The following topics are dealt with: self-stabilizing systems; sensor networks and energy management; peer-to-peer services; distributed algorithms; multimedia streaming; secure data sharing; quality of service; Inter...
详细信息
The following topics are dealt with: self-stabilizing systems; sensor networks and energy management; peer-to-peer services; distributed algorithms; multimedia streaming; secure data sharing; quality of service; Internet protocols; middleware communication services; fault-tolerant systems; ubiquitous computing; network security; real-time systems; Web servers; formal methods; ad hoc network protocols; wide area distributed computing; mobile agents; and wireless access control.
The proceedings contain 107 papers. The special focus in this conference is on High-Speed Network Technologies, Enhanced Protocols in Internet, QOS in Internet and Mobile Internet. The topics include: A comparative an...
ISBN:
(纸本)3540408274
The proceedings contain 107 papers. The special focus in this conference is on High-Speed Network Technologies, Enhanced Protocols in Internet, QOS in Internet and Mobile Internet. The topics include: A comparative analysis of scheduling algorithms;design of load-adaptive queue management for internet congestion control;performance analysis of an IP lookup algorithm for high speed router systems;a high speed ATM/IP switch fabric using distributed scheduler;an approach to improve efficiency of WDM optical burst switching networks;performance analysis of degree four topologies for the optical core of IP-over-WDM networks;analysis of end-to-end recovery algorithms with preemptive priority in GMPLS networks;an efficient restoration scheme using protection domain for dynamic traffic demands in WDM networks;periodic communication support in multiple access networks exploiting token with timer;an adaptive contention period control in HFC networks;an extension of scalable global IP any casting for load balancing in the internet;energy-efficient communication protocols for wireless networks;router-assisted TCP-friendly traffic control for layered multicast;the stability problem of multicast trees in layered multicast;FUMRP protocol for reliable multicasting in wireless ad-hoc network environments;an MPLS broadcast mechanism and its extension for dense-mode multicast support;error recovery algorithm for multimedia stream in the tree-based multicast environments;shortest-path mailing service using active technology;robust audio streaming over lossy packet-switched networks;personal server model for real-space networking and CORBA extensions to support QoS-aware distributed systems.
Encryption is one of the most important security tools for secure message communication. There is an increasing need for secure digital multimedia communication technologies to restrict unauthorized access. Prior to t...
详细信息
Encryption is one of the most important security tools for secure message communication. There is an increasing need for secure digital multimedia communication technologies to restrict unauthorized access. Prior to the availability of variable bit rate (VBR) communication services, systems typically treat every portion of a message equally and encrypt each and every bit of a message that is decrypted at the same rate as encrypted. Hence, encryption/decryption processes at both ends of the network were required to operate at the same rate. The advent of VBR multimedia communication services require new cryptography system implementations that can operate at different data rates, i.e., be scaled to different speed, different network bandwidths, and diverse receiver device capabilities. In this paper, we describe a progressive and scalable encryption scheme that supports scalability. One desirable feature of the proposed scheme is its simplicity and flexibility in supporting scalable multimedia communication and multimediacontentaccess control.
This paper describes a synchronized multimedia language optimized for mobile phones. We can integrate sound, text, and images into a synchronized multimediacontent by the language, and play it on mobile phones.
This paper describes a synchronized multimedia language optimized for mobile phones. We can integrate sound, text, and images into a synchronized multimediacontent by the language, and play it on mobile phones.
Supervised learning algorithms (relevance feedback (RF) algorithms) are often used in content based image retrieval (CBIR) systems to enhance interactive search and browsing of image databases. One of the issues assoc...
详细信息
Supervised learning algorithms (relevance feedback (RF) algorithms) are often used in content based image retrieval (CBIR) systems to enhance interactive search and browsing of image databases. One of the issues associated with RF based CBIR systems is the lack of a large training set. Labeling of images is a time consuming activity and user's usually do not have the patience to label a large set. The challenge is to somehow leverage the much larger set of unlabeled images to improve the performance of CBIR systems. In this paper we propose a novel RF algorithm which learns from both labeled and unlabeled data. Our proposed algorithm also uses active learning so as to maximize the information gained from a given amount of user feedback.
A mobile streaming media content delivery network can facilitate the access of rich multimedia streams by mobile users on next generation wireless networks. A principal component of this network is the edge servers th...
详细信息
A mobile streaming media content delivery network can facilitate the access of rich multimedia streams by mobile users on next generation wireless networks. A principal component of this network is the edge servers that cooperate to provide streaming functionalities. This paper describes some of the design requirements for such servers. It then describes the architecture of such a streaming content, a modular design, and an intelligent scheduler for providing better video quality in varying network conditions. Finally, preliminary performance results are shown.
Traditional cryptography systems treat every portion of a message (a video, an image, or an audio) equally and encrypt the entire message as a whole. As a result, those security systems often have only two states: acc...
详细信息
Traditional cryptography systems treat every portion of a message (a video, an image, or an audio) equally and encrypt the entire message as a whole. As a result, those security systems often have only two states: access authorization and access denial. To facilitate multi-level access control with interoperability, scalable security mechanism is needed. Further, the availability of varying network bandwidth and diverse receiver device capabilities demand scalable and flexible approaches that are capable of adapting to changing network conditions as well as device capabilities. We describe a multimedia encryption scheme that supports scalability. One desirable feature of the proposed scheme is its simplicity and flexibility in supporting scalable contentaccess control.
One of the main challenges facing Web-based multimediacontent creators today is the development of cost-effective digital media content for courseware that is reusable and interoperable. Given this, we propose the de...
详细信息
One of the main challenges facing Web-based multimediacontent creators today is the development of cost-effective digital media content for courseware that is reusable and interoperable. Given this, we propose the design and implementation of a model to manage the multimedia and metadata within a system of related topics in a course that is delivered via electronic lectures. This model not only supports the re-purposing and interchange of a course's digital media content, but also preserves the semantic dependencies and associated media-mapping, of pre-requisite and co-requisite knowledge within a course. Coarse grain or topic-based segmentations of an electronic lecture are used as building blocks to automatically create new, media-rich, electronic lecture experiences of interest to a user and subject to the constraints imposed by the model.
Advances in wireless communication and mobile computing and networking are providing us with growing business opportunities and demands for multimedia services. Consumer networks, increasingly used for multimedia info...
详细信息
ISBN:
(纸本)0780381858
Advances in wireless communication and mobile computing and networking are providing us with growing business opportunities and demands for multimedia services. Consumer networks, increasingly used for multimedia information and commercial content delivery, are destined to be heterogeneous. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized multimediacontentaccess and distribution. This suggests the need for new cryptography system implementations that can operate at different data rates, i.e., be scaled to various multimediacontent, different network topology, changing bandwidth, and diverse receiver device capabilities. content authentication is one important security tool for secure multimediacontent communication. Conventional message authentication schemes do not offer suitable scalability for this new set of applications. In this paper, we study the design of scalable media data stream authentication when proxy caching is used and present a framework for multimedia authentication that supports various kinds of scalability.
Many audio and multimedia applications would benefit if they could interpret the content of audio rather than relying on descriptions or keywords. These applications include multimedia databases and file systems, digi...
详细信息
ISBN:
(纸本)0780381858
Many audio and multimedia applications would benefit if they could interpret the content of audio rather than relying on descriptions or keywords. These applications include multimedia databases and file systems, digital libraries, automatic segmentation or indexing of video (e.g., news or sports storage), and surveillance. This paper describes a novel content-based audio classification approach based on neural network and genetic algorithm. Experiments show this approach achieves a good performance of the classification.
暂无评论