scispace - formally typeset
Search or ask a question
Topic

IP Multimedia Subsystem

About: IP Multimedia Subsystem is a research topic. Over the lifetime, 4398 publications have been published within this topic receiving 43698 citations.


Papers
More filters
Patent
17 Jun 2009
TL;DR: In this article, the authors present a method for registering a terminal with an application server being a member of a pool of available application servers in an IP Multimedia Subsystem, interconnected through a network, for providing services to the terminal.
Abstract: Method for registering a terminal with an application server being a member of a pool of available application servers in an IP Multimedia Subsystem, IMS, interconnected through a network, for providing services to the terminal, the method comprising: receiving a registration request from the terminal, selecting in accordance with a predefined set of rules comprising at least two rules, an application server for servicing a requested service to the terminal; and registering the terminal with the selected application server.

20 citations

Book ChapterDOI
23 Nov 2011

20 citations

Patent
06 Jun 2013
TL;DR: In this article, the system identifies mobile devices that have an ongoing connection (e.g. IP multimedia subsystem (IMS) session) with the identified access points, in part by maintaining and accessing a look-up table containing location information for the access point and connected mobile devices.
Abstract: A wireless emergency alert system (also known as a wireless emergency alert system, or “WEA,” and formerly known as a commercial mobile alert system, or “CMAS”) receives a geotargeted federal alert that is to be delivered to mobile devices within a defined geographic region. A database of locations of access points is utilized by the system to identify those access points that are likely present in the defined region. The system identifies mobile devices that have an ongoing connection (e.g. IP multimedia subsystem (IMS) session) with the identified access points, in part by maintaining and accessing a look-up table containing location information for the access point and connected mobile devices. In addition, the system tracks mobile devices that no longer have an ongoing session and deregisters the appropriate mobile devices in the look-up table. For mobile devices that have an ongoing session, the system delivers the received alert to the mobile devices in the targeted region via the identified access points.

20 citations

Proceedings ArticleDOI
02 Jul 2018
TL;DR: This work introduces IFTM as a framework for unsupervised anomaly detection in a distributed environment based on real-time monitoring data using an automatic identity function and threshold learning to distinguish between normal and abnormal system behaviors.
Abstract: Telecommunication system providers move their IP multimedia subsystems to virtualized services in the cloud. For such systems, dedicated hardware solutions provided a reliability of 99.999% in the past. Although virtualization offers more cost efficient usage of such services, it comes with higher complexity for providing reliable running software components due to the fragile computation stack. In order to hide the impact of such problematic behaviors, automatic mechanisms may help to detect degraded state anomalies in order to execute remediation actions. This work introduces IFTM as a framework for unsupervised anomaly detection in a distributed environment based on real-time monitoring data. The proposed approach consists of two key concepts using an automatic identity function and threshold learning to distinguish between normal and abnormal system behaviors. The evaluation is performed on a testbed running an open source implementation of the IP multimedia subsystem (Clearwater) executed on a replicated Openstack cloud environment. Results show the applicability of IFTM with high detection rates (98%) and low number of false alarms.

20 citations

Patent
07 Mar 2013
TL;DR: In this paper, the authors propose a system for extending and reusing an IP multimedia subsystem (IMS) to extend the trust relationship from a closed group of customers of wireless service providers to users of other ecosystems (e.g., Gmail, Facebook, or Yahoo!) for IMS services.
Abstract: Systems and methods for extending and re-using an IP multimedia subsystem (IMS) to extend the trust relationship from a closed group of customers of wireless service providers to users of other ecosystems (e.g., Gmail, Facebook, or Yahoo!) for IMS services. Some embodiments include receiving a request from an initiating device to establish a service connection between the initiating device and an endpoint through an Internet Protocol Multimedia Subsystem (IMS) session. The request may include third-party domain credentials (e.g., maintained by a third-party domain) associated with an end-user. The third-party domain credentials can be extracted from the request. Communications with the third-party domain can be used to verify the third-party domain credentials. The IMS session can be established between the initiating device and the endpoint upon verification of the third-party domain credentials.

20 citations


Network Information
Related Topics (5)
Mobile computing
51.3K papers, 1M citations
90% related
Wireless ad hoc network
49K papers, 1.1M citations
89% related
Network packet
159.7K papers, 2.2M citations
89% related
Wireless network
122.5K papers, 2.1M citations
88% related
Server
79.5K papers, 1.4M citations
88% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20235
202219
202124
202050
201971
201881