View all summaries and proposals in a convenient tabular format:
| TDoc Number & Links | Title | Source | Comments |
|---|---|---|---|
| Brief report from SA#110 on SA4 topics | SA WG4 Chair |
You should sign in to be able to post reviews
Sign In
|
|
| Reply LS on the RAN simulation assumptions for ULBC | RAN1 |
You should sign in to be able to post reviews
|
|
| Reply LS on issues related to support of IMS voice over NB-IoT NTN connected to EPC | RAN1 |
You should sign in to be able to post reviews
|
|
| LS on traffic model for immersive communication | RAN WG1 |
Previous Reviews:
manager
2026-02-09 04:51:21
You should sign in to be able to post reviews
|
|
| Reply LS on issues related to support of IMS voice over NB-IoT NTN connected to EPC | RAN2 |
You should sign in to be able to post reviews
|
|
| Reply LS on the RAN simulation assumptions, bundling period and SPS for ULBC | RAN2 |
You should sign in to be able to post reviews
|
|
| Reply LS on MBS Communication Service Type | RAN3 |
You should sign in to be able to post reviews
|
|
| Response LS on the RAN simulation assumptions for ULBC | RAN4 |
You should sign in to be able to post reviews
|
|
| Reply LS on issues related to support of IMS voice over NB-IoT NTN connected to EPC | SA1 |
You should sign in to be able to post reviews
|
|
| Reply LS on external data channel content access requirements | SA1 |
Previous Reviews:
manager
2026-02-09 04:49:00
1) Technical Accuracy1.1 Mischaracterisation of the normative scope and ownership
1.2 Overstated regulatory conclusion (“expected to be subject to telecom regulation”)
1.3 Ambiguity between “IMS telephony services” and “standalone Data Channel”
1.4 Technology/content conflation (HTML/JavaScript)
2) Completeness2.1 Missing references to the exact question and original LS text
2.2 Missing normative/spec references beyond TS 26.114
2.3 No analysis of security, execution environment, and content handling
2.4 No clarification of what 3GPP can/should standardize
3) Impact Assessment (on specs and implementations)3.1 Potential downstream interpretation risk
3.2 Interworking and product implications not assessed
3.3 No assessment of backward compatibility / feature negotiation
4) Feasibility4.1 Practical implementability of “HTML/JavaScript content” in IMS context is unclear
4.2 Regulatory compliance cannot be “implemented” without technical hooks
5) Weaknesses in Argumentation / Methodology5.1 Lacks a clear separation between legal classification and technical standardization
5.2 No jurisdictional neutrality
5.3 Undefined terms and missing context
6) Suggestions for Improvement6.1 Tighten terminology and cite the correct specs
6.2 Rephrase to avoid legal determinations
6.3 Make the liaison actionable by identifying technical considerations (without giving legal advice)Add a short list of technical aspects that may be relevant for compliance and risk management, such as: 6.4 Clarify the “standalone Data Channel” scenario
6.5 Include the exact Question 6 text and the exact SA1 reply text in the contribution (or as an attachment)
6.6 Engage the right groups for a coordinated response
Bottom lineAs summarized, the liaison response is directionally cautious (“not within scope to determine regulations”) but undermined by imprecise spec referencing, undefined scenarios, and an over-strong statement implying regulatory classification. It should be rewritten to be jurisdiction-neutral, technically anchored (correct specs/definitions), and more actionable by highlighting relevant technical considerations without making legal assertions.
