Integracija različitih oblika komunikacije u poslovanju primenom internet telefonije
Sažetak
Ključne reči
Reference
Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 94–104., Kopetz, H. (2011). Internet of things. In Real-time systems (pp. 307-323). Springer US., Vermesan, O. et al. (2009). Internet of Things—Strategic Research Roadmap. European Commission-Information Society and Media DG. Brussels., daCosta, F. (2013). It’s different out here. Rethinking the Internet of Things: A Scalable Approach to Connecting Everything, 1-21., Konstantin, S. (2017) Model infrastrukture e-obrazovanja baziran na Internetu inteligentnih uređaja, Doktorska disertacija, Beograd., Radenković, B., Despotović-Zrakić, M., Bogdanović, Z., Barać, D., & Labus, A. (2015). Elektronsko poslovanje.Beograd: FON., Bughin, J.,Michael Chui, and James Manyika, (2013), Ten IT-enabled business trends for the decade ahead, McKinsey Quarterly, Goode, B., "Voice Over Internet Protocol (VoIP)", Proceedings of the IEEE, 90(9) (2002) 1495-1517., Hersent, O., IP Telephony: Deploying VoIP Protocols and IMS Infrastructure, West Sussex, UK: Wiley, 2011., Singh, H.P., Singh, S., Singh, J., "Computer Modeling & Performance Analysis of VoIP under Different Strategic Conditions", Proc. of IEEE Int. Conf. On Computer Engineering and Applications (ICCEA), (2010) 611-615., Nagireddi, S., VoIP Voice and Fax Signal Processing, 1st ed. Wiley Publishing, 2008., Perkins, C., RTP: Audio and Video For The Internet, Addison Wesley, 2012., Qiao, Z., Venkatasubramanian, R.K., Sun, L., Ifeachor, E.C., "A new buffer algorithm for speech quality improvement in VoIP systems", Wirel. Pers. Commun., 45(2) (2008) 189–207., Mayorga, P., Besacier, L., Lamy, R., Serignat, J.-F., "Audio packet loss over IP and speech recognition", Proc. of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU), (2003) 607-612., Sakuray, F., Hoto, R.S.V., Mendes, L.S., "Analysis and estimation of playout delay in VoIP communications", Int. J. of Computer Science and Network Security, 8(3) (2008) 98–105.
Povratni linkovi
- Trenutno nema povratnih linkova