Cullen (Fluffy) Jennings

Blog

Publications

Book

Ph.D.

MSc.

IETF

Papers

Talks

Open Source

Photos

911 & VoIP

Contact

Book

  • Practical VoIP, (O’Reilly, 2002).

Ph.D.

  • “Probabilistic Evidence Combination for Robust Real Time Finger Recognition and Tracking.”
  • Ph.D. Computer Science 2002 University of British Columbia

MSc.

Computer Vision for Line Drawings

May 1993 MSC Thesis at the University of Calgary by Cullen Jennings

Modern maps and engineering diagrams are usually constructed and stored using GIS or CAD systems. A large number of drawings, however, exists only in a paper form. This thesis examines the problem of automatically converting such drawings and maps from raster image to high quality vector GIS or CAD forms.

This thesis begins with a review of previous work in the area and then proposes a new method based on findings about how human vision works and domain specific knowledge. Another system based on the classical work in this area is presented, to which the new system is compared. This comparison shows that the method proposed here obtains substantially better results than classical methods. The time a human operator could expect to spend correcting the errors created by this system would be less than one tenth of the time required to correct the errors created by a classical vectorization system. PDF version of this thesis.

IETF

  • RFC 3325 – “Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks” C. Jennings, J. Peterson, M. Watson, November 2002
  • "NAT Behavioral Requirements for Unicast UDP", F. Audet, C. Jennings, July 2005, draft-ietf-behave-nat-udp-03
    • Abstract: This document defines basic terminology for describing different types of NAT behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or on-line gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly.
  • "A P2P Approach to SIP Registration and Resource Location", D. A. Bryan, C. Jennings, July 2005, draft-bryan-sipping-p2p-01
    • Abstract: This document outlines the motivation and requirements for a Peer-to-Peer (P2P) based approach for SIP registration and resource discovery using distributed hash tables, and presents the architectural design for such a system. This design removes the need for central servers from SIP, while offering full backward compatibility with SIP, allowing reuse of existing clients, and allowing P2P enabled nodes to communicate with conventional SIP entities. A basic introduction to the concepts of P2P is presented, backward compatibility issues addressed, and the security considerations are considered. This is very early work to explore the characteristics that a P2P system might have. It is less secure in many ways than the traditional approach to SIP but has certain other interesting characteristics that may make it desirable in some situations. This work is being discussed on the sipping@ietf.org mailing list.
  • "The Message Session Relay Protocol", B. Campbell, R. Mahy, C. Jennings, July 2005, draft-ietf-simple-message-sessions-11.txt
    • Abstract: This document describes the Message Session Relay Protocol, a protocol for transmitting a series of related instant messages in the context of a session. Message sessions are treated like any other media stream when setup via a rendezvous or session setup protocol such as the Session Initiation Protocol.
  • "Relay Extensions for the Message Sessions Relay Protocol (MSRP)", C. Jennings, R. Mahy, A. B. Roach, July 2005, draft-ietf-simple-msrp-relays-05.txt
    • Abstract: The SIMPLE Working Group uses two separate models for conveying instant messages. Pager-mode messages stand alone and are not part of a SIP (Session Initiation Protocol) session, whereas Session-mode messages are set up as part of a session using the SIP protocol. MSRP (Message Sessions Relay Protocol) is a protocol for near-real-time, peer-to-peer exchanges of binary content without intermediaries, which is designed to be signaled using a separate rendezvous protocol such as SIP. This document introduces the notion of message relay intermediaries to MSRP and describes the extensions necessary to use them.
  • "Response Identity and Authentication in Session Initiation Protocol", F. Cao, C. Jennings, July 2005, draft-cao-sip-response-auth-00
    • Abstract: This draft describes some extensions for verifying SIP response identity and enhancing SIP response authentication. Some mechanisms are demonstrated for providing and verifying the identity of SIP responses. In order to prevent several kinds of security attacks through SIP response, SIP response authentication should be provided through a chain of trust of the SIP responses. Some extensions are proposed to enhance the per-hop authentication for handling SIP response. This draft is an early work in progress and suggests some approaches but there is still significant discussion needed. Some of the attacks discussed in this draft can be mitigated by using the sips URL.
  • "Managing Client Initiated Connections in the Session Initiation Protocol (SIP)", C. Jennings, R. Mahy, July 2005, draft-ietf-sip-outbound-00
