The rapid growth of wireless LAN-enabled devices over recent years has generated a successful framework for wireless data accessing. It seems viable to expand the framework as part of last mile solution for mobile use...
详细信息
The rapid growth of wireless LAN-enabled devices over recent years has generated a successful framework for wireless data accessing. It seems viable to expand the framework as part of last mile solution for mobile users to access data services. Therefore, in this paper, we further focus on Quality of Service (QoS) and timeliness issues for supporting advanced multimedia applications in such environments. A bridging model, named Q-Bridge, is proposed in the paper for layer-2 access points to exhibiting QoS and real-time packet scheduling capabilities in the last mile configuration. The model explicitly applies the imprecise computation technique. That is, each bridged packet can be logically divided into two portions: a mandatory portion and an optional portion. The mandatory portions must be scheduled to transmit by their deadlines while the optional portions can be chopped to meet their deadlines or QoS requirements. By taking advantage of this model and the scheduling algorithms we devised, wireless data services can benefit from QoS and timeliness guarantees provided by access points supporting Q-Bridge at the last mile.
Many indexing approaches for high-dimensional data points have evolved into very complex and hard to code algorithms. Sometimes this complexity is not matched by increase in performance. Motivated by these ideas, we t...
详细信息
ISBN:
(纸本)0769518958
Many indexing approaches for high-dimensional data points have evolved into very complex and hard to code algorithms. Sometimes this complexity is not matched by increase in performance. Motivated by these ideas, we take a step back and look at simpler approaches to indexing multimedia data. In this paper we propose a simple, (not simplistic) yet efficient indexing structure for high-dimensional data points of variable dimension, using dimension reduction. Our approach maps multidimensional points to a ID line by computing their Euclidean Norm and use a B+-Tree to store data points. We exploit B+-Tree efficient sequential search to develop simple, yet performant methods to implement point, range and nearest-neighbor queries. To evaluate our technique we conducted a set of experiments, using both synthetic and real data. We analyze creation, insertion and query times as a function of data set size and dimension. Results so far show that our simple scheme outperforms current approaches, such as the Pyramid Technique, the A-Tree and the SR-Tree, for many data distributions. Moreover our approach seems to scale better both with growing dimensionality and data set size, while exhibiting low insertion and search times.
While content-aware distribution policies getting more popular in cluster-based web systems, they make the dispatching node a bottleneck. To achieve scalable server performance, we present a completely distributed arc...
详细信息
ISBN:
(纸本)0780378407
While content-aware distribution policies getting more popular in cluster-based web systems, they make the dispatching node a bottleneck. To achieve scalable server performance, we present a completely distributed architecture in which all hosts participate in request dispatching. To cope with the architecture, we propose a distributed dispatching policy named DWARD. With DWARD, all the server nodes may participate in request dispatching on the basis of local access pattern. In addition, the DWARD policy inherits several desirable features of the centralized algorithms, including load balance, high locality and less forwarding overhead. Finally, a testbed is implemented on the basis of Linux kernel to benchmark various dispatching algorithms. The performance results show that DWARD can achieve favorable throughput compared with state-of-the-art dispatching policies.
Recently, advanced Web-based applications require integrated access to diverse types of multimedia data such as images, video clips, and audios. To help development of these applications, it is necessary to integrate ...
详细信息
Downloading a large file through a heavily congested link can be difficult and frustrating, especially with frequent software updates and multimediacontent. A common approach employed on the Internet is to utilize mi...
详细信息
Downloading a large file through a heavily congested link can be difficult and frustrating, especially with frequent software updates and multimediacontent. A common approach employed on the Internet is to utilize mirror sites. Luby et al proposed a new class of erasure codes for mirror site systems called Tornado codes. Tornado codes typically have much faster decoding times than Reed-Solomon (RS) codes. In this paper, we present an extensive study of the behavior of multiple mirror site systems. OPNET is employed to do a comparison study of system performance using RS and Tornado codes.
The proceedings contain 34 papers. The special focus in this conference is on Wireless multimediasystems, Communication Protocols for multimedia, Scheduling Issues and Quality of Service Architectures. The topics inc...
ISBN:
(纸本)3540205349
The proceedings contain 34 papers. The special focus in this conference is on Wireless multimediasystems, Communication Protocols for multimedia, Scheduling Issues and Quality of Service Architectures. The topics include: The impact of wireless device access on content delivery networks;adaptive access regulation for VBR video streams;packetization scheme for streaming high-quality audio over wireless links;preserving established communications in ipv6 multi-homed sites with MEX;observations on equation-based estimation of TCP-compatible rate for multi-rate multicast scenarios;smoothing the TCP rate by learning the delay versus window size dependency;KOM scengen the Swiss army knife for simulation and emulation experiments;the effect of per-input shapers on the delay bound in networks with aggregate scheduling;scheduling and quality differentiation in differentiated services;size-distortion optimized proxy caching for robust transmission of mpeg-4 video;design and performance evaluation of a price-based cache algorithm for mobile web services;admission control and resource reservation framework for the OMODIS QOS framework;performance evaluation of the preemptive bandwidth allocation protocol;impact of network topology on the performance of budget based network admission control methods;breaking the network transparency paradigm;quality differentiation with source shaping and forward error correction;enhancing the coexistence of unicast and multicast sessions in diffserv architecture;session sharing as middleware service for distributed multimedia applications and spatio-temporal QOS pattern analysis in large scale internet environment.
