An Example of Using Presence and Availability in an Enterprise for Spontaneous , Multiparty , Multimedia Communications

نویسنده

  • Michael Long
چکیده

distributed, team-oriented work environment, it is critical that team members should be able to conduct multiparty, multimedia conferencing spontaneously. Spontaneous conferencing is analogous to ad-hoc, drop-in meetings and impromptu discussions in multi-person offices. The knowledge of the presence and availability of team members can be effectively used to facilitate spontaneous conferencing. In this paper, we present SEC, a communications system designed to support spontaneous, ad-hoc conferencing in an enterprise. SEC makes an extensive and innovative use of the Session Initiation Protocol (SIP) for presence and availability management, conference control, and text messaging. We also discuss in detail the design of SEC and report on the initial usage experience with SEC services.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantization of electromagnetic fields in the presence of a spherical semiconductor quantum dot and spontaneous decay of an excited atom doped in this nanostructure

In this paper we consider electromagnetic field quantization in the presence of a dispersive and absorbing semiconductor quantum dot. By using macroscopic approach and Green's function method, quantization of electromagnetic field is investigated. Interaction of a two-level atom , which is doped in a semiconductor quantum dot, with the quantized field is considered and its spontaneous emission ...

متن کامل

An Example of Data Dependence Result for The Class of Almost Contraction Mappings

In the present paper, we show that $S^*$ iteration method can be used to approximate fixed point of almost contraction mappings. Furthermore, we prove that this iteration method is equivalent to CR iteration method  and it produces a slow convergence rate compared to the CR iteration method for the class of almost contraction mappings. We also present table and graphic to support this result. F...

متن کامل

Enabling Secure Ad hoc Communications in the Enterprise∗

Ad hoc communication applications, such as computer-facilitated collaboration, have become possible with the rapid advancements in portable computing and ad hoc wireless networking. Ad hoc communication solutions require a balance between private communications and access to corporate networked services in order to succeed. In this paper, we discuss and offer some approaches in integrating ad h...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

Linearization of M-LINC Systems Using GMP and Particle Swarm Optimization for Wireless Communications

In this paper, an efficient algorithm for the efficiency maximization of the multilevel linear amplification using nonlinear components (M-LINC) systems is proposed regarding the linearity of the system. In this algorithm, we use the generalized memory polynomial (GMP) to provide a behavioral model for the power amplifier (PA) and calculate the power spectral density (PSD) of the output signal ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001