default search action
Tom Taylor
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j4]Bill Moran, Frederick R. Cohen, Zengfu Wang, Sofia Suvorova, Douglas Cochran, Tom Taylor, Peter Mark Farrell, Stephen D. Howard:
Bounds on Multiple Sensor Fusion. ACM Trans. Sens. Networks 12(2): 16:1-16:26 (2016) - [i28]Tina Tsou, Weibo Li, Tom Taylor, James Huang:
Port Management to Reduce Logging in Large-Scale NATs. RFC 7768: 1-11 (2016) - 2015
- [i27]Tom Taylor, Dan Romascanu:
MIB Transfer from the IETF to the IEEE 802.3 WG. RFC 7448: 1-7 (2015) - [i26]Ole Troan, Wojciech Dec, Xing Li, CongXiao Bao, Satoru Matsushima, Tetsuya Murakami, Tom Taylor:
Mapping of Address and Port with Encapsulation (MAP-E). RFC 7597: 1-35 (2015) - [i25]Simon Perreault, Tina Tsou, Senthil Sivakumar, Tom Taylor:
Deprecation of MIB Module NAT-MIB: Managed Objects for Network Address Translators (NATs). RFC 7658: 1-62 (2015) - [i24]Simon Perreault, Tina Tsou, Senthil Sivakumar, Tom Taylor:
Definitions of Managed Objects for Network Address Translators (NATs). RFC 7659: 1-84 (2015) - [i23]Cathy Zhou, Tom Taylor, Qiong Sun, Mohamed Boucadair:
Attribute-Value Pairs for Provisioning Customer Equipment Supporting IPv4-Over-IPv6 Transitional Solutions. RFC 7678: 1-23 (2015) - 2014
- [i22]William Moran, Frederick R. Cohen, Zengfu Wang, Sofia Suvorova, Douglas Cochran, Tom Taylor, Peter Mark Farrell, Stephen D. Howard:
Bounds on Multiple Sensor Fusion. CoRR abs/1410.3083 (2014) - [i21]Francois Le Faucheur, Roberta Maglione, Tom Taylor:
Multicast Control Extensions for the Access Node Control Protocol (ANCP). RFC 7256: 1-99 (2014) - 2013
- [i20]Tina Tsou, Ruibing Hao, Tom Taylor:
Realm-Based Redirection In Diameter. RFC 7075: 1-10 (2013) - 2012
- [c3]Tigest Tamrat, Margaret Griffin, Sonia Rupcic, Stan Kachnowski, Tom Taylor, James Barfield:
Operationalizing a wireless wearable fall detection sensor for older adults. PervasiveHealth 2012: 297-302 - [i19]Tina Tsou, Cathy Zhou, Tom Taylor, Qi Chen:
Gateway-Initiated IPv6 Rapid Deployment on IPv4 Infrastructures (GI 6rd). RFC 6654: 1-8 (2012) - [i18]Anna Charny, Fortune Huang, Georgios Karagiannis, Michael Menth, Tom Taylor:
Pre-Congestion Notification (PCN) Boundary-Node Behavior for the Controlled Load (CL) Mode of Operation. RFC 6661: 1-33 (2012) - [i17]Anna Charny, Xinyan (Joy) Zhang, Georgios Karagiannis, Michael Menth, Tom Taylor:
Pre-Congestion Notification (PCN) Boundary-Node Behavior for the Single Marking (SM) Mode of Operation. RFC 6662: 1-31 (2012) - [i16]Georgios Karagiannis, Tom Taylor, Kwok-Ho Chan, Michael Menth, Philip Eardley:
Requirements for Signaling of Pre-Congestion Information in a Diffserv Domain. RFC 6663: 1-7 (2012) - [i15]Glen Zorn, Qin Wu, Tom Taylor, Yoav Nir, Katrin Hoeper, Sebastien Decugis:
Handover Keying (HOKEY) Architecture Design. RFC 6697: 1-20 (2012) - [i14]Ken Carlberg, Tom Taylor:
