Minute of individual meeting of the first term in 97
Date | Theme | speaker | Meeting Minute | Presentation |
---|---|---|---|---|
2008/09/02 | Porting VoIP Applications to DCCP | ¤ý¹Å¸Î | Download | |
2008/09/11 | ·s¥Í°V½m | ¤ý¹Å¸Î¡BÃC¦Æ¹Å¡B½²¬FÀM¡BªL¤å¤¯ | Download | |
2008/10/02 2008/10/09 |
CVS | ªL¤å¤¯ |
Download | |
2008/10/16 | A Distributed Tool for VoIP Stress Testing | ½²¬FÀM | Download | 2008/10/23 | TortoiseCVS | ±i¹D»·¡B©ö±ÒºÖ | Download |
2008/10/30 | WinCVS | Wei-Jie Siao & Wen-Lin Wang | Download | |
2008/11/06 | Introduction to Internet Relay Chat(IRC) | ðÞ³Ày | Download | |
2008/11/13 | ´Á¤¤¦Ò¼È°±¤@¦¸ | |||
2008/11/20 | Confused Document Encrypting Scheme | ÃC¦Æ¹Å | Download | |
2008/11/27 | SIP Authentication | ¶À«H´I | Download | |
2008/12/04 2008/12/11 |
An Experimental Evaluation of Voice Quality over the Datagram Congestion Control Protocol | ¤ýßN´@ | Download Download |
|
2008/12/18 | RTPProxy | §õÀO¶® | Download | |
2008/12/25 | Effect of Packetization on VoIP Performance | ¼ï³¾± | Download | |
2009/01/08 | Monitoring Architecture for Lawful Interception in VoIP Networks | ¿à³¥ß | Download | |
2009/01/15 | ´Á¥½¦Ò¼È°±¤@¦¸ |
Minute of individual meeting of the second term in 97( Q ,P ,I )
Date | Theme | speaker | Meeting Minute | Presentation |
---|---|---|---|---|
2009/05/15 | ¶i«×³ø§i | ©ö±ÒºÖ | Download | |
2009/05/22 | ¶i«×³ø§i | ¿½±©ªN | Download | |
2009/05/26 | Influence of Codecs on Adaptive Jitter Buffer Algorithm | ¼ï³¾± | Download | |
2009/06/05 | Energy Consumption of Always-On Applications in WCDMA Networks | §õÀO¶® | Download | |
2009/06/12 | A Distributed Approach for VoIP Stress Testing | ½²¬FÀM | Download | |
¤ýßN´@ |
Date | Theme | speaker | Meeting Minute | Presentation |
---|---|---|---|---|
2009/05/04 | Information Hiding in Real-time VoIP Streams | ¿à³¥ß | Download | |
2009/05/11 | CDES¥[±Kºtºâªk¹ê§@¤Wªº§ï¶i | «À§¶¿Ä | Download | |
2009/05/18 | ©ó IP-over-DNS Tunnel ¤W°µ G.711 SIP Phone ³q¤Æ | ðÞ³Ày | Download | |
2009/05/25 | Hiding Digital Information Using a Novel System Scheme vs. A Confused Document Encrypting Scheme and its Implementation | ±i¹D»· | Download | |
2009/06/03 | SIP Authentication | ¶À«H´I | Download | |
2009/06/08 | Mediastreamer2 | ¿à³¥ß | Download | |
2009/06/15 | ´Á¥½§ë¼v¤ù²³ø | ±i¹D»·¡B«À§¶¿Ä | Download |
Date | Theme | speaker | Meeting Minute | Presentation |
---|---|---|---|---|
2009/05/06 | ¶i«×³ø§i | Download | ||
2009/05/14 | Secure RTP and Related Issues in Lawful Intercept | ªL¤å¤¯ | Download | |
2009/05/21 | Introduction to Expect | ³¯³ÀM | Download | |
2009/06/03 | ¶i«×³ø§i | ÄÁ´§¶¯¡B¤ý¤å§D | Download | |
2009/06/10 | ±MÃD¥Í¶i«×³ø§i¡®§ë¼v¤ù²³ø | ÄÁ´§¶¯¡B¤ý¤å§D | Download |