Minute of individual meeting of the first term in 96
Date | Theme | speaker | Meeting Minute | Presentation |
---|---|---|---|---|
2007/09/27 | P2P VoIP | �i���u | Download | ![]() |
2007/10/04 | AES | �����h | Download | ![]() |
2007/10/11 | libpcap and Analyze | ���f�{ | Download | ![]() |
2007/10/18 | Countermeasures of Spam over Internet Telephony in SIP.edu Campuses with MySQL and LDAP Support | �d�u�| | Download | ![]() |
2007/11/01 | ��IMS in a Bottle��: Initial Experiences from an OpenSER-based Prototype Implementation of the 3GPP IP Multimedia Subsystem {ICMB��06 IEEE, Joachim Fabini, ...} |
�L�夯 | Download | ![]() |
2007/11/15 | G.711 & Speex ²�� | �C�ƹ� | Download | ![]() |
2007/11/22 | STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) | �i��� | Download | ![]() |
2007/11/29 | SIPp | ���F�M | Download | ![]() |
2007/12/06 | Information Hiding in Real-time VoIP Streams | �����h | Download | ![]() |
2007/12/13 | On P2P collaboration infrastructures | �i���u | Download | ![]() |
2007/12/20 | RTP and the Datagram Congestion Control Protocol (DCCP) | ���Ÿ� | Download | ![]() |
2008/01/03 | Bandwidth Test Controller | ���f�{ & ���F�M | Download | ![]() |
2008/01/17 | Access Authentication to IMS Systems in Next Generation Networks {ICN'07 IEEE, Silke Holtmanns, Son Phan-Anh} |
�L�夯 | Download | ![]() |
2008/01/23 | Message Session Relay Protocol Adaptation for Interactive Connectivity Establishment (ICE) | �i��� | Download | ![]() |
Minute of individual meeting of the second term in 96
Date | Theme | speaker | Meeting Minute | Presentation |
---|---|---|---|---|
2008/03/27 | Trip Report of WOAA meeting in Manila | ���F�M & �L�夯 | - | - |
2008/04/03 | AGC, Information Hiding, IPSec | Imron, Nattawat, Anuwat | Download |
Imron:![]() Nattawat: ![]() Anuwat: ![]() |
2008/04/10 | Formatted Text Document Data Hiding Robust to Printing, Copying and Scanning | �C�ƹ� | Download | ![]() |
2008/04/24 | Introduction to Hatyai & Phuket campus | Imron, Nattawat, Anuwat | Download | ![]() |
2008/05/01 | Interactive Connectivity Establishment : ICE | �i��� | Download | ![]() |
2008/05/08 | E-Model | ���F�M | Download | ![]() |
2008/05/15 | Monitoring Architecture for Lawful Interception in VoIP Networks | ���f�{ | Download | ![]() |
2008/05/22 | Design and Architecture of a Portable User Agent in SIP Collaboration Systems | �i���u | Download | ![]() |
2008/05/26 | This is the rehearsal of Po-Chou's presentation in the coming SDLT 2008 Conference in NCKU | ���f�{ | Download | ![]() |
2008/06/05 | Porting VoIP Applications to DCCP | ���Ÿ� | Download | ![]() |
2008/06/12 | Blocking Unsolicited Voice Calls Using Decoys for the IMS {ICC'07 IEEE International Conference} |
�L�夯 | Download | ![]() |
2008/07/17 | Meeting & Traveling in Greece | �i��� | - | - |
2008/07/31 | Lexical Steganography Through Adaptive Modulation of the Word Choice Hash | �C�ƹ� | Download | ![]() |
2008/08/07 | Trajectory Sampling for Direct Traffic Observation | ���F�M | Download | ![]() |
2008/08/14 | Performance Evaluations of DCCP for Bursty Traffic in Real-time Applications | ���Ÿ� | Download | ![]() |
2008/08/21 | The Use of SCTP Failover Mechanism for Efficient Network Handover on Mobile IPv6 | ���N�@ | Download | ![]() |
2008/08/28 | On the Performance and Analysis of DNS Security Extensions | ���y | Download | ![]() |