You should sign in to be able to post reviews
|
|
| Reply LS on the RAN simulation assumptions for ULBC | SA2 |
You should sign in to be able to post reviews
|
|
| LS on issues related to support of IMS voice over NB-IoT NTN connected to EPC | SA2 |
You should sign in to be able to post reviews
|
|
| LS on AI/ML for Media | SA2 |
Previous Reviews:
manager
2026-02-09 04:48:41
1) Technical Accuracy1.1 Ambiguity / potential mischaracterization of “IMS specifications”
1.2 “MF (Media Function)” terminology is underspecified
1.3 Reference to “TS 23.228 Annex AC” as baseline is questionable without context
1.4 “Not in scope of the IMS RTC study for Rel-20” needs evidence
2) Completeness2.1 Missing summary of SA4’s ask and technical problem statement
2.2 Missing use cases and functional decomposition
2.3 Missing references to relevant 3GPP AI/ML work
2.4 Missing assessment dimensions
3) Impact Assessment (on specs and implementations)3.1 Potential spec impact areas are not identifiedIf AI/ML “model handling” or “inference capability” were to be standardized in IMS context, the likely impacted areas include: None of these are mentioned, so SA4 cannot gauge the magnitude of the work or where to focus. 3.2 Risk of unintended “no” messageBy stating “not supported” and “not in scope,” the LS may be interpreted as a rejection rather than a request for clarification. That can prematurely shut down useful exploration, especially if SA4’s ask is modest (e.g., capability signaling only). 3.3 Implementation impact not discussedEven if no normative changes are made, vendors may implement proprietary AI/ML media processing in AS/MRF. Standardization could: The LS does not acknowledge this trade-off. 4) Feasibility (practical implementability)4.1 Feasibility depends on where inference runs—LS does not constrain it
The LS does not ask the key feasibility questions (latency budget, compute placement, model size, update frequency, fallback behavior). 4.2 Interoperability feasibility is not addressedIf “model handling” is in scope, interoperability becomes difficult unless 3GPP standardizes: The LS does not flag these challenges to SA4. 5) Weaknesses in argumentation / methodology5.1 Overly high-level and reactiveThe response is essentially “not supported; please clarify.” It lacks: 5.2 Single baseline reference is insufficientRelying only on “TS 23.228 Annex AC” is weak. A robust methodology would cite: 5.3 No explicit decision request or timelineThe LS does not say what SA2 needs to decide next (e.g., whether to open a study item, whether to treat as out-of-scope for Rel-20, whether to capture as Rel-21 candidate). Without a timeline, the exchange may stall. 6) Suggestions for improvement (constructive)6.1 Tighten terminology and references
6.2 Provide a structured clarification template to SA4Ask SA4 to answer in a table, for each proposed AI/ML capability: 6.3 Add a preliminary SA2 gap analysis (even if incomplete)Include 5–10 bullets mapping “what IMS already supports” vs “what would be new,” e.g.: This helps SA4 respond concretely and reduces iteration cycles. 6.4 Clarify scope positioning and next-step optionsInstead of only stating “not in scope,” propose options: 6.5 Explicitly call out cross-group dependenciesIf model handling is discussed, flag likely need for coordination with: 6.6 Improve the LS tone to avoid premature rejectionRephrase “not supported” to “not currently specified normatively” and “not in scope of current study” to “not covered by current Rel-20 RTC study objectives,” while leaving room for Rel-21 consideration if justified. Overall assessmentThe LS is technically plausible but too terse and underspecified to be effective. It risks confusion due to ambiguous terminology (“MF”), fragile referencing (“Annex AC”), and lack of a structured request for the information SA2 actually needs. Strengthening the clarification request with a template, adding minimal gap analysis, and clearly outlining feasible standardization options would materially improve the contribution’s quality and usefulness.
You should sign in to be able to post reviews
|
|
| Reply LS on issues related to support of IMS voice over NB-IoT NTN connected to EPC | SA3 |
You should sign in to be able to post reviews
|
|
| LS reply on LI requirements on IMS Data Channel | SA3 |
Previous Reviews:
manager
2026-02-09 04:48:27
1) Technical AccuracyScenario 1 (Roaming S8HR/N9HR): “LI implies these interfaces should not be confidentiality protected”
“VPLMN could access DC content copy … using DTLS 1.2 with NULL cipher”
“DTLS 1.3 is recommended from Rel-19 onwards”
“Security downgrade must be applied to all HPLMN UEs to avoid LI detectability”
“Conflicts with regulatory requirements (e.g., EU Cyber Resilience Act)”
2) CompletenessMissing normative references and clause-level groundingThe summary lacks: Missing analysis of alternative LI-compliant architecturesScenario 1 focuses on “NULL cipher / no confidentiality” as the implied solution and rejects it. What’s missing: Missing threat model and detectability analysisClaims about detectability and downgrade need: Scenario 2: insufficient technical detail
Scenario 3: acceptance of “no gaps” is weak
3) Impact AssessmentOn security posture and interoperability
On existing IMS/DC implementations
On LI specifications and handover interfaces
4) FeasibilityDTLS NULL cipher approach
“Apply downgrade to all HPLMN UEs”
Proxy-mode anchoring for LI (Scenario 2)
5) Weaknesses
6) Suggestions for ImprovementA) Add precise references and tighten wording
B) Provide an explicit options analysis for Scenario 1Include at least 3–4 candidate approaches with pros/cons: C) Clarify the threat model and “undetectability” requirement
D) Strengthen Scenario 2 with concrete call flows
E) Do not dismiss Scenario 3 without validation
F) Reframe regulatory discussion
Bottom lineThe document correctly flags that “weakening encryption to satisfy LI” is problematic, but it is not sufficiently rigorous or complete: it lacks normative references, overstates some claims (DTLS versioning, “interfaces should not be protected,” “must downgrade all UEs”), and does not provide a structured set of feasible alternatives. Strengthening the contribution requires clause-level grounding, explicit architectural options, and concrete call flows—especially for roaming and UE-initiated P2P cases.
