Sciweavers

54 search results - page 4 / 11
» Steganography of VoIP streams
Sort
View
ICC
2009
IEEE
136views Communications» more  ICC 2009»
13 years 3 months ago
Performance of VoIP with DCCP for Satellite Links
Abstract--We present experimental results for the performance of selected voice codecs using the Datagram Congestion Control Protocol (DCCP) with TCP-Friendly Rate Control (TFRC) c...
Golam Sarwar, Roksana Boreli, Emmanuel Lochin
VTC
2010
IEEE
207views Communications» more  VTC 2010»
13 years 4 months ago
The Design and Implementation of IEEE 802.21 and Its Application on Wireless VoIP
—Supporting a multimode mobile device to seamlessly switch its connections between various wireless access networks, such as WiMAX, Wi-Fi, and LTE, is an important research issue...
Tein-Yaw Chung, Yung-Mu Chen, Pu-Chen Mao, Chen-Ku...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 5 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
SIGMOD
2007
ACM
135views Database» more  SIGMOD 2007»
14 years 6 months ago
XTream: personal data streams
The real usability of data stream systems depends on the practical aspect of building applications on data streams. In this demo we show two possible applications on data streams,...
Michael Duller, Rokas Tamosevicius, Gustavo Alonso...
GLOBECOM
2006
IEEE
13 years 12 months ago
Voice Activity Detection for VoIP-An Information Theoretic Approach
— Voice enabled applications over the Internet are rapidly gaining popularity. Reducing the total bandwidth requirement can make a non-trivial difference for the subscribers havi...
R. Venkatesha Prasad, R. Muralishankar, S. Vijay, ...