For an end-to-end media streaming system, the Internet can be considered a black box in the middle that connects a client at one end to the server at the other end. In this paper, we present both ends' views of th...
详细信息
ISBN:
(纸本)0769510620
For an end-to-end media streaming system, the Internet can be considered a black box in the middle that connects a client at one end to the server at the other end. In this paper, we present both ends' views of the streaming problems and review two approaches to these problems. The first approach, which is represented by scalable coding, is reactive in nature because it seeks to best adapt to the changing network conditions such as the bandwidth fluctuation and packet loss. The reactive approach is helpful in keeping a stream uninterrupted and providing a graceful degradation, but offers no guarantee on quality of the streamed content and does not help solve server-side problems such as scalability. The other approach is proactive and has motivated recent development in content delivery networks. We show that a content delivery network helps improve quality and scalability of streaming, and can be complemented with a reactive approach like scalable coding.
This paper provides a joint source channel coding method based on arithmetic coding. The proposed method gives arithmetic coding error detection capability by using its error propagation property and markers. This pap...
详细信息
ISBN:
(纸本)0769521088
This paper provides a joint source channel coding method based on arithmetic coding. The proposed method gives arithmetic coding error detection capability by using its error propagation property and markers. This paper provides theoretical analysis and an experiment with text files.
Watermarking with oblivious detection and high robustness capabilities together is still a challenging problem zip to now. In addition, the number of secret keys which is required in the detection process should be ke...
详细信息
ISBN:
(纸本)0769510620
Watermarking with oblivious detection and high robustness capabilities together is still a challenging problem zip to now. In addition, the number of secret keys which is required in the detection process should be kept as minimal as possible. Usually, a human visual model-based watermarking method requires recording the hiding places where watermarks are concealed. However, this kind of embedding strategy will cause an extra burden during watermark detection. The objective of this paper is to propose a more general watermarking framework which can satisfy the requirements of robustness and oblivious detection while only requiring one secret key in both the embedding and the detection processes. We propose to employ the side information concept which is commonly used in communication together with a mean filtering process to design a new watermarking technology. Experiments show that our method is robust against common attacks.
This paper proposes an innovative solution to design the search interfaces of search engines with soft real-time guarantee. Our solution presents a new scheduling model to enable flexible relative deadline and a time ...
详细信息
ISBN:
(纸本)0769521088
This paper proposes an innovative solution to design the search interfaces of search engines with soft real-time guarantee. Our solution presents a new scheduling model to enable flexible relative deadline and a time prediction algorithm to overcome the uncertainty of varied execution time. The time prediction algorithm is also proved to be optimal if the elements of sampling vectors are independent. The results of the experiment show that this new model can fully utilize the processor with a very low ratio of task abortion.
Often web users want to be notified when a specific information contained in a web page has been modified. The problem of detecting web document changes has been deeply investigated and several systems providing notif...
详细信息
ISBN:
(纸本)0769510620
Often web users want to be notified when a specific information contained in a web page has been modified. The problem of detecting web document changes has been deeply investigated and several systems providing notification of web page changes are available. These systems do not provide notification of changes on a specific information contained in a web page. In this work we present a system called CDWeb that performs this task. It allows users to monitor a whole document or specific portions of it. Users can also specify what kind of changes they are interested in, such as structural changes, or semantic changes. The system provides a flexible and adaptive view of the Web: it tracks user queries and creates user profiles, in order to associate a personalized view to each user.
In this paper, we present a positioning system implemented in JAVA designed to provide tourist information for car users. Most of this multimedia information is stored in a local database in the car but it is possible...
详细信息
ISBN:
(纸本)0769510620
In this paper, we present a positioning system implemented in JAVA designed to provide tourist information for car users. Most of this multimedia information is stored in a local database in the car but it is possible to increase or update it by accessing a remote database by mobile telephone. The system can be controlled like any standard computer by keyboard or by mouse, but also offers a hand-free control based in an oral-interface module very important for a system designed to be used inside a car.
This paper reports on an application of Language Modeling techniques to the retrieval of Farsi documents. We discovered that Language Modeling improves the precision of retrieval when compared to a standard vector spa...
详细信息
ISBN:
(纸本)0769521088
This paper reports on an application of Language Modeling techniques to the retrieval of Farsi documents. We discovered that Language Modeling improves the precision of retrieval when compared to a standard vector space model.
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be...
详细信息
ISBN:
(纸本)0769523153
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be lost during the discretization of the experimental data. Indeed, fuzzy boundaries between species and degrees of character development are commonly found in nature. Therefore, we proposed the fizzy perfect phylogeny model that extends the perfect phylogeny model to allow for a fuzzy membership of the characters. The properties of this model, such as uniqueness and backward compatibility, were then shown. We also showed how the fuzzy perfect phylogeny problem can be transformed to the perfect phylogeny problem in O(mv) time where m is the number of objects and v is the number of distinct value of characters. As a result, valuable information from the experimental data can be used without substantially increase the problem complex.
Involvement of the multi-agent systems for scheduling and executing a complex task autonomously, has been addressed in the paper to solve the navigational problems in robotics. Here, a complex task is broken into a nu...
详细信息
ISBN:
(纸本)0769510620
Involvement of the multi-agent systems for scheduling and executing a complex task autonomously, has been addressed in the paper to solve the navigational problems in robotics. Here, a complex task is broken into a number of subtasks and one to one mapping between subtask and agent is determined from the given relationship among various agents. In a dynamic environment the state-space model of the multiagent system has been designed using the agents' spatial coordinate positions and sensory data to facilitate performing a task through cooperation. The paper proposes an efficient strategy for collision resolution that may occur at an instant of time, while the robots navigate in the common environment. The distributed agent concept has been adopted in the paper to implement the whole scheme in JAVA.
In this paper, we present two techniques. The first technique called Privacy Sensitive information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and f...
详细信息
ISBN:
(纸本)0769523153
In this paper, we present two techniques. The first technique called Privacy Sensitive information dilUtin Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.
暂无评论