In a peer-to-peer (P2P) overlay network, a large number and various types of peers are cooperating by exchanging multimedia contents. Here, multimedia streaming is a key technology to realize multimedia applications. ...
详细信息
In a peer-to-peer (P2P) overlay network, a large number and various types of peers are cooperating by exchanging multimedia contents. Here, multimedia streaming is a key technology to realize multimedia applications. A multimedia content is distributed to multiple peers and these peers named contents peers can support other leaf peers with the content. multimedia contents are required to be efficiently delivered to processes in a real-time manner. Some contents peer may not send packets at a required rate and a communication channel may not support enough quality of service (QoS). In this paper, we newly discuss a heterogeneous asynchronous multi-source streaming (HAMS) model where multiple contents peers in parallel transmit packets of a multimedia content to a requesting leaf peer to realize highly reliability and scalability.
The following topics are dealt with: ad-hoc networks; multicast and scheduling; traffic engineering; performance evaluation; network security; optical networks; transport layer; sensor networks; Web applications; secu...
The following topics are dealt with: ad-hoc networks; multicast and scheduling; traffic engineering; performance evaluation; network security; optical networks; transport layer; sensor networks; Web applications; security management; network survivability; industry track; QoS in heterogenous wireless networks; workshop on multimedia systems and networking
This paper describes a mobile service middleware (the 4G middleware) , it is used for faster and more efficient development and runtime support of adaptive multimedia services in upcoming 4G environments. An open and ...
详细信息
This paper describes a mobile service middleware (the 4G middleware) , it is used for faster and more efficient development and runtime support of adaptive multimedia services in upcoming 4G environments. An open and standard OSGi technology based the 4G middleware provides an interoperable infrastructure for efficiently building, provisioning, and managing mobile multimedia services. For next generation heterogeneous networks, adaptability will become a main feature of next generation multimedia services
The following topics are dealt with: power system management; power system control; information networking; process monitoring; process control; system identification; modelling; simulation; coding; modulation; evolut...
The following topics are dealt with: power system management; power system control; information networking; process monitoring; process control; system identification; modelling; simulation; coding; modulation; evolutionary computation; video-based security surveillance; image processing; signal processing; object recognition; object retrieval; control system design; computer networking; fuzzy systems; fuzzy applications; information hiding; information security; intelligent data analysis; artificial immune systems; linear matrix inequality; embedded computing; information sharing; multimedia data mining; text mining; pattern classification; pattern recognition; video processing; pervasive applications; fuzzy reasoning; neural networks; knowledge discovery
An upcoming real-time multimedia application requires diverse quality-of-service (QoS) requirements. Providing guaranteed QoS is essential to these applications. The current distributed routing algorithms are based on...
详细信息
An upcoming real-time multimedia application requires diverse quality-of-service (QoS) requirements. Providing guaranteed QoS is essential to these applications. The current distributed routing algorithms are based on either flooding or shortest path algorithms and both tend to have high message overhead. A novel unicast distributed QoS routing algorithm based on Fano’s decoding method is investigated. This is the first known attempt to enhance an error control technique using Fano’s decoding algorithm for the purpose of QoS routing in wireline networks and which require relatively small amounts of storage for their implementation. Simulation results illustrate the efficiency of the proposed algorithm with respect to message overhead and the success ratio. It is shown that the message overhead in the proposed algorithm is lower compared to flooding and distance vector based algorithms while maintaining a similar success ratio.
We are what we eat. Our everyday food choices affect our long-term and short-term health. In the traditional health care, professionals assess and weigh each individual's dietary intake using intensive labor at hi...
详细信息
ISBN:
(纸本)3540338942
We are what we eat. Our everyday food choices affect our long-term and short-term health. In the traditional health care, professionals assess and weigh each individual's dietary intake using intensive labor at high cost. In this paper, we design and implement a diet-aware dining table that can track what and how much we eat. To enable automated food tracking, the dining table is augmented with two layers of weighing and RFID sensor surfaces. We devise a weight-RFlD matching algorithm to detect and distinguish how people eat. To validate our diet-aware dining table, we have performed experiments, including live dining scenarios (afternoon tea and Chinese-style dinner), multiple dining participants, and concurrent activities chosen randomly. Our experimental results have shown encouraging recognition accuracy, around 80%. We believe monitoring the dietary behaviors of individuals potentially contribute to diet-aware healthcare.
Summary form only given. National Science Foundation (NSF) has a long-standing interest in protecting, enhancing and evaluating information security, privacy and confidentiality in information systems. The interest is...
详细信息
Summary form only given. National Science Foundation (NSF) has a long-standing interest in protecting, enhancing and evaluating information security, privacy and confidentiality in information systems. The interest is broad including new architectures, algorithms, data collection and evaluation methods. All these are in recognition of newly emerging environments and applications (e.g. pervasive computing, mobile, sensor and distributed databases, discovery and handling of future threats), newly emerging requirements and increasing public interest in this topic. This paper discusses NSF's past and current funding profile and future funding opportunities for secure information systems research
The following topics are dealt with: parallel processing; resource management; switch architectures; microarchitectures; data management; parallel molecular dynamics; scheduling; compilers and tools; ad hoc networks; ...
The following topics are dealt with: parallel processing; resource management; switch architectures; microarchitectures; data management; parallel molecular dynamics; scheduling; compilers and tools; ad hoc networks; performance analysis; peer to peer; resource discovery; optical networking; grid computing; message scheduling; group communication; cluster computing; multi-dimensional algorithms; and multimedia
暂无评论