    • Abstract: Session Initiation Protocol (SIP) allows proxy servers to initiate TCP connections and send asynchronous UDP datagrams to User Agents in order to deliver requests. However, many practical considerations, such as the existence of firewalls and NATs, prevent servers from connecting to User Agents in this way. Even when a proxy server can open a TCP connection to a User Agent, most User Agents lack a certificate suitable to act as a TLS server. This specification defines behaviors for user agents, registrars and proxy servers that allow requests to be delivered on existing connections established by the User Agent. It also defines keep alive behaviors needed to keep NAT bindings open and specifies the usage of multiple connections for high availability systems.
  • "Certificate Management Service for The Session Initiation Protocol (SIP)", C. Jennings, J. Peterson, July 2005, draft-ietf-sipping-certs-02
    • Abstract: This draft defines a Credential Service that allows SIP User Agents to use a SIP package to discover the certificates of other users. This mechanism allows user agents that want to contact a given Address-of-Record (AOR) to retrieve that AOR's certificate by subscribing to the Credential Service. The Credential Service also allows users to store and retrieve their own certificates and private keys.
  • "NAT Classification Test Results", C. Jennings, July 2005, draft-jennings-behave-test-results-01
    • Abstract: IETF has several groups that are considering the impact of NATs on various protocols. Having a classification of the types of NATs that are being developed and deployed is useful in gauging the impact of various solutions. This draft records the results of classifying NATs. This draft is not complete and has only a few test results but it is worth discussing all the testing we wish to do before all the test results are collected. The test results here are very old and work is being done to update them with more current information. This work is being discussed on the ietf-behave@list.sipfoundry.org mailing list
  • "vCard Extensions for Instant Messaging (IM)", C. Jennings, July 2005, draft-jennings-impp-vcard-05
    • Abstract: This document describes an extension to vCard to support Instant Messaging (IM) and Presence Protocol (PP) applications. IM and PP are becoming increasingly common ways of communicating, and users want to save this contact information in their address books. This draft allows a URI that is associated with IM or PP to be specified inside of a vCard.
  • "Using DTLS as a Transport for SIP", C. Jennings, N. Modadugu, July 2005, draft-jennings-sip-dtls-01
    • Abstract: This draft specifies how to use Datagram Transport Layer Security (DTLS) as a transport for SIP. DTLS is a new protocol for providing TLS security over a datagram protocol. This draft is being discussed on the sip@ietf.org mailing list.
  • "Computational Puzzles for SPAM Reduction in SIP", C. Jennings, July 2005, draft-jennings-sip-hashcash-02
    • Abstract: One of the techniques used in SPAM prevention and various solutions for denial of service attacks is to force the SIP client requesting a service to perform a calculation that limits the rate and increases the cost of the request. This draft defines a way to allow a UAS to ask the UAC to compute a computationally expensive hash based function and present the result to the UAS. Although the computation is expensive for the UAC to compute, it is cheap for the UAS to verify. The solution also allows for proxies to compute and check the puzzle on behalf of the UAC or UAS.
  • "Example call flows using SIP security mechanisms", C. Jennings, K. Ono, July 2005, draft-jennings-sip-sec-flows-03
    • Abstract: This document shows call flows demonstrating the use of SIPS, TLS, and S/MIME in SIP. This draft provides information that helps implementers build interoperable SIP software. It is purely informational. To help facilitate interoperability testing, it includes certificates used in the example call flows and a CA certificate to create certificates for testing. This work is being discussed on the sip@ietf.org mailing list.
  • "Conventions for Voicemail URIs in SIP", C. Jennings, July 2005, draft-jennings-sip-voicemail-uri-04
    • Abstract: The SIP protocol is often used to initiate connections to voicemail or unified messaging systems. This specification describes a convention for forming SIP Service URIs that request particular services from unified messaging systems.
  • "Instance Identifiers for SIP User Agents", C. Jennings, July 2005, draft-jennings-sipping-instance-id-01.txt
    • Abstract: There are circumstances in SIP-based communications systems in which it is useful to have a long-term, stable identifier for a particular user agent. This specification outlines requirements and discusses existing standards that can be used to satisfy this need.
  • "SIP Offer/Answer with Multipart Alternative", C. Jennings, D. Wing, July 2005, draft-jennings-sipping-multipart-01
