A Comparative Analysis Of IP Streaming Video Versus Mpeg Video Over Cable
By Prashant P. Gandhi, Ph.D., Cisco Systems, Inc
|
2001 |
A Secure Delivery And Usage Model For Rich Content That Minimizes Peak Network Congestion
By Walter Boyles, Wavexpress, Inc.
|
2001 |
Simulation Of Video-On-Demand Traffic
By Mark Cronshaw, Ph.D. & Victoria Okeson, AT&T Broadband Labs, Westminster, CO
|
2001 |
An MSO Approach To Securing The ‘Internet Of Things’
By Jim Poder, IOT Strategy and Innovation
|
2015 |
Virtualizing the Home Network
By Michael Kloberdans, CableLabs
|
2015 |
The Yin And The Yang Of A Move To All Fiber: Transforming HFC To An All Fiber Network While Leveraging The Deployed HFC Assets
By Venk Mutalik, Marcel Schemmann, Zoran Maricevic, and John Ulm, ARRIS Group
|
2015 |
A Software Friendly DOCSIS Control Plane
By Alon Bernstein, Cisco Systems
|
2012 |
Virtual Environment For Networking Testing And Design
By Judy Beningson, Colby Barth, Brendan Hayes, Juniper Networks, Inc.
|
2012 |
The Architecture of the Open-Source Remote Phy Device
By Alon Bernstein and Anlu Yan, Cisco Systems
|
2016 |
An Economic Analysis Of Brownfield Migration CTTH vs. FTTH
By Michael Emmendorfer, ARRIS
|
2016 |
Head In The Cloud, Feet On The Ground: Virtualization Of The Residential Gateway
By Barak Hermesh, Shaul Shulman, Guy Ray, Paul Mannion and Eoin Walsh, Intel Corporation
|
2016 |
Effective Utilization Of M-ABR (Multicast Assisted ABR) Using Big
By Sridhar Kunisetty, Jeffrey Tyre, and Robert Myers,
ARRIS
|
2016 |
Best Practices for DOCSIS 3.1 Phase Noise Design in the Remote PHY Node
By Zhuo Zhao, Jiayou Meng & Haibin Tang, Cisco System
|
2017 |
Security of Open Distributed Architectures: Yet Another SDN and NFV Security Paper
By Steve Goeringer, CableLabs; Dr. Indrajit Ray, Colorado State University
|
2017 |
Automated Detection for Theft of OTT Services and Content
By Lucas Catranis, Brian Yuan & Dave Belt, Irdeto
|
2017 |
Fiber Deep Networks and The Lessons Learned From The Field
By Todd Loeffelholz, Alpha Technologies Inc.
|
2017 |
IT Data Security in An MSO Environment
By Robert Gyori, Charter Communications
|
2017 |
Network Migration Strategies
By Ayham Al-Banna, Tom Cloonan & Jeff Howe, ARRIS
|
2017 |
Optimizing and Protecting the Value of Unlicensed Spectrum
By Narayan Menon, Angelo Cuffaro, Jean-Louis Gauvreau & Todd Mersch, XCellAir
|
2017 |
The Imperative of Customer-Centric Operations
By Anis Cheikhrouhou, Jim Davenport & Anish Kelkar, Nokia, Bell Labs Consulting
|
2017 |