You should sign in to be able to post reviews
|
|
| Reply LS on the status of the IMS Avatar Security Aspects | SA3 |
Previous Reviews:
manager
2026-02-09 04:48:17
1) Technical Accuracy1.1 Incorrect/unclear document identifiers and scope
1.2 Questionable claim: “fully specified” / “completion of Rel-19 security requirements”
1.3 Potential inconsistency: “normative Annex R” and CR status
1.4 Work item naming and traceability
2) Completeness2.1 Missing technical substance for SA2 consumptionAs a reply LS summary, it may be acceptable to be short, but it is missing key information SA2 needs to act: 2.2 Missing references and cross-spec alignment
2.3 Missing CR details
3) Impact Assessment3.1 Impact on specifications
3.2 Impact on implementations
3.3 Interoperability and deployment impact
4) Feasibility4.1 Practical implementability not demonstrated
4.2 Process feasibility: timing and approvals
5) Weaknesses5.1 Over-reliance on a single statement of completion
5.2 Lack of traceability and verifiability
5.3 No explicit request to SA2 beyond “take into account”
6) Suggestions for Improvement6.1 Fix identifiers and improve clarity
6.2 Provide a minimal technical summary of Annex RAdd 5–10 bullets summarizing what Annex R normatively specifies, for example: 6.3 Add traceability detailsInclude: 6.4 Be precise about “completion”Replace “fully specified” with scoped language, e.g.: 6.5 Provide explicit actions for SA2Depending on the intent, propose concrete actions such as: 6.6 Add an impact noteEven a short paragraph would help: Bottom lineAs a process/status reply, the document is directionally fine, but it is too thin and over-claims completion without scoping, traceability, or actionable guidance. Strengthening the LS with a concise technical summary, explicit mapping to SA2 questions, and clear references (CR title/clause/version/WI) would materially improve its usefulness and reduce the risk of misalignment between SA2 architecture and SA3 security specifications.
You should sign in to be able to post reviews
|
|
| Reply LS on external data channel content access | SA6 |
Previous Reviews:
manager
2026-02-09 04:47:56
1) Technical Accuracy1.1 Mischaracterization / ambiguity of CAPIF scope vs. IMS use case
1.2 “Third-party API providers in non-3GPP systems” phrasing is questionable
1.3 Security claim lacks specificity
2) Completeness2.1 The reply does not actually answer the “plan to define procedures and architecture” question
2.2 Missing references to IMS-specific enablers and relevant specs
2.3 Missing analysis of what “interworking” means in this contextThe reply does not clarify whether “interworking” refers to: 2.4 Missing discussion of trust domain and “public API” realities
3) Impact Assessment3.1 Minimal immediate spec impact (as written)
3.2 Risk of misdirection / scope creep
3.3 Potential implementation impact if CAPIF is later mandated
4) Feasibility4.1 Feasibility depends on architecture choice (not provided)
4.2 Practical coupling to IMS session is non-trivial
5) Weaknesses5.1 Non-committal and lacks actionable guidance
5.2 No gap analysis
5.3 Conflation risk: “external content access” vs “API exposure”
6) Suggestions (Constructive)6.1 Provide a clearer, direct answer on “plans”
6.2 Add a short gap analysis and scope statementInclude 3–5 bullets clarifying: 6.3 Clarify CAPIF applicability and limitationsIf CAPIF is mentioned, add precise positioning: 6.4 Add concrete references and alignment points
6.5 Propose next steps for SA coordination
Bottom lineThe reply is technically not wrong in pointing to CAPIF as a potentially relevant security/API framework, but it is too vague, does not answer the “plan” question, and lacks the necessary scope clarification and gap analysis to be useful. Adding explicit boundaries, references, and a concrete next-step proposal would significantly improve the contribution’s value and reduce the risk of misinterpretation.
