The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vijay K. Gurbani: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vijay K. Gurbani, Anita Garvert, James D. Herbsleb
    A case study of a corporate open source development model. [Citation Graph (0, 0)][DBLP]
    ICSE, 2006, pp:472-481 [Conf]
  2. Vijay K. Gurbani, Lalita Jagadeesan, Veena B. Mendiratta
    Characterizing Session Initiation Protocol (SIP) Network Performance and Reliability. [Citation Graph (0, 0)][DBLP]
    ISAS, 2005, pp:196-211 [Conf]
  3. Janet R. Dianda, Vijay K. Gurbani, Mark H. Jones
    Session initiation protocol services architecture. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2002, v:7, n:1, pp:3-23 [Journal]
  4. Robert M. Arlein, Vijay K. Gurbani
    An extensible framework for constructing SIP user agents. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:3, pp:87-100 [Journal]
  5. Vijay K. Gurbani, Tsun-Chieh Chiang, Suresh Kumar
    SIP: A routing protocol. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2001, v:6, n:2, pp:136-152 [Journal]
  6. Vijay K. Gurbani, Rajnish Jain
    Transport protocol considerations for session initiation protocol networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:1, pp:83-97 [Journal]
  7. Vijay K. Gurbani, Rajnish Jain
    Contemplating some open challenges in SIP. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:3, pp:255-269 [Journal]
  8. Vijay K. Gurbani, Kim Q. Liu
    Session initiation protocol: Service residency and resiliency. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2003, v:8, n:1, pp:83-94 [Journal]
  9. Tsun-Chieh Chiang, Vijay K. Gurbani, John B. Reid
    The need for third-party call control. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2002, v:7, n:1, pp:41-46 [Journal]
  10. Ganesh Jayadevan, Vijay K. Gurbani, Robert M. Arlein
    Adapting SIP for application server requirements in 3G networks. [Citation Graph (0, 0)][DBLP]
    Bell Labs Technical Journal, 2004, v:9, n:3, pp:57-71 [Journal]
  11. Vijay K. Gurbani, Xian-He Sun
    A systematic approach for closer integration of cellular and Internet services. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2005, v:19, n:1, pp:26-32 [Journal]
  12. Vijay K. Gurbani, Xian-He Sun
    Terminating telephony services on the internet. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:4, pp:571-581 [Journal]

  13. Phishwish: A Stateless Phishing Filter Using Minimal Rules. [Citation Graph (, )][DBLP]


  14. Cryptographically Transparent Session Initiation Protocol (SIP) Proxies. [Citation Graph (, )][DBLP]


  15. A Case Study on Constructing a Security Event Management System. [Citation Graph (, )][DBLP]


  16. An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain. [Citation Graph (, )][DBLP]


  17. Managing a corporate open source software asset. [Citation Graph (, )][DBLP]


Search in 0.296secs, Finished in 0.298secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002