Filters








10 Hits in 2.8 sec

A Review on P2P Video Streaming [article]

Sabu M Thampi
2013 arXiv   pre-print
The main objective of this article is to provide an overview of P2P based Video-on-Demand and live streaming services.  ...  A broad discussion on various P2P streaming schemes and P2P streaming applications are the main focus of this chapter.  ...  In addition, in VoD services, the users may be interested in different parts of the movie, and may compete for system resources.  ... 
arXiv:1304.1235v1 fatcat:ozpgxm2v6jdvzd3pwjbv6hanmi

Network of Technology and Web-Based Digital Media Resources

Michelle Mi-Hee Choi, Sung Ryong Hong
2015 Indian Journal of Science and Technology  
The groups of 80 students were divided into the two groups of target and control based on the preliminary tests.  ...  The second is to develop digital models and construction based on multimedia approach. The third is to analyse the results of the survey performed by 80 local students in A City, Korea.  ...  The utility which can be seen on window is 'Quick Time Movie' . Figure 3 . 3 Learner's perception on the use of multimedia tools. Figure 4 . 4 The necessity of multimedia tools in class.  ... 
doi:10.17485/ijst/2015/v8is1/59334 fatcat:zdl3yl2xfrgifetcwypkhmilmq

Big videos on small networks - a hierarchical and distributed architecture for a video on demand distribution service

C.E. Coelho Freire Batista, T.L. Salmito, L.E. Cunha Leite, G.L. de Souza Filho, G.E. da Silveira
2005 1st International Conference on Multimedia Services Access Networks, 2005. MSAN '05.  
Multimedia, VoD, Distributed Systems, Video Stream I.  ...  This paper proposes a hierarchical and distributed architecture for a video on demand distribution service.  ...  The measurements were collected by one VoD client watching a movie connected to a server through a 100 megabit switched Ethernet in the following scenario: The client requests a video from the VoD service  ... 
doi:10.1109/msan.2005.1489934 dblp:conf/msan/BatistaSLFS15 fatcat:xnt5ov4curgq5bgp2vy42fdvzm

Vlogging

Wen Gao, Yonghong Tian, Tiejun Huang, Qiang Yang
2010 ACM Computing Surveys  
ACKNOWLEDGMENTS We wish to express our thanks to the anonymous reviewers who provided many helpful comments on the earlier version of this article.  ...  news, sports, and movie videos.  ...  The most popular containers for streaming video are AVI, ASF, QuickTime, RealMedia, DivX, and MP4.  ... 
doi:10.1145/1749603.1749606 fatcat:qeopjzg4j5bwparwtbmvwdesd4

Scene Change Detection using Block Processing Method ARTICLE INFO ABSTRACT

Dolley Shukla, Manisha Sharma, Chandra Mithlesh, Dolley Shukla
2015 The Journal of Applied Sciences Research The Journal of Applied Sciences Research   unpublished
Applications of scene change detection are video indexing, semantic features extraction, multimedia information systems, Video on demand (VOD), digital TV, online processing (networking) neural network  ...  Today's research topic on video is video summarization or abstraction, video classification, video annotation and content based video retrieval.  ...  In movie terminology one or more shots form a scene, which is usually defined to be a set of consecutive shots that form an entity that seems to be continuous in time, or is filmed in a single location  ... 
fatcat:dirbgzpk6fdjri3w3fr65z6h6e

Integration of Signage Information into the Web Environment [chapter]

Rashad Aouf, Steve Hansen
2004 Lecture Notes in Computer Science  
Simply, Web architecture is based on the classical client/server model. Web environments are heterogeneous, and portable. First, the Web was developed for textual publishing purposes.  ...  The speed of 171 kbit/s requires a single user at one channel talking without error protection.  ...  s)//the login frame protected int addAdmin(String s)//Add admin: Username and Password protected int deleteAdmin(String s)//Delete Admin: Username and Password protected int editAdmin(String s)//Edit  ... 
doi:10.1007/978-3-540-27817-7_158 fatcat:w6hhs4x6kzdpbet2uiigayocsq

Minutes of the Meeting at Washington, April 29 to May 1, 1948

Anonymous
1948 Physical Review  
In the latter case, the radiographs may be studied AMERICAN PHYSICAL SOCIETY individually or may be photographed on motion picture film for projection as a movie.  ...  Pure Rotational Spectrum of AsF*. B. P. DaILEy, K. Rusinow, R. G. SHULMAN, AND C. H.  ... 
doi:10.1103/physrev.74.1201 fatcat:ctglqfz2hbccbh4yoadkaeyrla

Easton Gazette, and Eastern Shore Intelligencer 02-1820

(:Unkn) Unknown
1820
One is hirin out servants, another selling off horses, ( lie can find any one to buy them) and a third sending furniture to auction.  ...  And be ladies too, (hard to manage on this »int) are still too fond of their ribbons & athcrs, to please me altogether.  ...  Taylor movi-d that the considera tion of the bill be postponed to this day week.witli the view of waiting the d.-ci sion of the Senate on the bill now befon them nn this subject.  ... 
doi:10.13016/m2ng4gs00 fatcat:wsys4wqqyrgwlefyz6k3glyxwe

Fifth International Workshop on In Vitro Toxicology. Schloss Elmau, West Germany, November 1988. Proceedings

Molecular toxicology  
Only one of the negative compounds produced any activity in the assay in terms of enhancing UV toxicity. Some of the compounds were shown to protect the cells from the toxic effects of UV exposure.  ...  The intracellular movements were quantitated by means of computer analysis with our software package PARTI-MOVI (Weiss et al., 1986, 1988).  ... 
pmid:3509687 fatcat:reoelqozfvbbbp7lw7hq2yqo6m

Classification and Analysis of Computer Network Traffic

Tomasz Bujlow, Tomasz Bujlow
2014 unpublished
On the other hand, L7-filter and NBAR provide results consistently on the application level, however, their accuracy is too low to consider them as tools for generating the ground-truth.  ...  This thesis is focused on topics connected with traffic classification and analysis, while the work on methods for QoS assessment is limited to defining the connections with the traffic classification  ...  The physical access is protected by placing the server in a safe room with attested locks, and a firewall can be used to protect the system from malicious connections.  ... 
fatcat:t5qtwjvzv5gtzins7uc3oocyqy