You should sign in to be able to post reviews
|
|
| LS Response on external data channel content access requirements | TSG SA |
Previous Reviews:
manager
2026-02-09 04:47:41
1) Technical AccuracyAmbiguity / potential mischaracterization of “regulatory scope” (SA1 feedback)
Security scope (SA3 feedback) is technically plausible but incomplete in framing
SA4 “original design assumption” about exclusive hosting by DCSF/DC AS
SA6 CAPIF reference (TS 23.222) may be conceptually misapplied
2) CompletenessMissing normative references and pinpoint citations
Missing threat model and security requirements
Missing definition of “external resource mashups”
Missing analysis of UE behavior and execution environment
Missing backward compatibility / deployment impact analysis
3) Impact Assessment (on specs and implementations)Potentially significant impact if external access is constrained
Security and liability implications if left ambiguous
CAPIF-based approach could imply architectural changes
4) Feasibility (practical implementability)“Study in R20” is feasible but timing risk is high
Implementing secure external content access is feasible but requires explicit choicesFeasible solutions exist, but the LS does not indicate which direction is preferred: 5) Weaknesses (argumentation / methodology)
6) Suggestions (constructive improvements)A. Add precise spec references and problem statements
B. Provide interim guidance (even if R20 study is planned)
C. Establish a minimal security requirements set (coordinate SA3/SA4/SA2)
D. Clarify the execution environment and responsibilities
E. Be careful with CAPIF positioning
F. Include SA2 content or summarize it
G. Add an impact/backward compatibility section
If you can share the actual LS text (not only the summary), I can pinpoint exact wording issues and propose concrete replacement text aligned with 3GPP LS conventions and the relevant TS clauses.
You should sign in to be able to post reviews
|
|
| LS on completion of Study on AI/ML consistency alignment | TSG SA |
Previous Reviews:
manager
2026-02-09 06:04:14
manager
2026-02-09 04:47:27
1) Technical Accuracy1.1 Mischaracterization of 3GPP specs and numbering
1.2 Questionable claim: “Consistency alignment” achieved via vocabulary only
1.3 Potential inconsistency with existing AI/ML terminology work
2) Completeness2.1 Missing summary of what was standardizedThe LS does not list: For recipient WGs, “apply standardized terminology” is not actionable without at least a high-level list of the key terms and what changed. 2.2 Missing cross-spec impact analysisA completion LS should ideally include: None of that is present. 2.3 Missing references and traceability
3) Impact Assessment3.1 Potential normative ripple effectsEven “just terminology” in TS 21.905 can have broad consequences: The LS does not assess: 3.2 Implementation impact is likely low—but editorial burden may be high
The LS should acknowledge this and propose a pragmatic approach (e.g., apply on touch, not mass retrofit). 3.3 Risk of fragmentation if not enforced consistentlyRequesting all WGs to “apply” terminology without: 4) Feasibility4.1 Feasible to update vocabulary; less feasible to ensure cross-WG adoption
4.2 Closure statement may be prematureThe LS says “No further work is planned” and the study is complete. That is feasible administratively, but technically it may be premature if: A study completion often triggers a WI (normative work) if alignment requires more than definitions. 5) Weaknesses5.1 Overly administrative; lacks technical substanceThe LS reads like a status note. For a topic titled “AI/ML Consistency Alignment,” it lacks: 5.2 No evidence that terminology resolves the identified issuesThere is no argumentation showing: 5.3 Ambiguity about scope and intended usage
Without scope boundaries, recipients may interpret and apply inconsistently. 6) Suggestions for Improvement6.1 Correct specification references and improve precision
6.2 Add a concise technical summary of the deliverablesInclude in the LS body (not only attachments): 6.3 Provide an adoption guide for WGsAdd an “Implementation guidance” section: 6.4 Include impact/compatibility notes
6.5 Consider whether a follow-on normative WI is neededIf TR 22.850 identified inconsistencies beyond vocabulary (likely), propose: 6.6 Improve traceability
Bottom lineAs an LS, the document is directionally fine (informing completion and requesting adoption), but it contains a clear technical error (TS vs TR 21.905) and is insufficiently detailed to enable consistent cross-WG adoption. Without a term list, mapping guidance, and impact notes, the request to “apply standardized terminology” is not practically actionable and risks inconsistent uptake.
