Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial featur...
详细信息
The new multimedia standards (for example, MPEG-21) facilitate the seamless integration of multiple modalities into interoperable multimedia frameworks, transforming the way people work and interact with multimedia da...
详细信息
ISBN:
(数字)9789400767386
ISBN:
(纸本)9789400767379;9789402401516
The new multimedia standards (for example, MPEG-21) facilitate the seamless integration of multiple modalities into interoperable multimedia frameworks, transforming the way people work and interact with multimedia data. These key technologies and multimedia solutions interact and collaborate with each other in increasingly effective ways, contributing to the multimedia revolution and having a significant impact across a wide spectrum of consumer, business, healthcare, education, and governmental domains.;provides an opportunity for academic and industry professionals to discuss recent progress in the area of multimedia and ubiquitous environment including models and systems, new directions, novel applications associated with the utilization and acceptance of ubiquitous computing devices and systems.
Awareness mechanisms are normally used to deliver context information to computer systems users. These mechanisms have been extensively studied as part of collaborative solutions designed for stationary scenarios, and...
详细信息
We describe a three-stage model of computing instruction beginning with a simple, highly scaffolded programming en-vironment (Kodu) and progressing to more challenging frame-works (Alice and Lego NXT-G). In moving bet...
详细信息
The increasing availability of large-scale trajectory data provides us great opportunity to explore them for knowledge discovery in transportation systems using advanced data mining techniques. Nowadays, large number ...
详细信息
Automated construction methods of attack graphs (AGs) and their improved attack representation models (ARMs) have been proposed, but the AG has a state space explosion when analysing the security of very large sized n...
详细信息
Automated construction methods of attack graphs (AGs) and their improved attack representation models (ARMs) have been proposed, but the AG has a state space explosion when analysing the security of very large sized networked systems. Instead, attack trees (ATs) and their improved ARMs can be used (e.g., Defense Trees, Protection Trees, Attack Response Trees, and Attack Countermeasure Trees), because they are a non-state-space model. However, there are no known methods to construct ATs in a scalable manner automatically while maintaining all possible attack scenarios. We can use an AG generation tools, and transform the AG into the AT using min-cuts. However, this method requires a transformation (i.e., an overhead), and computing min-cuts is a NP-hard problem. Another way is to construct ATs directly with given network information. A naive approach is to compute all possible attack paths and populate the AT branches using logic gates (e.g., AND and OR gates), but this method generates an exponential number of nodes, causing a scalability problem. We propose two logic reduction techniques to automate the ATs construction and to reduce the size of the AT. The computational complexity is calculated. The simulation result shows the construction time for the naive method and two logic reduction techniques. The trade-off between the construction time and the memory usage of simplified ATs are also shown.
By measuring similarity of programs, we can determine whether someone illegally copies a program from another program or not. If the similarity is significantly high, it means that a program is a copy of the other. Th...
详细信息
Given the advanced set of capabilities offered by smartphone and tablet computing devices, they have become the platform of choice for many users for day-to-day work and leisure. There is however a fundamental differe...
详细信息
Unified communications (UC) offers users an uninterrupted communication service regardless of the device which the user is using, the heterogeneous networks to which he might be connected, the physical and logical con...
详细信息
ISBN:
(纸本)9781479900312
Unified communications (UC) offers users an uninterrupted communication service regardless of the device which the user is using, the heterogeneous networks to which he might be connected, the physical and logical context in which he exists and the diversity of QoS requirements by different session participants and services. Providing and maintaining an acceptable level of QoS, as perceived by all session participants, is a major issue in UC as well as in next generation networks (NGN) at large. QoS provisioning in such networks is a multi stage problem that starts from receiving the traffic, classifying it, mapping it to the appropriate UC class and finally queuing and scheduling it for delivery. In this paper, we introduce a novel mapping technique that accepts traffic belonging to a diverse set of applications coming from different networks and then maps it to one of eight UC classes based on the QoS requirements of each of the session's participants. The proposed mapping algorithm performs this by calculating an agreed upon set of QoS performance metrics and then map this set to the closest UC class. Evaluation results demonstrate the efficiency of the proposed mapping technique.
There are various factors involved in the transmission of video over internet. These factors have direct impact on the quality of the transmitted video. The underlying video codec, encapsulation method and protocol ar...
详细信息
There are various factors involved in the transmission of video over internet. These factors have direct impact on the quality of the transmitted video. The underlying video codec, encapsulation method and protocol are the key players which affect the quality of video transmission on a network. Up to our knowledge various research studies have been carried out to analyze the impact of these factors independently on the quality of video transmission however their combined effect on video transmission is not yet done. In this paper we characterize the impact of video codec, encapsulation methods and transmission protocols of video streaming setup, while keeping in view the percent frame loss as the main investigating parameter. The results obtained from the experiments carried out for the key investigating factor are presented in the results section of this paper. To be more precise, it was observed that the wmv1 mpeg2, m-jpeg codecs, asf encapsulation and rtp protocol performs best.
暂无评论