Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Gurbani, Vijay
Lucent Technologies, Inc./Bell Laboratories
Naperville, Illinois
 
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 38 reviews

   
   Probability and mathematical statistics: theory, applications, and practice in R
Meyer M., SIAM-Society for Industrial and Applied Mathematics, Philadelphia, PA, 2019. 707 pp.  Type: Book (978-1-611975-77-2)

Back when I was an undergraduate, I took a course in numerical recipes (in the C programming language). That course introduced me to the approximation of answers to questions that, often times, cannot be solved through analytical means...

Jan 7 2020  
   Machine learning with TensorFlow
Shukla N., Manning Publications Co., Greenwich, CT, 2018. 272 pp.  Type: Book (978-1-617293-87-0)

Machine learning with TensorFlow is a short book laid out in three parts. The first part (about 50 pages) gets the reader up to speed with today’s artificial intelligence (AI) and machine learning community. It also co...

May 23 2019  
  Being an applied computer scientist
Gregory Abowd. YouTube, 00:45:24, published on Apr 21, 2016, Michigan Engineering, https://www.youtube.com/watch?v=Xuz5a4dtS0c. Type: Video

In this video, Abowd provides an excellent overview of being an applied computer scientist. The talk combines Abowd’s research interests with his personal quest that ubiquitous computing elements “weave themselves i...

Jun 13 2017  
  Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties
Sultana N., Kohlweiss M., Moore A.  HotMiddlebox 2016 (Proceedings of the 2016 Workshop on Hot Topics in Middleboxes and Network Function Virtualization, Florianopolis, Brazil, Aug 22-26, 2016) 1-6, 2016.  Type: Proceedings

Sultana et al. tackle the problem of remotely making measurements on a network over which the party conducting the reconnaissance has no control. Such scenarios are prevalent in cloud computing, where the subscriber to a cloud service ...

Mar 30 2017  
   Counting the security cost of cheap calls
German P. Network Security 2015(11): 9-11, 2015.  Type: Article

Session initiation protocol (SIP) trunking effectively allows enterprises and small businesses to continue leveraging their voice-over-IP (VoIP) infrastructure and related IP-based productivity suites (desktop sharing, web conferencing...

Jun 20 2016  
   SIPAD: SIP-VoIP anomaly detection using a stateful rule tree
Seo D., Lee H., Nuwere E. Computer Communications 36(5): 562-574, 2013.  Type: Article

The prevalence of the session initiation protocol (SIP) in communications networks has led to an increase in papers that study attacks against the protocol. The paper by Seo et al. uses a stateful rule tree to detect a malformed SIP at...

Apr 14 2014  
   Analysis of SIP-based threats using a VoIP honeynet system
Hoffstadt D., Marold A., Rathgeb E.  TrustCom 2012 (Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, Jun 25-27, 2012) 541-548, 2012.  Type: Proceedings

As the session initiation protocol (SIP) is increasingly deployed in telecommunications carrier networks, the threat of fraud associated with it rises. The most insidious of the frauds is toll fraud, whereby an imposter authenticates a...

Jul 2 2013  
   AdSIP: decentralized SIP for mobile ad hoc networks
Yahiaoui S., Belhoul Y., Nouali-Taboudjemat N., Kheddouci H.  WAINA 2012 (Proc. of 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, Fukuoka, Japan, Mar 26-29, 2012) 490-495, 2012.  Type: Proceedings

This paper attempts to outline a novel method for supporting the session initiation protocol (SIP) over mobile ad hoc networks (MANETs). Because central entities in SIP (the domain name system (DNS), SIP proxy servers, and SIP registra...

Mar 19 2013  
   SIP steganalysis using chaos theory
Zhao H., Zhang X.  CMCSN 2012 (Proceedings of the 2012 International Conference on Computing, Measurement, Control and Sensor Network, Taiyuan, China, Jul 7-9, 2012) 95-100, 2012.  Type: Proceedings

Steganography involves the concealment of unrelated information in a data stream. The authors of this paper propose the use of chaos theory to determine whether a certain information element used in session initiation protocol (SIP) si...

Jan 24 2013  
  Peer-to-peer computing: applications, architecture, protocols, and challenges
Kwok Y., CRC Press, Inc., Boca Raton, FL, 2011. 216 pp.  Type: Book (978-1-439809-34-1)

Kwok presents a thin though comprehensive monograph on the current state of peer-to-peer (P2P) research. Certain omissions are glaring, but by and large the treatment of the topic is extensive. A researcher or graduate student who woul...

Jan 31 2012  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy