Login / Signup

Enabling new services by exploiting presence and context information in IMS.

Jacco BrokBharat KumarErik MeeuwissenHarold J. Batteram
Published in: Bell Labs Tech. J. (2006)
Keyphrases