    • Abstract: SIP needs a mechanism for general backwards compatibility for moving from SDP to SDPng or moving from non end-to-end encrypted SDP to end-to-end encrypted SDP. This document specifies how a SIP offer uses multipart/alternative, and how an answer indicates which part was selected.
  • "Payment for Services in Session Initiation Protocol (SIP)", C. Jennings, G. Jun, J. Fischl, July 2005, draft-jennings-sipping-pay-02
    • Abstract: Communication systems require that a person receiving a call be able able to charge the caller when they are from different administrative domains. This is necessary for making fair exchanges of service between two different communicating parties and is a major strategy for reducing the viability of SPAM. This draft proposes an approach for doing this in SIP. The approach relies on a third party to act as a payment service provider and is optimized for very simple, low value transactions. It does not provide the full range of services that are desirable in typical online trading systems. This draft is being discussed on the sipping@ietf.org mailing list. There is currently work to substantially change this draft to use SAML.
  • "Conference State Change Protocol (CSCP)", C. Jennings, A. B. Roach, July 2005, draft-jennings-xcon-cscp-01
    • Abstract: Conference State Control Protocol (CSCP) is a means to modify the state in a conference service. It extends the Binary Floor Control Protocol and adds commands to get, set, add, and delete fields in the conference state.
  • "Media Conference Server Control for XCON", C. Jennings, B. Rosen, July 2005, draft-jennings-xcon-media-control-03
    • Abstract: Conference servers have many controls that change how the media is combined for the various conference participants. It is necessary to describe these controls to the clients connected to a centralized conference, so that the clients can render a user interface and allow the user to manipulate them. This work is being discussed on the xcon@ietf.org mailing list. This draft has not changed since the 02 version.
  • "SIP Conventions for UAs with Outbound Only Connections",C. Jennings, A. Hawrylyshen, 19-Feb-05, draft-jennings-sipping-outbound-01
  • "The Session Initiation Protocol (SIP) and Spam", J. Rosenberg, C. Jennings, J. Peterson, 13-Feb-05, draft-ietf-sipping-spam-00
  • "Guidelines for implementors using connection-oriented transports in the Session Initiation Protocol (SIP)", C. Boulton, V. Gurbani, R. Jain, C. Jennings, 14-Feb-05, draft-gurbani-sipping-connection-guidelines-01
  • "Representing trunk groups in tel/sip URIs", Vijay Gurbani, 25-Oct-04, draft-ietf-iptel-trunk-group-02
  • "NAT Classification Results using STUN", Cullen Jennings, 26-Oct-04, draft-jennings-midcom-stun-results-02.txt
  • "The Session Initiation Protocol (SIP) and Spam", Jonathan Rosenberg, Cullen Jennings, 28-Oct-04, draft-rosenberg-sipping-spam-01.txt
  • "Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)", Jon Peterson, 29-Sep-04, draft-ietf-sip-identity-03.txt
  • "An Extension to the Session Initiation Protocol for Request History Information", Mary Barnes, 18-Jan-05, draft-ietf-sip-history-info-06.txt
  • "Recommendations for using MIME body parts in SIP", Cullen Jennings, 20-Jul-04, draft-jennings-sip-mime-02.txt
  • "Media Mixer Control for XCON", Cullen Jennings, 20-Jul-04, draft-jennings-xcon-media-control-01.txt
  • "Guidelines for implementors using connection-oriented transports in the Session Initiation Protocol (SIP)", Vijay Gurbani, 15-Jul-04, draft-gurbani-sipping-connection-guidelines-00.txt
  • "Representing trunk groups in sip/tel Uniform Resource Identifiers (URIs)", V. Gurbani, C. Jennings, J. Peterson  01-NOV-02, draft-ietf-iptel-trunk-group-00.txt 
  • "Requirements for SIP User Agent Profile Delivery Framework", D. Petrie, C. Jennings, 25-JUN-02, draft-petrie-sipping-ua-prof-framewk-reqs-00.txt
  • "An Extension to the Session Initiation Protocol for Request History Information", M. Barnes, M. Watson, C. Jennings, 29-OCT-02, draft-barnes-sipping-history-info-00.txt 
  • "SIP Support for Application Initiation", C. Jennings, 31-OCT-02, draft-jennings-sip-app-info-00.txt 
  • "SIP Generic Request History Capability – Requirements", M. Barnes, C. Jennings, J. Peterson 29-AUG-02, draft-ietf-sipping-req-history-00.txt
  • "Telephony Tones Using MIDI in SIP", D. Bryan, C. Jennings, October 8, 2003, draft-bryan-sipping-midi-00
  • "SIMPLE Session and Relay IM Protocol Requirements", R. Mahy, C. Jennings, O. Levin, A. Houri, M. Barnes, February 9, 2004, draft-mahy-simple-im-protocol-reqs-00
  • "SIMPLE Instant Messaging Sessions (SIMS)", C. Jennings, R. Mahy, J. Garg, February 9, 2004, draft-jennings-simple-sims-00
  • "Updating the Connected Party in SIP", C. Jennings, February 7, 2004, draft-jennings-sipping-connected-00
  • "Extensions to the Session Initiation Protocol (SIP) for Network Asserted Identity within Trusted Networks", C. Jennings, May 2002, draft-jennings-sipping-nai-00

