The source code for this package is located in src/gov/nist/sip/proxy. The proxy is a pure JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate. he proxy can act as presence server and be able to process NOTIFY and SUBSCRIBE requests. If this parameter is disabled, the proxy will simply forward those kind of requests following the appropriate routing decision.
标签: proxy The JAIN-SIP package
上传时间: 2015-11-30
上传用户:ippler8
First of all, the Applet-phone is a SIP User-Agent with audio and text messaging capabilities. But i s also embedded in an applet where you can use it as usual if your firewall allow you to use the UDP transport. If not, you can use TCP to carry your voice in a voice messaging fashion. Your voice is recorded and encoded locally then sent as a message, decoded and played back by your peer. Voice messaging allow you to go through any firewall, so that you can continue to chat and talk with your friends from an applet !
标签: Applet-phone capabilities User-Agent messaging
上传时间: 2014-01-11
上传用户:c12228
he source code for this package is located in src/ directory. The JAIN-SIP-SERVICES is a JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate.
标签: JAIN-SIP-SERVICES directory JAIN-SIP package
上传时间: 2013-12-30
上传用户:caiiicc
This a simple bootloader for AT91SAM7{S,X}{64,128,256} processors. It permits you to download new code to the device over USB. This bootrom is installed at address 0x00000000 in the ARM, which means that it is the first piece of code to execute after reset. At startup, it waits for a few seconds to see if the downloader is trying to connect. If not, then the bootloader gives up control and jumps to your program. If the downloader is trying to connect, then the bootloader receives the new program over USB and writes it into flash.
标签: bootloader processors download permits
上传时间: 2015-11-30
上传用户:shus521
带中文注释的linux 0.11源码 很好,推荐!!!Sourcecode of the Linux-011 with detailed chinese annotation,it s verygood and worth reading.
上传时间: 2013-12-14
上传用户:frank1234
Jitter is extremely important in systems using PLL-based clock drivers. The effects of jitter range from not having any effect on system operation to rendering the system completely non-functional. This application note provides the reader with a clear understanding of jitter in high-speed systems. It introduces the reader to various kinds of jitter in high-speed systems, their causes and their effects, and methods of reducing jitter. This application note will concentrate on jitter in PLL-based frequency synthesizers.
标签: extremely PLL-based important drivers
上传时间: 2014-11-25
上传用户:asddsd
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not less than d. A simple algorithm is proposed "rstly to generate all lower boundary points for d, and then the system reliability can be calculated in terms of such points. One computer example is shown to illustrate the solution procedure.
标签: capacities stochastic addresses network
上传时间: 2015-12-03
上传用户:xfbs821
This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not less than d. A simple algorithm is proposed "rstly to generate all lower boundary points for d, and then the system reliability can be calculated in terms of such points. One computer example is shown to illustrate the solution procedure.
标签: capacities stochastic addresses network
上传时间: 2013-12-25
上传用户:ggwz258
This paper addresses a stochastic-#ow network in which each arc or node has several capacities and may fail. Given the demand d, we try to evaluate the system reliability that the maximum #ow of the network is not less than d. A simple algorithm is proposed "rstly to generate all lower boundary points for d, and then the system reliability can be calculated in terms of such points. One computer example is shown to illustrate the solution procedure.
标签: capacities stochastic addresses network
上传时间: 2014-01-09
上传用户:二驱蚊器