Video-on-demand systems will be the video rental shops of the future. One of the great challenges in the VoD domain is optimizing the cost/performance ratio of the designed system. We present a clustered, high perform...
详细信息
Video-on-demand systems will be the video rental shops of the future. One of the great challenges in the VoD domain is optimizing the cost/performance ratio of the designed system. We present a clustered, high performance, high availability and low cost VoD system, which is based on a network of personal computers. We experimented with state-of-the-art video compression algorithms like MPEG-4, although our system is video format independent. We succeeded in serving 90 near DVD quality streams per node, with great potential for expansion. We show that the key factor of this success is the migration of performance demanding procedures to clients of the system, which possess the appropriate processing power to support them. Furthermore, we present the results of our experiments with systems of 2 and 3 server nodes that prove the linearity between the number of server nodes and the number of served streams.
In this paper, we present a new LFSR reseeding scheme for scan-based BIST, suitable for circuits with random-pattern-resistant faults. The proposed scheme eliminates the need of a ROM for storing the seeds since the r...
详细信息
In this paper, we present a new LFSR reseeding scheme for scan-based BIST, suitable for circuits with random-pattern-resistant faults. The proposed scheme eliminates the need of a ROM for storing the seeds since the reseedings are performed dynamically by inverting some selected bits of the LFSR register. A time-to-market efficient algorithm is also presented for selecting the reseeding points in the test sequence, as well as a proper seed at each point. This algorithm targets complete fault coverage and minimization of the resulting test length and hardware overhead. Experimental results on ISCAS '85 and ISCAS '89 benchmark circuits demonstrate the advantages of this new LFSR reseeding approach in terms of area overhead and test application time.
A novel technique for the analysis, nonlinear model identification and prediction of the fetal Magneto Cardio Gram (f-MCG) is presented. f-MCGs can be recorded with the use of specific totally non-invasive Superconduc...
详细信息
Simulation has always been a valuable tool for experimentation and validation of models, architectures and mechanisms in the field of networking. In the case of the DiffServ framework, simulation is even more valuable...
详细信息
Simulation has always been a valuable tool for experimentation and validation of models, architectures and mechanisms in the field of networking. In the case of the DiffServ framework, simulation is even more valuable, due to the fact that an analytical approach of mechanisms and services is infeasible because of the aggregation and multiplexing of flows. In this work, we have extended the functionality of a widely used simulation environment towards the direction of realistic traffic generation and a series of mechanisms defined by the DiffServ architecture. The modules created are being presented and a case study of a simulation scenario that exploits the functionality provided by them is described.
Neurules are a kind of hybrid rules that combine a symbolic (production rules) and a connectionist (adaline unit) representation. Each neurule is represented as an adaline unit. One way that the neurules can he produc...
详细信息
Neurules are a kind of hybrid rules that combine a symbolic (production rules) and a connectionist (adaline unit) representation. Each neurule is represented as an adaline unit. One way that the neurules can he produced is from training examples (empirical source knowledge). However, in certain application fields not all of the training examples are available a priori. A number of them become available over time. In these cases, updating the corresponding neurules is necessary. In this paper, methods for updating a hybrid rule base, consisting of neurules, to reflect the availability of new training examples are presented The methods are efficient, since they require the least possible retraining effort and the number of the produced neurules is kept as small as possible.
In the paper an approach for digital image authentication is described. The authentication process is achieved by means of a watermarking scheme that embeds an approximation of the image into itself. Specifically, the...
详细信息
In the paper an approach for digital image authentication is described. The authentication process is achieved by means of a watermarking scheme that embeds an approximation of the image into itself. Specifically, the luminance of the image is inserted into the three colour channels, using a mapping function. The embedding process is implemented using a secret key k that maps the position of the pixel, where the luminance information is taken from, to the position of the pixel in which the watermark information is embedded. The quality of the watermarked images remains very high both subjectively and objectively. The proposed approach belongs to the category of semi-fragile techniques used for image authentication.
In this paper, a nonsingular terminal sliding mode concept is introduced for the control of a class of nonlinear dynamical systems. This nonsingular terminal sliding mode control not only enables the Lnite time conver...
详细信息
Future cellular mobile networks will be limited by the number of channels available in each cell. On the other hand, new broadband applications like video telephony will demand tight quality of service guarantees that...
详细信息
ISBN:
(纸本)0769514359
Future cellular mobile networks will be limited by the number of channels available in each cell. On the other hand, new broadband applications like video telephony will demand tight quality of service guarantees that must be met by the network at all times. Thus, advanced mechanisms for allocating these channels to incoming calls with different quality of service level will be of utmost importance. In this paper we introduce a new analytical model for cell channel allocation to multiclass traffic. Being based on Markov chains, the new model exploits the multi-class property and reduces the state space dramatically, thus enabling the solution of previously unsolvable problem classes. We additionally describe CECALL, a simulator implementing several different strategies for allocating cell channels to multiclass traffic, handoff pre-reservation and degradation of low-level call classes. The results of the analytical model are used for explaining important simulation results.
The management of Supply Chain Systems is one of the major issues that a firm has to deal with in today's global economy. The purpose of this type of system is to transform incomplete information about the market ...
详细信息
The management of Supply Chain Systems is one of the major issues that a firm has to deal with in today's global economy. The purpose of this type of system is to transform incomplete information about the market and available resources into co-ordinated plans for production and replenishment of goods and services in the network formed by co-operating units. One of the goals of Internet-Based Management (e-management) is to facilitate transfer and sharing of data and knowledge in the context of supply chain structures. Knowledge-based modelling tools for supply chain management utilise reusable components and configure knowledge as needed, in order to assist users (agents) in decision-making. This paper discusses a generic development methodology for e-management and conceptual modelling of supply chains. For illustration, applications from the automotive industry have been utilised.
暂无评论