An Example of Using Presence and Availability in an Enterprise for Spontaneous , Multiparty , Multimedia Communications
نویسنده
چکیده
distributed, team-oriented work environment, it is critical that team members should be able to conduct multiparty, multimedia conferencing spontaneously. Spontaneous conferencing is analogous to ad-hoc, drop-in meetings and impromptu discussions in multi-person offices. The knowledge of the presence and availability of team members can be effectively used to facilitate spontaneous conferencing. In this paper, we present SEC, a communications system designed to support spontaneous, ad-hoc conferencing in an enterprise. SEC makes an extensive and innovative use of the Session Initiation Protocol (SIP) for presence and availability management, conference control, and text messaging. We also discuss in detail the design of SEC and report on the initial usage experience with SEC services.
منابع مشابه
Quantization of electromagnetic fields in the presence of a spherical semiconductor quantum dot and spontaneous decay of an excited atom doped in this nanostructure
In this paper we consider electromagnetic field quantization in the presence of a dispersive and absorbing semiconductor quantum dot. By using macroscopic approach and Green's function method, quantization of electromagnetic field is investigated. Interaction of a two-level atom , which is doped in a semiconductor quantum dot, with the quantized field is considered and its spontaneous emission ...
متن کاملAn Example of Data Dependence Result for The Class of Almost Contraction Mappings
In the present paper, we show that $S^*$ iteration method can be used to approximate fixed point of almost contraction mappings. Furthermore, we prove that this iteration method is equivalent to CR iteration method and it produces a slow convergence rate compared to the CR iteration method for the class of almost contraction mappings. We also present table and graphic to support this result. F...
متن کاملEnabling Secure Ad hoc Communications in the Enterprise∗
Ad hoc communication applications, such as computer-facilitated collaboration, have become possible with the rapid advancements in portable computing and ad hoc wireless networking. Ad hoc communication solutions require a balance between private communications and access to corporate networked services in order to succeed. In this paper, we discuss and offer some approaches in integrating ad h...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملLinearization of M-LINC Systems Using GMP and Particle Swarm Optimization for Wireless Communications
In this paper, an efficient algorithm for the efficiency maximization of the multilevel linear amplification using nonlinear components (M-LINC) systems is proposed regarding the linearity of the system. In this algorithm, we use the generalized memory polynomial (GMP) to provide a behavioral model for the power amplifier (PA) and calculate the power spectral density (PSD) of the output signal ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001