Filters








23 Hits in 5.2 sec

HSM [chapter]

Annanda Thavymony Rath, Saraswathi Krithivasan, Sridhar Iyer
Multimedia Transcoding in Mobile and Wireless Networks  
Our work deals with enhancing performance of such networks through a Hybrid Streaming Mechanism (HSM).  ...  Further, a special class of multimedia applications that can tolerate start up delays is emerging.  ...  In these special class of multimedia applications, termed delay-tolerant applications [5] , clients request for the multimedia content specifying their requirements, (i) stream quality --a minimum rate  ... 
doi:10.4018/978-1-59904-984-7.ch011 fatcat:a7goweqj4vatll2erw4xkya4hq

HSM [chapter]

Annanda Thavymony Rath, Saraswathi Krithivasan, Sridhar Iyer
Multimedia Transcoding in Mobile and Wireless Networks  
Our work deals with enhancing performance of such networks through a Hybrid Streaming Mechanism (HSM).  ...  Further, a special class of multimedia applications that can tolerate start up delays is emerging.  ...  In these special class of multimedia applications, termed delay-tolerant applications [5] , clients request for the multimedia content specifying their requirements, (i) stream quality --a minimum rate  ... 
doi:10.4018/9781599049847.ch011 fatcat:vzph3oquhzd6llkqgi57uhf7fy

Performance Issues of Multimedia Applications [chapter]

Edmundo de Souza e Silva, Rosa M. M. Leão, Berthier Ribeiro-Neto, Sérgio Campos
2002 Lecture Notes in Computer Science  
The dissemination of the Internet technologies, increasing communication bandwidth and processing speeds, and the growth in demand for multimedia information gave rise to a variety of applications.  ...  Many of these applications demand the transmission of a continuous flow of data in real time.  ...  communication infrastructures for supporting a variety of multimedia applications.  ... 
doi:10.1007/3-540-45798-4_16 fatcat:kmpyw2iyubds5blqridsst2nmq

Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications

Elmustafa Sayed Ali, Mohammad Kamrul Hasan, Rosilah Hassan, Rashid A. Saeed, Mona Bakri Hassan, Shayla Islam, Nazmus Shaker Nafi, Savitri Bevinakoppa, Fawad Ahmed
2021 Security and Communication Networks  
This paper has conducted a critical review with analytical modeling for offloading mobile edge-computing decisions based on machine learning and Deep Reinforcement Learning (DRL) approaches for the Internet  ...  This paper aims to provide theoretical foundations for machine learning and the leading models and algorithms to resolve IoV applications' challenges.  ...  AI-based multimedia communication mechanism and IoV-based QoE optimization framework Improve multimedia streaming for end users QOE optimization for multimedia communication in IoV Sodhro  ... 
doi:10.1155/2021/8868355 fatcat:z3bnxkaydvd5jl36dcgvta6xa4

Securing Vehicle-to-Everything (V2X) Communication Platforms [article]

Monowar Hasan, Sibin Mohan, Takayuki Shimizu, Hongsheng Lu
2020 arXiv   pre-print
Despite benefits, V2X applications also face great challenges to security and privacy -- a very valid concern since breaches are not uncommon in automotive communication networks and applications.  ...  We also review main security/privacy issues, current standardization activities and existing defense mechanisms proposed within the V2X domain.  ...  For certain applications (e.g., over-the-air software/security credential updates, traffic and fuel management 3 , non-safety applications such as infotainment/multimedia streaming, etc.) communication  ... 
arXiv:2003.07191v1 fatcat:rtyelz5ro5agdf5szamdn4tsvm

Securing Vehicle-to-Everything (V2X) Communication Platforms

Monowar Hasan, Sibin Mohan, Takayuki Shimizu, Hongsheng Lu
2020 IEEE Transactions on Intelligent Vehicles  
Despite benefits, V2X applications also face great challenges to security and privacy-a very valid concern since breaches are not uncommon in automotive communication networks and applications.  ...  We also review main security/privacy issues, current standardization activities and existing defense mechanisms proposed within the V2X domain.  ...  For certain applications (e.g., over-the-air software/security credential updates, traffic and fuel management 3 , non-safety applications such as infotainment/multimedia streaming, etc.) communication  ... 
doi:10.1109/tiv.2020.2987430 fatcat:egw4hik2onfarc6nsjsng2r6ei

On security against pollution attacks in network coding enabled 5G networks

Vipindev Adat, Christos Tselios, Ilias Politis
2020 IEEE Access  
Network coding is arising once more as an enabler for satisfying the bandwidth requirements of future multimedia and resource hungry services.  ...  There has been a lot of research interest in this direction resulting in a few interesting approaches for secure network coding.  ...  The live streaming of high-quality videos that ask for high data rate and critical applications related to vehicular networks and other industrial applications which require ultra-low latency are just  ... 
doi:10.1109/access.2020.2975761 fatcat:vaz7xqagbrhatino4a3kuytaxu

Green Software [chapter]

