We propose two gateway architectures. The first one is the home gateway, which interconnects home networks and the public (access) network. We show its requirements and software design. We implemented an experimental ...
详细信息
ISBN:
(纸本)0769510809
We propose two gateway architectures. The first one is the home gateway, which interconnects home networks and the public (access) network. We show its requirements and software design. We implemented an experimental home gateway based on a Web server enhanced with Java facilities. It interconnects the Internet and the home networks (IEEE1394 AV network and the ECHONET home automation network). It also has a real time MP1394 transcoding function which transcodes AV data on IEEE1394 into MPEG4 video. It provides the capability of remote control of the home, and AV data transmission/translation capabilities. The second one is the wireless gateway. We show the background with respect to the wireless gateway and its design. The key issue is to develop interconnectivity between wired and wireless networks, and then we show our implementation of it. It interconnects IEEE1394 and 802.11b 2.4 GHz band high-speed wireless network, and transmits AV control commands and high-quality AV data.
We present a process for converting the Macromedia/sup /spl reg// Flash/sup TM/ Shockwave/sup /spl reg// file (SWF) format into MPEG-4 BIFS syntax. In recent years, Flash (one of Macromedia's products) has become ...
详细信息
ISBN:
(纸本)0780371658
We present a process for converting the Macromedia/sup /spl reg// Flash/sup TM/ Shockwave/sup /spl reg// file (SWF) format into MPEG-4 BIFS syntax. In recent years, Flash (one of Macromedia's products) has become very popular among content developers to create streaming two-dimensional (2D) animation and vector graphics over the Internet. By transcoding the multimedia content from SWF into MPEG-4 binary format for scenes (BIFS) and further enhancing the content with streaming video and audio, content creators can painlessly produce MPEG-4 content without learning any new content development tools.
The transcoding proxy strategy has been widely used as a means to reduce the delay in retrieving Web pages over wireless mobile data networks. However, this strategy has a serious drawback of being a potential point o...
详细信息
ISBN:
(纸本)0769509517
The transcoding proxy strategy has been widely used as a means to reduce the delay in retrieving Web pages over wireless mobile data networks. However, this strategy has a serious drawback of being a potential point of failure or a bottleneck of the service. We developed a distributed proxy server system in which multiple proxy servers are installed at geographically dispersed locations and share the workloads among themselves by serving mobile hosts within assigned regions. A new handoff (HO) message protocol is proposed to enable handoffs between proxies as the mobile hosts move between regions. With this proxy server handoff protocol a client agent at the mobile host requests a proxy server to initiate handoff processing and two proxy servers synchronize distilled data for a HTTP session disconnected by the handoff.
We present a novel video coding approach which provides the functionality of fine granular bitstream scalability. The proposed progressive texture video coding (PTVC) scheme consists of two parts: the current ITU-T H....
详细信息
We present a novel video coding approach which provides the functionality of fine granular bitstream scalability. The proposed progressive texture video coding (PTVC) scheme consists of two parts: the current ITU-T H.26L test model for coding macroblock mode and motion information only; a new technique for progressively coding all intra and inter texture information thus providing an embedded bitstream. It can still be decoded with moderate quality degradation in case of partial loss of the bitstream. It is therefore well suited for multicast or broadcast scenarios where time varying or different fixed bitrates are provided to the clients, as no transcoding or multiple coding process is required.
This paper proposes a new algorithm to estimate the motion vector of the reduced low-resolution video by only using the original motion vectors and discrete cosine coefficients in the compressed bitstream. Higher qual...
详细信息
ISBN:
(纸本)0780366220
This paper proposes a new algorithm to estimate the motion vector of the reduced low-resolution video by only using the original motion vectors and discrete cosine coefficients in the compressed bitstream. Higher quality and lower complexity are achieved.
Mobile devices present new challenges for technical communication professionals. Multiple markup languages, small display screens, and limited input methods pose obstacles that information developers must overcome to ...
