1,399 research outputs found

    Options for Securing RTP Sessions

    Get PDF
    The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments. The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism. This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism

    Securing the RTP framework: why RTP does not mandate a single media security solution

    Get PDF
    This memo discusses the problem of securing real-time multimedia sessions, and explains why the Real-time Transport Protocol (RTP), and the associated RTP control protocol (RTCP), do not mandate a single media security mechanism. Guidelines for designers and reviewers of future RTP extensions are provided, to ensure that appropriate security mechanisms are mandated, and that any such mechanisms are specified in a manner that conforms with the RTP architecture

    Sending multiple RTP streams in a single RTP session

    Get PDF
    This memo expands and clarifies the behavior of Real-time Transport Protocol (RTP) endpoints that use multiple synchronization sources (SSRCs). This occurs, for example, when an endpoint sends multiple RTP streams in a single RTP session. This memo updates RFC 3550 with regard to handling multiple SSRCs per endpoint in RTP sessions, with a particular focus on RTP Control Protocol (RTCP) behavior. It also updates RFC 4585 to change and clarify the calculation of the timeout of SSRCs and the inclusion of feedback messages

    On the usefulness of finding charts Or the runaway carbon stars of the Blanco & McCarthy field 37

    Get PDF
    We have been recently faced with the problem of cross--identifying stars recorded in historical catalogues with those extracted from recent fully digitized surveys (such as DENIS and 2MASS). Positions mentioned in the old catalogues are frequently of poor precision, but are generally accompanied by finding charts where the interesting objects are flagged. Those finding charts are sometimes our only link with the accumulated knowledge of past literature. While checking the identification of some of these objects in several catalogues, we had the surprise to discover a number of discrepancies in recent works.The main reason for these discrepancies was generally the blind application of the smallest difference in position as the criterion to identify sources from one historical catalogue to those in more recent surveys. In this paper we give examples of such misidentifications, and show how we were able to find and correct them.We present modern procedures to discover and solve cross--identification problems, such as loading digitized images of the sky through the Aladin service at CDS, and overlaying entries from historical catalogues and modern surveys. We conclude that the use of good finding charts still remains the ultimate (though time--consuming) tool to ascertain cross--identifications in difficult cases.Comment: 4 pages, 1 figure, accepted by A&

    Options for Securing RTP Sessions

    Get PDF
    The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments. The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism. This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism

    Assessing The Accuracy Of Radio Astronomy Source Finding Algorithms

    Full text link
    This work presents a method for determining the accuracy of a source finder algorithm for spectral line radio astronomy data and the Source Finder Accuracy Evaluator (SFAE), a program that implements this method. The accuracy of a source finder is defined in terms of its completeness, reliability, and accuracy of the parameterisation of the sources that were found. These values are calculated by executing the source finder on an image with a known source catalogue, then comparing the output of the source finder to the known catalogue. The intended uses of SFAE include determining the most accurate source finders for use in a survey, determining the types of radio sources a particular source finder is capable of accurately locating, and identifying optimum parameters and areas of improvement for these algorithms. This paper demonstrates a sample of accuracy information that can be obtained through this method, using a simulated ASKAP data cube and the Duchamp source finder.Comment: 8 pages, 6 figures, to be published in Publications of the Astronomical Society of Australi

    Work changes and employee age, maladaptive coping expectations, and well-being: a Swedish cohort study

    Get PDF
    PURPOSE: Older workers are expected to suffer more from work changes than younger ones, but empirical evidence is lacking. Negative responses to work changes may result rather from maladaptive coping expectations. This study examined possible age differences in job and life satisfaction, and sleep disturbances, after work changes (voluntary and involuntary job changes, reorganizations) and the moderating role of maladaptive coping expectations. METHODS: Four biennial waves from the Swedish Longitudinal Occupational Survey of Health (SLOSH) including respondents who participated in all four waves (n = 3084). We used multilevel path analyses to estimate direct and moderated relationships between work changes and outcomes. RESULTS: Involuntary job changes were associated with lower job and life satisfaction and more sleep disturbances. Reorganizations were only associated with lower job satisfaction. Older employees were more satisfied with their jobs and lives than younger employees and experienced more sleep disturbances. After involuntary job changes, older employees had similar (lower) levels of well-being as younger ones, but they reported more sleep disturbances when having experienced reorganizations. Maladaptive coping expectations were related to lower job and life satisfaction and more sleep disturbances. Employees with maladaptive coping expectations reported more sleep disturbances after involuntary job changes and reorganizations. CONCLUSION: Our results suggest that there are few age differences in well-being after work changes. Employee well-being seems to mostly depend on maladaptive coping expectations. Organizations aiming to prepare employees for job changes and reorganizations could focus their efforts on employees with maladaptive expectations rather than on older ones

    A dozen colliding wind X-ray binaries in the star cluster R136 in the 30Doradus region

    Get PDF
    We analyzed archival Chandra X-ray observations of the central portion of the 30 Doradus region in the Large Magellanic Cloud. The image contains 20 X-ray point sources with luminosities between 5×10325 \times 10^{32} and 2×10352 \times 10^{35} erg s−1^{-1} (0.2 -- 3.5 keV). A dozen sources have bright WN Wolf-Rayet or spectral type O stars as optical counterparts. Nine of these are within ∼3.4\sim 3.4pc of R136, the central star cluster of NGC2070. We derive an empirical relation between the X-ray luminosity and the parameters for the stellar wind of the optical counterpart. The relation gives good agreement for known colliding wind binaries in the Milky Way Galaxy and for the identified X-ray sources in NGC2070. We conclude that probably all identified X-ray sources in NGC2070 are colliding wind binaries and that they are not associated with compact objects. This conclusion contradicts Wang (1995) who argued, using ROSAT data, that two earlier discovered X-ray sources are accreting black-hole binaries. Five of the eighteen brightest stars in R136 are not visible in our X-ray observations. These stars are either single, have low mass companions or very wide orbits. The resulting binary fraction among early type stars is then unusually high (at least 70%).Comment: 23 pages, To appear in August in Ap
    • …
    corecore