Author of the publication

Third-Party Call Control in H.323 Networks - A Case Study.

, , , , , , and . ICN (2), volume 2094 of Lecture Notes in Computer Science, page 559-569. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Third-Party Call Control in H.323 Networks - A Case Study., , , , , , and . ICN (2), volume 2094 of Lecture Notes in Computer Science, page 559-569. Springer, (2001)A visual environment for the manipulation and integration of JAVA beans.. Bioinformatics, 14 (8): 739-748 (1998)Visualising Large Data Sets in Molecular Biology., , and . IDS, page 8. Springer, (1996)Compulsive technology use: Compulsive use of mobile applications., and . Computers in Human Behavior, (2018)Heart rate variability as a biomarker for sedation depth estimation in ICU patients., , , , , , , , and . EMBC, page 6397-6400. IEEE, (2016)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , and . Decis. Support Syst., (2016)Overloaded array processing with spatially reduced search joint detection., , , , and . IEEE Journal on Selected Areas in Communications, 19 (8): 1584-1593 (2001)Measurements and models for 38-GHz point-to-multipoint radiowave propagation., , , and . IEEE Journal on Selected Areas in Communications, 18 (3): 310-321 (2000)One Technique for the Discrete Analysis of Continuous Data.. ACM Pacific, page 156-162. (1975)The Impact of Media Richness, Suspicion, and Perceived Truth Bias on Deception Detection., and . HICSS, IEEE Computer Society, (2005)