Quality of protection analysis and performance modeling in IP multimedia subsystem
暂无分享,去创建一个
Kai Wang | Chuang Lin | Lei Lei | An'an Luo | Chanfang Liu
[1] Henric Johnson,et al. Toward Adjustable Lightweight Authentication for Network Access Control , 2005 .
[2] Samuel Kounev,et al. SimQPN - A tool and methodology for analyzing queueing Petri net models by means of simulation , 2006, Perform. Evaluation.
[3] Bei Zhu. Analysis of SIP in UMTS IP Multimedia Subsystem , 2003 .
[4] Samuel Kounev,et al. Performance Modeling and Evaluation of Distributed Component-Based Systems Using Queueing Petri Nets , 2006, IEEE Transactions on Software Engineering.
[5] Klara Nahrstedt,et al. Quality of protection for mobile multimedia applications , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[6] Admela Jukan,et al. A Cross-Layer Analysis of Session Setup Delay in IP Multimedia Subsystem (IMS) With EV-DO Wireless Transmission , 2007, IEEE Transactions on Multimedia.
[7] Vijay K. Gurbani,et al. Characterizing Session Initiation Protocol (SIP) Network Performance and Reliability , 2005, ISAS.
[8] Dirk Pesch,et al. Performance evaluation of SIP-based multimedia services in UMTS , 2005, Comput. Networks.
[9] Gonzalo Camarillo,et al. The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition , 2006 .
[10] Miikka Poikselkä,et al. The IMS: IP Multimedia Concepts and Services in the Mobile Domain , 2004 .
[11] Falko Bause,et al. Queueing Petri Nets-A formalism for the combined qualitative and quantitative analysis of systems , 1993, Proceedings of 5th International Workshop on Petri Nets and Performance Models.
[12] Günter Karjoth,et al. Access control with IBM Tivoli access manager , 2003, TSEC.
[13] Chunxiao Chigan,et al. Balancing security against performance in wireless ad hoc and sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[14] Robert J. Sparks,et al. The Session Initiation Protocol (SIP) Refer Method , 2003, RFC.
[15] Antonino Mazzeo,et al. Security design and evaluation in a VoIP secure infrastracture: a policy based approach , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[16] Akashi Satoh,et al. ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[17] Michael Devetsikiotis,et al. Modeling and optimization for the design of IMS networks , 2006, 39th Annual Simulation Symposium (ANSS'06).
[18] Admela Jukan,et al. On Signaling Efficiency for Call Setup in all-IP Wireless Networks , 2006, 2006 IEEE International Conference on Communications.
[19] Ramjee Prasad,et al. Optimization of SIP Session Setup Delay for VoIP in 3G Wireless Networks , 2006, IEEE Transactions on Mobile Computing.
[20] Gonzalo Camarillo,et al. The 3G IP Multimedia Subsystem : Merging the Internet and the Cellular Worlds , 2004 .
[21] Wenye Wang,et al. On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility , 2007, Mob. Networks Appl..
[22] Wei Liang,et al. A quantitative study of authentication and QoS in wireless IP networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..