Papers

  • C. Jennings. Robust Finger Tracking with Multiple Cameras. IEEE workshop on Recognition, Analysis and Tracking of Faces and Gestures in Real-Time Systems. ICCV’99 (Corfu, 26- 27 September 1999).
  • C. Jennings, D. Murray, J. Little. Cooperative Robot Localization with Vision-Based Map-ping. IEEE   Conference on Robotics and Automation (Detroit, 10-15 May 1999).
  • C. Jennings. Video Switch. Circuit Cellar INK, The Computer Applications Journal. Num-ber 105, April 1999.
  • C. Jennings, D. Murray, V. Tucakov, J. Little. Spinoza: Visually Guided Mobile Robot. Mobile Robot demonstration. IEEE conference on Computer Vision and Pattern Recognition (San Juan, Puerto Rico, 17-19 June 1997). 
  • D. Murray, C. Jennings. Stereo Vision Based Mapping and Navigation for Mobile Robots. IEEE International Conference on Robotics and Automation (Albuquerque, 20-25 April 1997).
  • V. Tucakov, M. Sahota, D. Murray, A. Mackworth, J. Little, S. Kingdon, C. Jennings, R. Barman. Spinoza: A Stereoscopic Visually Guided Mobile Robot. In Proceedings of 30th Hawaii International Conference on System Sciences (HICSS-30), 1997 Volume 5.
  • D. Molaro, J.R. Parker, C. Jennings. A Distributed Thinning Algorithm on a Workstation Network. In Parallel Programming and Applications, ed. P. Fritzon and L. Finmo, IOS Press, 1995.
  • D. Molaro, J.R. Parker, C. Jennings. A Distributed Thinning Algorithm on a Workstation Network. In Proc. ZEUS’95 Workshop on Parallel Programming and Computation (Linkop-ing, Sweden, 17-18 May 1995).
  • C. Jennings, J.R. Parker. Vision Knowledge Vectorization: Converting Raster Images into Vector Form. In Proceedings of 12th International Conference on Pattern Recognition (Jerusalem, 9-13 October 1994). 
  • J.R. Parker, C. Jennings, D. Molaro. A Force Based Thinning Strategy with Sub-Pixel Preci-sion. In Proceeding of Vision Interface 94 (Banff, AB, 18-20 May 1994).
  • J.R. Parker, C. Jennings, A.G. Salkauskas. Thresholding Using an Illumination Model. In Proceedings of ICDAR 93: International Conference on Document Analysis and Recogni-tion (Tsukuba Science City, Japan, 20-22 October 1993).
  • C. Jennings. Character Recognition Using the Hough Transform. Technical Report 93/51/22, University of Calgary, March 1993.
  • C. Jennings and N. Flanagan. Automatic GIS Data Capture and Conversion. In Proceedings of GIS Research - UK 1993 (Keele, England, 18-20 March 1993).
  • C. Jennings, J.R. Parker, and D. Molaro. Comparative Performances of HPC Systems for Signal Processing. In Proceedings of SS 93, High Performance Computing: New Horizons (Calgary, AB, 6-9 March 1993).
  • D. Molaro and C. Jennings. A Methodology for Writing Multiprocessor Programs on a Net-work of UNIX Workstations. In Proceedings of SS 93, High Performance Computing: New Horizons (Calgary, AB, 6-9 March 1993).
  • C. Jennings, J.R. Parker, D. Molaro. A Force-Based Thinning Strategy with Sub-Pixel Preci-sion. Technical Report 93/504/09, University of Calgary, February 1993.
  • D. Molaro, C. Jennings, J.R. Parker. Distributed Force-Based Thinning and a General Distri-bution Method. Technical Report 93/505/10, University of Calgary, February 1993.
  • J.R. Parker, C. Jennings. Defining the Digital Skeleton. In Proceedings of SPIE Vision Geometry, vol. 1832 (Boston, Mass., 15-16 Nov. 1992).
  • C. Jennings, N. Flanagan. Automatic GIS Data Capture and Conversion. In Innovations in GIS ed. M.F. Worboys.

Talks

2005

2004

  • CIPTUG 2004
  • Fall VON 2004
  • Burton Analyst Conference 2004
  • Telecom 04
  • Supper Comm 2004
  • Interworking 2004
  • RSA Conference 2004
  • Spring VON 2004