Description Protocol (SDP)
This specification defines a new Session Description Protocol (SDP) Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and ...
- research-articleJanuary 2022
Research on multi-feature fusion entity relation extraction based on deep learning
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 39, Issue 1-2Pages 93–104https://doi.org/10.1504/ijahuc.2022.120949Entity relation extraction aims to identify the semantic relation category between the target entity pairs in the original text and is one of the core technologies of tasks such as automatic document summarisation, automatic question answering system, and ...
-
- research-articleNovember 2021
Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
Highlights- Zero-trust is a novel network security approach that promises higher network security than traditional solutions.
In response to weaknesses of current network security solutions, the zero-trust model follows the idea that no network – whether internal or external – is trustworthy. The concept of zero-trust is enjoying increasing attention in both ...
- research-articleOctober 2021
Maximizing the minimum secrecy rate of two-way relay networks
Computer Communications (COMS), Volume 178, Issue CPages 259–270https://doi.org/10.1016/j.comcom.2021.08.012AbstractThis paper concerns maximizing the minimum achievable secrecy rate in a two-way multi-antenna relay network in which two single-antenna nodes aim at exchanging their confidential messages with the help of some multi-antenna relays ...
- ArticleSeptember 2021
At Your Service 24/7 or Not? Denial of Service on ESInet Systems
Trust, Privacy and Security in Digital BusinessPages 35–49https://doi.org/10.1007/978-3-030-86586-3_3AbstractEmergency calling services are a cornerstone of public safety. During the last few years such systems are transitioning to VoIP and unified communications, and are continuously evolving under the umbrella of organizations, including NENA and EENA. ...
- ArticleJuly 2021
A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System
AbstractIn this paper, we present a solution to locate the targets with tags in an ultrahigh-frequency (UHF) radio frequency identification (RFID) system, which achieves centimeter level localization accuracy. Many prior works use the Newton iteration ...
- rfcJanuary 2021
RFC 8865: T.140 Real-Time Text Conversation over WebRTC Data Channels
This document specifies how a Web Real-Time Communication (WebRTC) data channel can be used as a transport mechanism for real-time text using the ITU-T Protocol for multimedia application text conversation (Recommendation ITU-T T.140) and how the Session ...
- rfcJanuary 2021
RFC 8858: Indicating Exclusive Support of RTP and RTP Control Protocol (RTCP) Multiplexing Using the Session Description Protocol (SDP)
This document defines a new Session Description Protocol (SDP) media-level attribute, 'rtcp-mux-only', that can be used by an endpoint to indicate exclusive support of RTP and RTP Control Protocol (RTCP) multiplexing. The document also updates RFC 5761 ...
- rfcJanuary 2021
RFC 8856: Session Description Protocol (SDP) Format for Binary Floor Control Protocol (BFCP) Streams
This document defines the Session Description Protocol (SDP) offer/answer procedures for negotiating and establishing Binary Floor Control Protocol (BFCP) streams.
This document obsoletes RFC 4583.
- rfcJanuary 2021
RFC 8850: Controlling Multiple Streams for Telepresence (CLUE) Protocol Data Channel
This document defines how to use the WebRTC data channel mechanism to realize a data channel, referred to as a Controlling Multiple Streams for Telepresence (CLUE) data channel, for transporting CLUE protocol messages between two CLUE entities.
- rfcJanuary 2021
RFC 8844: Unknown Key-Share Attacks on Uses of TLS with the Session Description Protocol (SDP)
This document describes unknown key-share attacks on the use of Datagram Transport Layer Security for the Secure Real-Time Transport Protocol (DTLS-SRTP). Similar attacks are described on the use of DTLS-SRTP with the identity bindings used in Web Real-...
- rfcJanuary 2021
RFC 8843: Negotiating Media Multiplexing Using the Session Description Protocol (SDP)
This specification defines a new Session Description Protocol (SDP) Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and ...
- rfcJanuary 2021
RFC 8842: Session Description Protocol (SDP) Offer/Answer Considerations for Datagram Transport Layer Security (DTLS) and Transport Layer Security (TLS)
This document defines the Session Description Protocol (SDP) offer/answer procedures for negotiating and establishing a Datagram Transport Layer Security (DTLS) association. The document also defines the criteria for when a new DTLS association must be ...
- rfcJanuary 2021
RFC 8840: A Session Initiation Protocol (SIP) Usage for Incremental Provisioning of Candidates for the Interactive Connectivity Establishment (Trickle ICE)
The Interactive Connectivity Establishment (ICE) protocol describes a Network Address Translator (NAT) traversal mechanism for UDP-based multimedia sessions established with the Offer/Answer model. The ICE extension for Incremental Provisioning of ...
- research-articleJanuary 2021
Error Bounds and Singularity Degree in Semidefinite Programming
SIAM Journal on Optimization (SIOPT), Volume 31, Issue 1Pages 812–836https://doi.org/10.1137/19M1289327In semidefinite programming a proposed optimal solution may be quite poor in spite of having sufficiently small residual in the optimality conditions. This issue may be framed in terms of the discrepancy between forward error (the unmeasurable “true error'')...
- research-articleNovember 2020
Performance Analysis of WebRTC and SIP-based Audio and Video Communication Systems
AbstractVideo and audio communications have become an integral part of all spheres of life. Two commonly used real-time communication protocols for IP-based video and audio communications are the session initiation protocol (SIP) and web real-time ...
- research-articleSeptember 2020
Relaxation Methods for Navigation Satellites Set Optimization
Automation and Remote Control (ARCO), Volume 81, Issue 9Pages 1711–1721https://doi.org/10.1134/S0005117920090106AbstractConvex relaxation methods are commonly used to solve nonconvex mathematical optimization problems. These methods transform the original nonconvex problem in such a way that effective methods of solving convex optimization problems become ...