Diameter Priority Attribute-Value Pairs. RFC 6735: 1-10 (2012) - 2011
- [c2]Prasun Mahanti, Tom Taylor, Douglas Cochran, Mark A. Hayes, Noah Weiss, Paul Jones:
Spatio-temporal image analysis of particle streaks in micro-channels for low-cost electro-hydrodynamic flow characterization. EMBC 2011: 4026-4029 - [i13]Tina Tsou, Glen Zorn, Tom Taylor:
Session-Specific Explicit Diameter Request Routing. RFC 6159: 1-19 (2011) - [i12]Sanjay Wadhwa, Jerome Moisand, Thomas Haag, Norbert Voigt, Tom Taylor:
Protocol for Access Node Control Mechanism in Broadband Networks. RFC 6320: 1-82 (2011) - 2010
- [j3]Michael Menth, Frank Lehrieder, Bob Briscoe, Philip Eardley, Toby Moncaster, Jozef Babiarz, Anna Charny, Xinyang Zhang, Tom Taylor, Kwok-Ho Chan, D. Satoh, Rüdiger Geib, Georgios Karagiannis:
A Survey of PCN-Based Admission Control and Flow Termination. IEEE Commun. Surv. Tutorials 12(3): 357-375 (2010) - [c1]Hasan Davulcu, Syed Toufeeq Ahmed, Sedat Gokalp, M'hamed H. Temkit, Tom Taylor, Mark Woodward, Ali Amin:
Analyzing Sentiment Markers Describing Radical and Counter-Radical Elements in Online News. SocialCom/PASSAT 2010: 335-340
2000 – 2009
- 2008
- [i11]Tom Taylor, Hannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam:
Security Threats and Requirements for Emergency Call Marking and Mapping. RFC 5069: 1-12 (2008) - [i10]Tom Taylor:
Reclassification of RFC 3525 to Historic. RFC 5125: 1-4 (2008) - [i9]Martin Stiemerling, Jürgen Quittek, Tom Taylor:
Middlebox Communication (MIDCOM) Protocol Semantics. RFC 5189: 1-70 (2008) - [i8]Henning Schulzrinne, Tom Taylor:
Definition of Events for Channel-Oriented Telephony Signalling. RFC 5244: 1-23 (2008) - 2006
- [i7]Henning Schulzrinne, Tom Taylor:
RTP Payload for DTMF Digits, Telephony Tones, and Telephony Signals. RFC 4733: 1-49 (2006) - [i6]Henning Schulzrinne, Tom Taylor:
Definition of Events for Modem, Fax, and Text Telephony Signals. RFC 4734: 1-47 (2006) - [i5]Tom Taylor:
Example Media Types for Use in Documentation. RFC 4735: 1-6 (2006) - 2005
- [i4]Martin Stiemerling, Jürgen Quittek, Tom Taylor:
Middlebox Communications (MIDCOM) Protocol Semantics. RFC 3989: 1-70 (2005) - 2003
- [i3]Christian Groves, Marcello Pantaleo, Terry L. Anderson, Tom Taylor:
Gateway Control Protocol Version 1. RFC 3525: 1-213 (2003) - 2000
- [j2]Tom Taylor:
Megaco/H.248: a new standard for media gateway control. IEEE Commun. Mag. 38(10): 124-132 (2000) - [j1]Ivonne Diaz-Rivera, Dieter Armbruster, Tom Taylor:
Periodic Orbits in a Class of Re-Entrant Manufacturing Systems. Math. Oper. Res. 25(4): 708-725 (2000) - [i2]Tom Taylor:
Megaco Errata. RFC 2886: 1-21 (2000) - [i1]Randall R. Stewart, Qiaobing Xie, Ken Morneault, Chip Sharp, Hanns Juergen Schwarzbauer, Tom Taylor, Ian Rytina, Malleswar Kalla, Lixia Zhang, Vern Paxson:
Stream Control Transmission Protocol. RFC 2960: 1-134 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint