Abuse And Fraud Detection In High-Speed-Data Networks
By Pat Darisme, NARUS Inc.
|
2001 |
High-Speed Data Multiplexing over HFC Networks
By Mark Laubach, Com21, Inc
|
1998 |
Bandwidth Utilization On Cable-Based High Speed Data Networks
By Terry D. Shaw, Ph. D., CableLabs
|
2002 |
Service And Management Orchestration in Distributed High Speed Data Networks
By Dan Torbet, Tom Cloonan, and Andy Aftelak, ARRIS
and Steve Krapp, MaxLinear
|
2016 |
The Effects Of Single Ended, Push-pull, And Feedforward Distribution Systems On High Speed Data And Video Signals
By Ronald J. Hranac, Jones Intercable, Inc.
|
1984 |
High-Speed Data Services And HFC Network Availability
By Esteban Sandino and Corinna Murphy, Engineering Technologist, Rogers Cablesystems Ltd.
|
1997 |
Capacity Planning For Cable High-speed Data Services✝
By K. R. Krishnan, Martin Eiger, Arnie Neidhardt, and Tamra Carpenter
Telcordia Technologies, New Jersey
|
2004 |
A Taxonomy of Fraud Experienced by Network Service Providers
By Kevin Taylor & Michael Khalilian, Comcast; Steve Goeringer, CableLabs; Eric Winter, Cox Communications
|
2020 |
Push For More Money: Reassessing The Bandwidth Consumption Model For High Speed Data
By Walter Boyles, Wavexpress, Inc.
|
2002 |
Credential Fraud Detection and Remediation in Media Consumption Services
By Steven Epstein, Synamedia
|
2020 |
Theft Of Service In High Speed Data Services: A Way To Deal With This Difficult Problem
By Jonathan Schmidt, PerfTech Bulletin Services
|
2003 |
Fraud Prevention and Privacy Law: Emerging Conflicts Between Privacy Law and Fraud Prevention
By Will Bracker, Cox Communications; Steve Goeringer & Simon Krauss, CableLabs
|
2020 |
Bringing Together Headend Consolidation and High-Speed Data Traffic in HFC Architecture Design
By Dr. Timothy Brophy, Dr. Robert Howald, Curt Smith, General Instrument Corporation, Transmission Network Systems
|
1999 |
Self Service Activation A Field Study Of High-Speed Data (HSD) Self Install
By Bruce F. Bahlmann, MediaOne Internet Services Group
|
1999 |
Employing Neural Networks for Improved Root Cause Analysis in Service Provider Clouds
By Helen Zeng, Ph.D. & Robert McIntyre, VMware
|
2020 |
Exploring Multi-Access Edge Compute in Converging Access Networks
By Andrii Vladyka, Asaf Matatyaou & Howard Abramson, Harmonic Inc.
|
2021 |
Leakage Detection In Full Duplex DOCSIS - Identification and Measurement of Leakage Levels in a Multigigabit Symmetrical Full Duplex DOCSIS Network
By Benny Lewandowski, Comcast; Greg Tresness, Arcom Digital, LLC.; Jon-En Wang, Comcast
|
2022 |
Operationalizing the Grey Optics Architecture
By Venk Mutalik, Dan Rice, Bob Gaydos, Doug Combs & Pat Wike, Comcast
|
2020 |
Leakage Detection Using Test Signal Phase with GPS
By Thomas H. Williams and Colin Justis, Cable Television Laboratories, Inc.
|
2016 |
Security and Privacy IoT Vulnerabilities: The Danger of Too Many Entry Points
By Mangesh Bhamre, Plume Design, Inc.
|
2022 |