详细信息
Mobile devices present new challenges for technical communication professionals. Multiple markup languages, small display screens, and limited input methods pose obstacles that information developers must overcome to insure that information is received as intended. This paper is a useful resource for information developers challenged with providing content to mobile devices or who are interested in the unique technical requirements of developing information for mobile devices. The paper also delves into the design implications of displaying information on these devices and offers guidelines for serving content to mobile devices.
Network-aware content delivery is an attractive approach to mitigate the problems produced by the significant fluctuations of the available bandwidth present in today's Internet. Such network-aware applications re...
详细信息
Network-aware content delivery is an attractive approach to mitigate the problems produced by the significant fluctuations of the available bandwidth present in today's Internet. Such network-aware applications require information about the current condition of the network to adapt their resource demands. Such information can be obtained at the network level, the transport protocol level, or directly by the application. This paper compares two kinds of application-level monitoring (at the sender and receiver side) and transport-level monitoring with regard to their ability to provide useful information to network-aware applications. The results indicate that transport-level monitoring can effectively and efficiently satisfy the need for timely and accurate bandwidth information. This observation has direct implications for protocol/OS design. It is desirable to widen the transport layer API to allow the application efficient access to network status information required for adaptation.
Today's computing environments are becoming increasingly heterogeneous, mostly due to the growth of mobile computing. In this environment, application layer proxies that can adapt and tailor the content to the cli...
详细信息
Today's computing environments are becoming increasingly heterogeneous, mostly due to the growth of mobile computing. In this environment, application layer proxies that can adapt and tailor the content to the client's needs and capabilities as well as to the available network resources are highly beneficial. The problem is that content adaptation proxies are generally incompatible with the notion of end-to-end security. The only generic solution to this problem is the concept of selective security. The idea is to apply security selectively only to the sensitive elements of a data stream and expose the rest to any intermediary system for potential content adaptation. None of the currently used security protocols provides an API for fine-grained control of the application of security mechanisms to a data stream. We propose a simple extension to the transport layer security protocol (TLS), which provides the application with an interface for selectively protecting elements within a data stream. We also discuss a generic application scenario that shows how the proposed extended features can be used in conjunction with content adaptation proxies.
In this correspondence, we propose a channel-matched hierarchical table-lookup vector quantizer for a discrete memoryless channel. We show that this scheme simultaneously pro,ides low encoding complexity and robustnes...
详细信息
In this correspondence, we propose a channel-matched hierarchical table-lookup vector quantizer for a discrete memoryless channel. We show that this scheme simultaneously pro,ides low encoding complexity and robustness against transmission noise. Additionally, we propose the use of lookup tables for transcoding in heterogeneous networks. We show, through an example motivated by an application in multicasting, that the proposed table-lookup transcoding approach is an elegant alternative to the expensive and delay-introducing method of transcoding achieved by decoding and re-encoding.
transcoding proxies are used as intermediaries between generic World Wide Web servers and a variety of client devices in order to adapt to the greatly varying bandwidths of different client communication links and to ...
详细信息
transcoding proxies are used as intermediaries between generic World Wide Web servers and a variety of client devices in order to adapt to the greatly varying bandwidths of different client communication links and to handle the heterogeneity of possibly small-screened client devices. Such transcoding proxies can adaptively adjust the amount by which a data stream is reduced, using an aggressive lossy compression method (e.g., an image becomes less clear, text is summarized) We present an analytical framework for determining whether to transcode and how much to transcode an image for the two cases of store-and-forward transcoding as well as streamed transcoding. These methods require prediction of transcoding delay, prediction of transcoded image size (in bytes), and estimation of network bandwidth. We discuss methods of adaptation based on fixed quality as well as fixed delay (automated/dynamic transcoding). We conclude with a description of the practical adaptation policies that have been implemented in our adaptive image transcoding proxy.
暂无评论