Network Address Translation In Home Gateways
By Jed Johnson, Art Harvey, Motorola, Inc.
|
2001 |
An Analysis Of Proven Pay CATV Systems
By Richard D. Petit,
K'son Corporation
|
1973 |
Wide-Screen Scanning System For Film-To-Tape Transfer
By K. Blair Benson,
Goldmark Communications Corporation
|
1973 |
Advanced Wireless Possibilities
By Carol Ansley, ARRIS
|
2016 |
Cloud Overlay (CLOVER)
By John Jason Brzozowski, Mark Brittingham, Chris Luke & Zheng Yin, Comcast
|
2017 |
Media Processing On Cloud: Scalable, Manageable, and Cost Effective
By Srini Akkala, ARRIS
|
2017 |
Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vCPE
By Ajay Manuga, Benu Networks
|
2017 |
Automation of Virtual CCAP to Reduce OpEx and Enable New Revenue Streams in the Access Network
By Michael O’Hanlon & Eric Heaton, Intel Corporation – Network Platforms Group
|
2018 |
HFC Evolution: The Best Path Forward
By Nader Foroughi, Shaw Communications
|
2018 |
Cost-Effective, Scalable Quality of Experience Monitoring for SD-WAN Networks
By Edouard Karam & Greg Spear, Accedian
|
2019 |
Using Machine Learning to Automate Node Split Designs and HFC Augmentation Options
By Keith R. Hayes, IMMCO, Inc.
|
2020 |
Addressing Unrelenting Growth in Backbone Fiber Systems Using Next Generation Photonics and Automation
By Timothy Maenpaa, Ciena Corporation
|
2020 |
Aggregate Wi-Fi Telemtery Use Cases
By Colleen Szymanik, Comcast
|
2020 |
Developing Installation Guidelines for Wi-Fi Managed Devices
By Albert Garcia, Comcast
|
2020 |
Truth/Devil is in the Details: The Fusion of Design and Telemetry Information in Access Networks
By Matt Wichman, Venk Mutalik, Joann Shumard, Kathy Fox; Comcast
|
2022 |
Are Your Critical Facilities Ready To Be Managed With Big Data?
By Dustin Boyette, EnerSys
|
2022 |
Bitcode Obfuscation - Protecting Software Without Source Code Access
By Rafie Shamsaasef, Lex Aaron Anderson; CommScope
|
2022 |
Commercial Network Services Lifecycle Management
By Pattabi Ayyasami, Tirumalesh Ramaiah Reddy; Comcast
|
2022 |
Security and Privacy IoT Vulnerabilities: The Danger of Too Many Entry Points
By Mangesh Bhamre, Plume Design, Inc.
|
2022 |
Strategies and Techniques for Ensuring Network Reliability for Enterprise Customers
By Dhirendra Singh Kashiwale, Yogesh Ade; Comcast
|
2022 |