You should sign in to be able to post reviews
|
|
| LS on LI requirements on IMS Data Channel | SA3-LI |
Previous Reviews:
manager
2026-02-09 06:09:23
manager
2026-02-09 04:47:12
1) Technical Accuracy1.1 “Current encryption architecture prevents meeting TS 33.126 R6.4-160/170/180/190”
1.2 “Two acceptable approaches for LI: plaintext copy preferred; otherwise provide encryption parameters”
1.3 Roaming references: “S8HR/N9HR model”
1.4 “Interoperability case: one CSP uses IMS Data Channel, other does not; target on CSP without Data Channel; cannot intercept content”
1.5 “Direct communications between two users (when at least one is an LI target)”
Each has different LI implications. The LS does not define the scenario. 2) Completeness2.1 Missing normative references and scope definition
2.2 No problem decomposition by interception type
2.3 No call flows / keying flows / trust model
2.4 “Mid-session interception” not analyzed
2.5 No explicit requirements to SA2/SA4
3) Impact Assessment3.1 Potential cross-spec impact is high but not acknowledgedIf SA2/SA4 were to “enable LI” for an encrypted data channel, possible impacts include: The LS does not discuss these trade-offs. 3.2 Backward compatibility and deployment impact not addressed
3.3 Inter-operator implications
4) Feasibility4.1 Feasibility depends entirely on whether encryption is E2EE or hop-by-hop
4.2 Mid-session LI feasibility requires explicit re-key / duplication strategy
4.3 Roaming feasibility requires clear anchoring model
5) Weaknesses5.1 Assertions without substantiation
5.2 Conflation of regulatory requirement with technical mechanism
5.3 Unclear scope and terminology
5.4 No threat/security impact discussion
6) Suggestions for Improvement6.1 Add a structured gap analysis tableFor each cited TS 33.126 requirement (R6.4-160/170/180/190): 6.2 Provide at least two concrete call flowsInclude message/media/keying flows for: 6.3 Clarify the security model of IMS Data ChannelExplicitly state: Without this, SA2/SA4 cannot act. 6.4 Narrow and make the “Action Requested” implementableInstead of “develop a solution”, propose specific study items/questions, e.g.: 6.5 Address security/privacy trade-offs explicitlyAdd a section assessing: 6.6 Identify impacted specs and propose ownershipList candidate specs likely impacted and which group should lead: 6.7 Validate the roaming terminologyIf S8HR/N9HR is truly relevant, explain the mapping to IMS Data Channel routing and LI points. Otherwise, replace with correct IMS roaming models and references. Bottom lineThe LS raises a plausible concern (LI vs encrypted IMS Data Channel), but in its current form it is too assertion-based and underspecified to drive actionable work in SA2/SA4. Strengthening it with precise requirement mapping, concrete flows, and a clear security/termination model is necessary before meaningful specification impact or feasibility can be evaluated.
You should sign in to be able to post reviews
|
|
| Draft Reply LS on traffic model for immersive communication | Huawei Tech.(UK) Co.. Ltd |
Previous Reviews:
manager
2026-02-09 04:32:04
You should sign in to be able to post reviews
|
|
| LS on LI requirements | SA3-LI |
Previous Reviews:
manager
2026-02-09 06:05:45
manager
2026-02-09 04:46:35
1) Technical Accuracy1.1 Claim: “All currently defined LI requirements in TS 33.126 remain applicable for 6G”
1.2 Proposed normative text in TR 23.801-01 clause 4.2
1.3 Scope ambiguity: “6G systems”
2) Completeness2.1 Missing gap analysis / mappingThe LS asserts applicability but does not provide: Without this, the request is largely procedural (“please consider LI”) rather than technically actionable. 2.2 Missing references beyond TS 33.126LI in 3GPP is not only TS 33.126. Depending on the topic, other relevant specs often include: 2.3 Missing discussion of jurisdictional/legal variabilityThe LS mentions “different jurisdictions and legal frameworks” but provides no concrete mechanism for handling: 3) Impact Assessment3.1 On SA2 architecture work (TR 23.801-01 and other 6G studies)
3.2 On SA4/SA6 (media, codecs, application enablers)
3.3 On existing implementations
4) Feasibility4.1 Feasibility of the requested action (adding text)
4.2 Feasibility of “TS 33.126 applies to 6G”
5) Weaknesses5.1 Overly generic and non-testable requirement
5.2 No concrete technical issues identified
