Sciweavers

54 search results - page 5 / 11
» Steganography of VoIP streams
Sort
View
JCIT
2010
197views more  JCIT 2010»
13 years 2 months ago
Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies to delivery of voice communications over IP networks such as the Internet or other ...
Alireza Dehestani, Pedram Hajipour
MOBICOM
2004
ACM
14 years 29 days ago
The changing usage of a mature campus-wide wireless network
Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As “Wi-Fi” technology becomes ubiquitous, it is increasingly important to und...
Tristan Henderson, David Kotz, Ilya Abyzov
NOSSDAV
2001
Springer
13 years 12 months ago
Towards junking the PBX: deploying IP telephony
We describe the architecture and implementation of our Internet telephony test-bed intended to replace the departmental PBX (telephone switch). It interworks with the traditional ...
Wenyu Jiang, Jonathan Lennox, Henning Schulzrinne,...
BROADCOM
2008
IEEE
13 years 9 months ago
Tree Based Flooding Protocol for Multi-hop Wireless Networks
In this paper we propose and analyze an efficient flooding technique for static multi-hop wireless networks. The protocol builds up a routing tree that connects all network nodes....
Raphael Frank, Thomas Scherer, Thomas Engel
CONEXT
2007
ACM
13 years 9 months ago
Promoting fluidity in the flow of packets of 802.11 wireless mesh networks
Wireless Mesh Networks (WMNs) are based on packet forwarding and therefore require efficient multi-hop protocols for their deployment. Toward this objective, we study the flow o...
Adel Aziz, Roger Karrer, Patrick Thiran