The 2nd International Conference on Distributed Frameworks for Multimedia Applications最新文献

筛选
英文 中文
Towards a Peer-to-peer Architecture for the provision of Adaptable Multimedia Composed Documents 面向可适应多媒体组合文档提供的点对点体系结构
Z.K. Aoul, I. Demeure, Jean-Claude Moissinac
{"title":"Towards a Peer-to-peer Architecture for the provision of Adaptable Multimedia Composed Documents","authors":"Z.K. Aoul, I. Demeure, Jean-Claude Moissinac","doi":"10.1109/DFMA.2006.296906","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296906","url":null,"abstract":"This article proposes an architecture that delivers adapted multimedia documents to participants of a P2P system. Both the multimedia documents and the adaptation resources are made available in the P2P system. The adaptation architecture looks for adaptation resources, composes them in order to support complex adaptation operations and to perform the adaptations. The system also faces the difficulty that, in a P2P environment, a peer is likely to disconnect. It thus takes into account the dynamic changes in both users and adaptors environments. A complete adaptation chain is implemented using the Web services technology, the MPEG-21 multimedia standard and the SMIL multimedia language. A first evaluation of the approach is presented; it shows that there is no significant overhead with respect to other adaptation architectures. This is encouraging given that the approach enables parallel execution of adaptation functions and load balancing which could lead to gains in performance","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
AgentJ: Enabling Java NS-2 Simulations for Large Scale Distributed Multimedia Applications 为大规模分布式多媒体应用启用Java NS-2模拟
I. Taylor, B. Adamson, I. Downard, J. Macker
{"title":"AgentJ: Enabling Java NS-2 Simulations for Large Scale Distributed Multimedia Applications","authors":"I. Taylor, B. Adamson, I. Downard, J. Macker","doi":"10.1109/DFMA.2006.296911","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296911","url":null,"abstract":"We present a framework, called AgentJ that extends the NS-2 platform to support the simulation and performance analysis of Java network applications. We particularly focus on the simulation of P2P networks and have already integrated the P2PS middleware for the simulation of super-peer networks for discovering participants in large scale Internet applications, which has a high significance for distributed multimedia applications to enable overlays for the discovery and searching across large numbers of distributed multimedia resources. AgentJ builds upon the numerous years of networking research with NS-2 and leverages the Protolib toolkit from NRL to facilitate the passing of real data between NS-2 nodes, thereby creating a platform for the simulation of content-based middleware and applications. AgentJ currently supports UDP unicast and multicast and maintains compatible programming interfaces with the standard Java network package as well as the NS-2 scripting interfaces employed for staging simulations","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132367868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Avoiding Misbehaving Nodes in Mobile Ad-Hoc Environments: Towards Improved QoS Routing 移动Ad-Hoc环境中避免行为不端的节点:迈向改进的QoS路由
A. Helweh-Hannan
{"title":"Avoiding Misbehaving Nodes in Mobile Ad-Hoc Environments: Towards Improved QoS Routing","authors":"A. Helweh-Hannan","doi":"10.1109/DFMA.2006.296904","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296904","url":null,"abstract":"The recent advances in wireless technologies and ubiquitous computing have driven an immense interest in mobile ad hoc networks (MANETs). However, the performance of MANETs is highly affected by the behaviour of its constituting nodes, which must cooperate in order to provide the basic networking functionality. We present a solution that detects and avoids misbehaving nodes which agree to route packets for other nodes and subsequently drop these packets. Such misbehaviour is of direct effect on quality of service (QoS) solutions, namely the QoS good put metric. The solution takes a transparent layered approach and assumes no security constraints. The solution was simulated using NS2. Experiments were done using multiple variations of mobile ad hoc environments, according to the hostility degree, mobility scenario and traffic load. The experimentation results show that the solution consistently detects and avoids misbehaving nodes leading to improved goodput by up to 25%","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IEEE 802.11b Multi-hop Experiments and Analysis IEEE 802.11b多跳实验与分析
S. C. Ng, K. Wong
{"title":"IEEE 802.11b Multi-hop Experiments and Analysis","authors":"S. C. Ng, K. Wong","doi":"10.1109/DFMA.2006.296917","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296917","url":null,"abstract":"IEEE 802.11b has become a prominent standard to provide wireless connections between mobile nodes, and often also through an access point (AP) to a wired LAN. All kinds of traffic may be handled by the wireless networks formed, including multimedia traffic. However, the standard comes with some inherent problems, such as channel interference, the hidden node problem and the exposed node problem. All these problems will affect the quality, bandwidth and performance of the radio links between the mobile nodes and the APs, and consequently also the types of traffic they can support. In addition, the problems also limit the distance between the mobile nodes and APs, and the topology of the wireless network they form. The degradation of service is especially not negligible when the topology involves multi-hops and routing in the network. In this paper, we look at the performance of multi-hop wireless networks and identify some effects of channel interference on the network performance","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Agent Negotiation System Using Adaptive Fuzzy Logic in Resource Allocation 基于自适应模糊逻辑的多智能体协商系统资源分配
Cheng Wai Khuen, C. Yong, F. Haron
{"title":"Multi-Agent Negotiation System Using Adaptive Fuzzy Logic in Resource Allocation","authors":"Cheng Wai Khuen, C. Yong, F. Haron","doi":"10.1109/DFMA.2006.296888","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296888","url":null,"abstract":"This paper addresses the multi-agent system (MAS) with negotiation capability using an artificial intelligent (AI) approach - adaptive fuzzy logic (AFL) - in learning the behavior of other agents when allocating resources. The learning continues during each reasoning process on the subsequent reaction of negotiants. We present the results of multi-agent negotiation with multi-issue (e.g. price, time, resource conditions) in three perspectives (accuracy, adaptability and reliability) with different AI and heuristic approaches. From our analysis, we found that the AFL gives an overall stable performance and outperform other methods in analyzing opponent tactics and strategies","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Pre-Authenticated and Adaptive IP Mobility for WLAN nodes WLAN节点的预认证和自适应IP迁移
