Advanced Search

Bitcode Obfuscation - Protecting Software Without Source Code Access
By Rafie Shamsaasef, Lex Aaron Anderson; CommScope
2022
Dynamically Addressing the Gap of Software Application Protection without Hardware Security
By Rafie Shamsaasef & Aaron Anderson, CommScope
2019
Cloud-based Dynamic Executable Verification
By Rafie Shamsaasef, Aaron Anderson & Sasha Medvinsky, CommScope
2020
Key Learnings from Comcast’s Use of Open Source Software in the Access Network
By Louis Donofrio & Qin Zang, Comcast Cable; Vignesh Ramamurthy, Infosys Consulting
2020
A Supply Chain of Weak Links: Open Source Versus Proprietary Software Threat Analysis
By Brian A. Scriber, CableLabs
2023
Open Source, a Mindset and How it Has Transformed Common Platform Enumeration Stack Software Development using Reference Design Kit
By Khem Raj, Comcast
2022
Xml Schema Representing An EBIF Template Definition, Method For Auto-generating Schematic Instances From Original EBIF Source Code And Constraining Customized Instantiations Of The Resulting Template
By Mike McMahon and Lea Anne Dobbins, Comcast Media Center
2010
Diversity Via Code Transformations: A Solution For NGNA Renewable Security
By Yongxin Zhou, Alec Main, Cloakware Inc.
2006
2019 Virtualized CPE Services Have Finally Arrived Via Service Delivery Platforms
By Ian Wheelock & Charles Cheevers, CommScope
2019
Why Location is Now a Thing in Wi-Fi: Operational Considerations for Standard Power 6 GHz Wi-Fi
By Scott Voegele, CommScope
2023
Powering the Near Future 10G Access Network: Considerations for Assuring Sufficient and Reliable Power
By Rob Anderson, EnerSys Energy Systems
2020
Keeping The Lights On - Protecting Your Remote Active Fiber Elements Against Unplanned Outages
By Rob Anderson, EnerSys
2022
Ultra Low-Cost Injection-locked FP Laser Source for Coherent Access Networks
By Zhensheng (Steve) Jia, Ph.D., L. Alberto Campos, Ph.D., Mu Xu, Ph.D, Haipeng Zhang, Ph.D., Junwen Zhang, Ph.D., Chris Stengrim & Curtis Knittle, Ph.D., CableLabs
2019
Securing Digital Content – Strengths And Weaknesses Of Software And Hardware Implementations
By Robin Wilson
2005
Hidden Risk of Unpopularity in Open Source
By Chujiao Ma & Vaibhav Garg, Comcast Cable
2021
The Architecture of the Open-Source Remote Phy Device
By Alon Bernstein and Anlu Yan, Cisco Systems
2016
Openness And Secrecy In Security Systems: Polycipher Downloadable Conditional Access
By Tom Lookabaugh, PolyCipher and James Fahrny, Comcast Cable
2007
A Flexible and Scalable Architecture for Over-the-Air Credentials Provisioning
By Alexander Medvinsky, Dr. Tat Chan, Dr. Xin Qiu & Jason Pasion, CommScope
2020
Streaming Telemetry Data from the Home Network using OpenWrt Access CPE
By Shlomo Ovadia, Ph.D., Deependra Rawat & Dan Lynch, Charter Communications
2020
Delivering Access Beyond 10G: Coherent Subcarrier Aggregation as Backhaul for Next-Generation R-OLT, RMD, and Wireless
By Colin Howlett & Kevin A. Noll, Vecima; Aaron Chase & Antonio Napoli, Infinera; Jay Rolls, Pacband
2021