The proceedings contain 157 papers. The topics discussed include: irredundant address bus encoding techniques based on adaptive codebooks for low power;multi-parametric improvements for embedded systems using code-pla...
ISBN:
(纸本)0780376595
The proceedings contain 157 papers. The topics discussed include: irredundant address bus encoding techniques based on adaptive codebooks for low power;multi-parametric improvements for embedded systems using code-placement and address bus coding;memory access pattern analysis and stream cache design for multimedia applications;a statistical gate delay model for intra-chip and inter-chip variabilities;a fast and accurate method for interconnect current calculation;energy minimization of real-time tasks on variable voltage processors with transition energy overhead;register aware scheduling for distributed cache clustered architecture;data partitioning for maximal scratchpad usage;logic verification based on diagnosis techniques;algorithms for compacting error traces;typing abstractions and management in a component framework;approximate formulae approach for efficient inductance extraction;accurate prediction of the impact of on-chip inductance on interconnect delay using electrical and physical parameters;and a metric for analyzing effective on-chip inductive coupling.
We introduce here a new class of packet scheduling techniques for TDMA-based (pure or hybrid) cellular packet radio networks with full frequency reuse. These algorithms, which are suited for networks with both central...
详细信息
ISBN:
(纸本)0780381858
We introduce here a new class of packet scheduling techniques for TDMA-based (pure or hybrid) cellular packet radio networks with full frequency reuse. These algorithms, which are suited for networks with both centralized and distributed control, assign the available resources according to the SIR predicted at each slot of the frame. Partial prediction of the interference is made possible by the static pre-assignment in each cell of a maximum transmitted power level to each slot of the frame. This technique, also named power shaping, exploits a set of suitably reused power profiles to partially organize the intercell and intersector interference in the available slots. Unlike traditional channel state dependent scheduling techniques, which are not able to deal with quasi-stationary location-dependent radio channel conditions, the proposed method is able to provide channel resources with different levels of SIR inside the frame, even in stationary environments, and to assign them to the packets waiting for service. We show that these techniques are able to increase the capacity of systems with and without centralized resource management control, while maintaining the capability of providing acceptable quality of service to heterogeneous classes of users.
The proceedings contain 25 papers. The special focus in this conference is on Role-based access Control, Database Security, XML Security, Data Mining and Inference, multimedia System Security, Network Security, Public...
ISBN:
(纸本)9781475764130
The proceedings contain 25 papers. The special focus in this conference is on Role-based access Control, Database Security, XML Security, Data Mining and Inference, multimedia System Security, Network Security, Public Key Infrastructure, Formal Methods and Protocols, and Security and Privacy. The topics include: Shielding RBAC infrastructures from cyberterrorism;privilege administration for the role graph model;implementing RBAC policies;role delegation for a resource-based security model;implementing workflow systems;multiphase damage confinement system for databases;analyzing transaction logs for effective damage assessment;deductive database security;towards secure XML federations;distributed cooperative updates of XML documents;on security and privacy risks in association mining algorithms;mining malicious corruption of data with hidden Markov models;a study of inference problems in distributed databases;uniform indexing for geospatial data and authorizations;access control of SVG documents;on modeling computer networks for vulnerability analysis;on-line intrusion protection by detecting attacks with diversity;a technique to improve services in PKI;implementation and verification of programmable security;a process algebraic approach to security policies;anonymous and secure multicast subscription and privacy and civil liberties.
The following topics are dealt with: advanced information networking; wireless and mobile systems; QoS; flexible systems; distributed systems; multimedia applications; fault tolerant systems; network management; perfo...
详细信息
The following topics are dealt with: advanced information networking; wireless and mobile systems; QoS; flexible systems; distributed systems; multimedia applications; fault tolerant systems; network management; performance evaluation; multiple access; multimedia presentation and synchronization; network security; mobile computing; network analysis; multiplexing; modulation; coding; multi-agent systems; network protocols; Web applications; ad-hoc networks; performance evaluation; wireless network protocols; multimedia information systems; distributed algorithms; satellite systems; resource allocation; scheduling; ad-hoc network analysis; database models; spread spectrum and phase estimation; secure systems; agent-based systems; distributed and parallel applications; reliable systems; traffic control; bandwidth allocation; security control and detection systems; handoff algorithms; switching; routing; e-learning; and compression algorithms.
暂无评论