Bob Steigerwald, Abhishek Agrawal
2012 Harnessing Green It  
We profusely thank Simon Liu, Editor-in-Chief of the IEEE Computer Society's IT Professional magazine, for writing a foreword to this book.  ...  Finally, we would like to thank our family members for their encouragement, support and cooperation which enabled us to make this venture a reality.  ...  A selection of domains, illustrated in Figure 7 .1, for which energy efficiency is a limiting force on operational ability (e.g. delay-tolerant networks), from which environmental concerns though the  ... 
doi:10.1002/9781118305393.ch3 fatcat:epohredblvhg5ei2chbw2fmhpy

From Heuristics-Based To Data-Driven Audio Melody Extraction

Juan J. Bosch, Emilia Gómez
2017 Zenodo  
The combination of supervised and unsupervised approaches leads to advancements on melody extraction and shows a promising path for future research and applications.  ...  The identification of the melody from a music recording is a relatively easy task for humans, but very challenging for computational systems.  ...  After the alignment, we increase from MMA h = 57.47% to a MMA h al = 76.07 % for a tolerance of 1 semitone.  ... 
doi:10.5281/zenodo.1120333 fatcat:4725nf75x5ds5glhoy3n2nfkea

CLOUD COMPUTING 2013 Editors CLOUD COMPUTING 2013 Committee CLOUD COMPUTING General Chair CLOUD COMPUTING 2013 Technical Program Committee

Valencia, Spain, Wolf Zimmermann, Yong Lee, Aida Omerovic, Norway Sintef, Yong Lee, Jorge Ejarque, Supercomputing Barcelona, Spain Center, Ibm Liu, Watson (+134 others)
2013 unpublished
a series of events intended to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms.  ...  We are grateful to the members of the CLOUD COMPUTING 2013 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  We thank Microsoft for providing computing resources and support for the research on the Windows Azure platform.  ... 
fatcat:s2gmo7ortjhxrbn5s2pz7cuyqy

Harnessing Green IT: Principles and Practices

San Murugesan
2008 IT Professional Magazine  
applications, Web engineering, e-business and IT for emerging markets.  ...  His work has focussed on the development, application and management of IT with expertise and interests spanning a range of areas, including green computing, cloud computing, Web 2.0 and 3.0, mobile computing  ...  We profusely thank Simon Liu, Editor-in-Chief of the IEEE Computer Society's IT Professional magazine, for writing a foreword to this book.  ... 
doi:10.1109/mitp.2008.10 fatcat:g5np2vq245drvflci2bc7bj4me

Robotic isotropy and optimal robot design of planar manipulators

M.V. Kircanski
Proceedings of the 1994 IEEE International Conference on Robotics and Automation  
Multimedia Networking: Multimedia networking applications, Streaming stored audio and video, RTP, Scheduling and policing mechanisms, Integrated services, RSVP 18.  ...  Multimedia Networking: Multimedia networking applications, Streaming stored audio and video, RTP, Scheduling and policing mechanisms, Integrated services, RSVP 7.  ...  Student group should select any one stream area like database programming, network programming, multimedia programming, system programming etc. and use the appropriate skill set to design and implement  ... 
doi:10.1109/robot.1994.351213 dblp:conf/icra/Kircanski94 fatcat:uawqnzropbgivcanzqihtimt2m

Cross-layer latency-aware and -predictable data communication [article]

Andreas Schmidt, Universität Des Saarlandes, Universität Des Saarlandes
2020
I want to thank wosch, not just for acting as a reviewer of this thesis, but also for providing a lot of insights, pragmatism and bits of wisdom during various meetings of the LARN project.  ...  Among these features is, for instance, the exposure of all link characteristics (latency, throughput, reliability) towards the application.  ...  Live-Multimedia Applications There are various domains in which the real-time streaming of multimedia content is required, e.g. for entertainment or education purposes, as well as for ensuring safety in  ... 
doi:10.22028/d291-30851 fatcat:lmu66yvbqvcorbgcacm7lktvsu

Flexible error handling for embedded real time systems

Andreas Heinig, Technische Universität Dortmund, Technische Universität Dortmund
2015
However, additional resources are required for their implementation.  ...  This is a serious problem in embedded systems development since embedded systems possess only a limited number of resources, like processing time, memory, and energy.  ...  Like for all software-based fault-tolerance mechanisms, this is a weak spot, since the microvisor cannot protect itself.  ... 
doi:10.17877/de290r-7319 fatcat:ncudlv3dsbbp3liqlw7he3cxni

Plugging in trust and privacy : three systems to improve widely used ecosystems [article]

Sebastian Rainer Gerling, Universität Des Saarlandes, Universität Des Saarlandes
2014
and X-pire 2.0 offer a digital expiration date for images in social networks to enforce post-publication privacy.  ...  This dissertation introduces three novel trust and privacy mechanisms that overcome the current situation by improving widely used ecosystems.  ...  But if the network latency is low, people will probably not tolerate such a delay.  ... 
doi:10.22028/d291-26590 fatcat:t6au7fg5zbf4zcqypcqok526jm
« Previous Showing results 1 — 15 out of 23 results