Superphony: towards ubiquitous audio communication services

M. Lacoste1, P. Paniez1, A. Vareille1
1France Telecom Research and Development (FT Research and Development), Meylan, France

Tóm tắt

With the expansion of mobility in communication technologies, the increasing individual audio solicitations require a definition of priorities in audio information. A new concept called superphony is identified which improves communication abilities by reconstructing an audio sphere around each user and filtering audio information based on user and environment profiles. Requirements and elements for an architecture are presented. Guaranteeing real-time audio stream management based on profiles in mobile contexts, without compromising security, are key issues. Several potential applications are also discussed.

Từ khóa

#Communications technology #Mobile communication #Streaming media #Research and development #Information filtering #Information security #Resource management #Privacy #Vehicle dynamics #Web and internet services

Tài liệu tham khảo

goncalves, 1999, Voice over IP Networks 10.1109/MPC.1994.311830 varadharajan, 2000, Security Enhanced Mobile Agents, Proceedings of the 7thACM Conference on Computer and Communications Security kangas, 1999, Using Mobile Code for Service Integration in Ubiquitous Computing, Proceedings of the 5th Mobile Object Systems Workshop Programming Languages for Wide Area Networks jensen, 1999, Towards a Security Framework for Ad Hoc Applications, Proceedings of the 2nd Workshop on Distributed Object Security poirier, 2000, Une architecture pour la gestion de la qualité de service, 3ème Colloque International sur les NOuvelles TEchnologies de la REpartition 10.1109/2.868694 bobineau, 2000, PicoDBMS: Scaling Down Database Techniques for the Smartcard, Proc 26th Very Large Databases Conf pyssysalo, 1997, Real-Time Distributed Mobile Virtual Reality, Proc Int Workshop Mechatronical Computer Systems for Perception and Action adams, 2000, Panel: Whick PKI (Public Key Infras-tructure) is the Right One?, Proceedings of the 7th ACM conference on computer and communications security