B. Issac, K. Hamid, C.E. Tan
{"title":"Pre-Authenticated and Adaptive IP Mobility for WLAN nodes","authors":"B. Issac, K. Hamid, C.E. Tan","doi":"10.1109/DFMA.2006.296900","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296900","url":null,"abstract":"When a mobile node roams to another network/subnet, new resource reservation has to be made between the sender and receiver. If enough resources are not available, the quality of service may be disrupted and the connection may fail. If resources are reserved indiscriminately, then most of them would be unused and performance degradation would be the result. We would like to propose a pre-authenticated and adaptive micro-mobility management architecture in IP networks. We use pre-authentication to hasten the handoff process. Also the mobility predictor block used will help in reserving the resources aptly. The packets are generally classified based on the ToS field in IPv4 (or traffic class and the flow label fields in IPv6). Here we focus more on the special case of wireless local area networks (WLANs) installation within a building or in a restricted campus. In this paper, we propose a fast and adaptive IP micro mobility management scheme with mobility prediction for WLAN nodes. We also present some basic simulation on WLAN mobile node roaming","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Positioning Awareness: an Essential Component for Mobile Multimedia Applications 定位感知:移动多媒体应用的重要组成部分
F. Lassabe, P. Canalda, P. Chatonnay, F. Spies, Damien Charlet
{"title":"Positioning Awareness: an Essential Component for Mobile Multimedia Applications","authors":"F. Lassabe, P. Canalda, P. Chatonnay, F. Spies, Damien Charlet","doi":"10.1109/DFMA.2006.296916","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296916","url":null,"abstract":"The spreading of the WiFi networks allows new applications. New problems bound to the mobility of the terminals arise. In this article, we deal with the requirements and the solutions to address the service continuity in mobility. These requirements are integrated in mobility management middleware. It requires terminal positioning. The solution proposed is trilateration for which the distances are computed according to the signal strength. To provide the service continuity, the mechanism called handover is used. It requires an anticipation which is realized through mobility prediction. The handover is done transparently by an adapted protocol. All of these functions are implemented in GeoMoVie, the mobility component in a multimedia content streaming platform","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Radio Link Protocol for TCP Throughput Enhancement 一种提高TCP吞吐量的新型无线链路协议
M. Chatterjee, S. Ganguly
{"title":"A Novel Radio Link Protocol for TCP Throughput Enhancement","authors":"M. Chatterjee, S. Ganguly","doi":"10.1109/DFMA.2006.296887","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296887","url":null,"abstract":"To support TCP-based multimedia services on cellular networks, radio link protocols (RLP) are usually used to shield the channel related losses from TCP. In this paper, we categorize the RLP frames obtained by fragmenting a single TCP segment as crucial and non-crucial, and propose that different forward error correcting (FEC) schemes be applied to them. We find the fraction that constitute the crucial frames. We consider preemptive transmissions i.e., retransmissions of dropped or corrupt frames are given priority over new frames. Through qualitative analysis we demonstrate that the proposed RLP performs better than the traditional ones. We also show how the TCP throughput is improved because of the new RLP","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPU Usage Pattern Discovery Using Suffix Tree 使用后缀树发现CPU使用模式
Ooi Boon Yaik, C. Yong, F. Haron
{"title":"CPU Usage Pattern Discovery Using Suffix Tree","authors":"Ooi Boon Yaik, C. Yong, F. Haron","doi":"10.1109/DFMA.2006.296889","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296889","url":null,"abstract":"In the dynamic resource-sharing environment, resource availability often varies from time to time. Resource prediction can be used to enhance scheduler effectiveness on their scheduling strategies and resource allocation. The prediction results can also be used by the applications to adjust themselves to suit the resource availability to get better performance. In this paper, we use a suffix tree to discover CPU usage patterns to find opportunities for exploiting the available CPU resources. We introduced a prediction strategy that uses discovered frequent patterns to predict CPU load. We defined that a CPU usage behavior as a set of CPU usage patterns. Our experiment results showed that CPU usage does exhibit certain behavior and our model is capable of discovering the usage and utilized it to perform prediction. The discovered patterns are interesting because some of the discovered cyclic patterns seem to be related to users' usage behaviour. In order to justify our model prediction capability, we compared our prediction model with the state-of-the-art methods such as Network Weather Services","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection of Secondary Structure in Medical Images using Wavelet and Watershed 基于小波和分水岭的医学图像二级结构检测
A. Achuthan, M. Rajeswari, D. Ramachandram
{"title":"Detection of Secondary Structure in Medical Images using Wavelet and Watershed","authors":"A. Achuthan, M. Rajeswari, D. Ramachandram","doi":"10.1109/DFMA.2006.296898","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296898","url":null,"abstract":"Image segmentation is the most essential and crucial process in order to facilitate the delineation, characterization and visualization of structures of interests in medical images. In recent years, various methods of medical image segmentation have been employed depending on the type of tissues, anatomy of object of interest and imaging modality being used. In this paper, a novel problem specific segmentation method is proposed to detect secondary structures in medical images incorporating wavelet transform and watershed transformation. The proposed method consists of 5 stages: wavelet transformation, inter scale linking, feature calculation and clustering, morphological processing and watershed transformation. This paper presents the proposed method and preliminary results tested using computed tomography (CT) images of human anatomy. The preliminary experimental results of this research have shown encouraging results with elimination of over segmentation problem frequently faced in watershed transformation","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信