5.3 Potential procedural/specification-style issue
5.4 Single-spec anchoring
6) Suggestions for Improvement6.1 Rephrase the proposed TR text to be appropriate for a study itemReplace normative “shall” with informative study wording, e.g.: 6.2 Provide an initial LI gap/risk checklist for 6G architectureInclude (even as an annex or companion note) a short list of architectural areas that typically impact LI, for example: This makes the LS actionable and reduces ambiguity for SA2/SA4/SA6. 6.3 Clarify what “applicable” meansAdd a statement such as: 6.4 Expand references or explicitly scope themEither: 6.5 Define a concrete coordination mechanismInstead of “send LSs if needed”, propose: 6.6 Avoid “6G” terminology if not formally adoptedAlign with the official naming used in the target TRs/TSs (e.g., “Rel-20 system”, “next generation system”) to prevent editorial and procedural pushback. Bottom lineThe intent (early LI consideration) is reasonable, but the LS as summarized is too absolute, too generic, and procedurally fragile (normative “shall” in a TR). It would be significantly strengthened by (i) rewording to study-appropriate language, (ii) providing an initial LI-sensitive topic list and gap-analysis plan, and (iii) clarifying the meaning and limits of “TS 33.126 applicability” for a future 6G/Rel-20 architecture.
You should sign in to be able to post reviews
|
|
| Reply LS on traffic model for immersive communication | vivo Mobile Communication Co., |
Previous Reviews:
manager
2026-02-09 04:46:41
1) Technical Accuracy1.1 Packet size parameterization is inconsistent (bytes vs bits)
1.2 Inter-arrival model conflicts with “silent periods do not need to be modeled”
1.3 Quantization to multiples of M is underspecified and may distort the distribution
1.4 Parameter plausibility: λ=0.015 (per ms) implies ~66.7 ms mean IAT (before min/quantization)
1.5 “Jitter follows TR 38.838 clause 5.1.1.2” is likely misapplied/unclear
1.6 PDB and Packet Success Rate are stated without defining the reliability metric
1.7 Aggregation principle may be invalid depending on channel semantics
2) Completeness2.1 Missing definition of the use case and trace conditions
2.2 No goodness-of-fit or validation results
2.3 Missing correlation model details
2.4 Missing burst/active-silent modeling despite stating silence can be ignored
2.5 Uplink model reuse is too hand-wavy
2.6 Missing explicit reference to the “eXR model with Haptics”
3) Impact Assessment (on specs and implementations)3.1 Potential misalignment with existing XR traffic models in TR 38.838
3.2 Aggregation assumption can under/over-estimate scheduler stress
3.3 Reliability/PDB values could steer RAN conclusions incorrectly
4) Feasibility (practical implementability)4.1 Implementable but underspecified
4.2 Correlation option is not implementable as stated
4.3 Reusing TR 38.838 uplink model is feasible, but may be invalid
5) Weaknesses (argumentation and methodology)
6) Suggestions for Improvement6.1 Fix the formal model definitions (must-do)
6.2 Provide trace context and reproducibility hooks
6.3 Add goodness-of-fit and alternative models
6.4 Define “silence” handling properly
6.5 Make correlation actionable
6.6 Clarify QoS interpretation of PDB and success rate
6.7 Uplink model mapping justification
Bottom lineThe contribution is directionally useful as a liaison response, but the proposed downlink haptics model contains unit errors, distribution-definition inconsistencies, and insufficient specification detail to be safely adopted by RAN1 for comparative studies. Strengthening the statistical justification, clarifying silence/correlation handling, and making the model fully reproducible would materially improve its technical value and reduce the risk of divergent interpretations in RAN1 evaluations.
You should sign in to be able to post reviews
|
|
|
PDF
Summary
Proposals
Critical Review
|
Draft Reply LS on traffic model for immersive communication | Huawei Tech.(UK) Co.. Ltd |
You should sign in to be able to post reviews
|
| Draft Reply LS on traffic model for immersive communication | Huawei Tech.(UK) Co.. Ltd |
You should sign in to be able to post reviews
|
|
| Reply LS on traffic model for immersive communication | Huawei Tech.(UK) Co.. Ltd |
You should sign in to be able to post reviews
|
Total TDocs: 26 | PDFs: 25 | AI Summaries: 23 | AI Proposals: 23
Comments saved: 12 / 26