{"title":"Towards a Peer-to-peer Architecture for the provision of Adaptable Multimedia Composed Documents","authors":"Z.K. Aoul, I. Demeure, Jean-Claude Moissinac","doi":"10.1109/DFMA.2006.296906","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296906","url":null,"abstract":"This article proposes an architecture that delivers adapted multimedia documents to participants of a P2P system. Both the multimedia documents and the adaptation resources are made available in the P2P system. The adaptation architecture looks for adaptation resources, composes them in order to support complex adaptation operations and to perform the adaptations. The system also faces the difficulty that, in a P2P environment, a peer is likely to disconnect. It thus takes into account the dynamic changes in both users and adaptors environments. A complete adaptation chain is implemented using the Web services technology, the MPEG-21 multimedia standard and the SMIL multimedia language. A first evaluation of the approach is presented; it shows that there is no significant overhead with respect to other adaptation architectures. This is encouraging given that the approach enables parallel execution of adaptation functions and load balancing which could lead to gains in performance","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AgentJ: Enabling Java NS-2 Simulations for Large Scale Distributed Multimedia Applications","authors":"I. Taylor, B. Adamson, I. Downard, J. Macker","doi":"10.1109/DFMA.2006.296911","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296911","url":null,"abstract":"We present a framework, called AgentJ that extends the NS-2 platform to support the simulation and performance analysis of Java network applications. We particularly focus on the simulation of P2P networks and have already integrated the P2PS middleware for the simulation of super-peer networks for discovering participants in large scale Internet applications, which has a high significance for distributed multimedia applications to enable overlays for the discovery and searching across large numbers of distributed multimedia resources. AgentJ builds upon the numerous years of networking research with NS-2 and leverages the Protolib toolkit from NRL to facilitate the passing of real data between NS-2 nodes, thereby creating a platform for the simulation of content-based middleware and applications. AgentJ currently supports UDP unicast and multicast and maintains compatible programming interfaces with the standard Java network package as well as the NS-2 scripting interfaces employed for staging simulations","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132367868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Avoiding Misbehaving Nodes in Mobile Ad-Hoc Environments: Towards Improved QoS Routing","authors":"A. Helweh-Hannan","doi":"10.1109/DFMA.2006.296904","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296904","url":null,"abstract":"The recent advances in wireless technologies and ubiquitous computing have driven an immense interest in mobile ad hoc networks (MANETs). However, the performance of MANETs is highly affected by the behaviour of its constituting nodes, which must cooperate in order to provide the basic networking functionality. We present a solution that detects and avoids misbehaving nodes which agree to route packets for other nodes and subsequently drop these packets. Such misbehaviour is of direct effect on quality of service (QoS) solutions, namely the QoS good put metric. The solution takes a transparent layered approach and assumes no security constraints. The solution was simulated using NS2. Experiments were done using multiple variations of mobile ad hoc environments, according to the hostility degree, mobility scenario and traffic load. The experimentation results show that the solution consistently detects and avoids misbehaving nodes leading to improved goodput by up to 25%","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE 802.11b Multi-hop Experiments and Analysis","authors":"S. C. Ng, K. Wong","doi":"10.1109/DFMA.2006.296917","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296917","url":null,"abstract":"IEEE 802.11b has become a prominent standard to provide wireless connections between mobile nodes, and often also through an access point (AP) to a wired LAN. All kinds of traffic may be handled by the wireless networks formed, including multimedia traffic. However, the standard comes with some inherent problems, such as channel interference, the hidden node problem and the exposed node problem. All these problems will affect the quality, bandwidth and performance of the radio links between the mobile nodes and the APs, and consequently also the types of traffic they can support. In addition, the problems also limit the distance between the mobile nodes and APs, and the topology of the wireless network they form. The degradation of service is especially not negligible when the topology involves multi-hops and routing in the network. In this paper, we look at the performance of multi-hop wireless networks and identify some effects of channel interference on the network performance","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent Negotiation System Using Adaptive Fuzzy Logic in Resource Allocation","authors":"Cheng Wai Khuen, C. Yong, F. Haron","doi":"10.1109/DFMA.2006.296888","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296888","url":null,"abstract":"This paper addresses the multi-agent system (MAS) with negotiation capability using an artificial intelligent (AI) approach - adaptive fuzzy logic (AFL) - in learning the behavior of other agents when allocating resources. The learning continues during each reasoning process on the subsequent reaction of negotiants. We present the results of multi-agent negotiation with multi-issue (e.g. price, time, resource conditions) in three perspectives (accuracy, adaptability and reliability) with different AI and heuristic approaches. From our analysis, we found that the AFL gives an overall stable performance and outperform other methods in analyzing opponent tactics and strategies","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pre-Authenticated and Adaptive IP Mobility for WLAN nodes","authors":"B. Issac, K. Hamid, C.E. Tan","doi":"10.1109/DFMA.2006.296900","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296900","url":null,"abstract":"When a mobile node roams to another network/subnet, new resource reservation has to be made between the sender and receiver. If enough resources are not available, the quality of service may be disrupted and the connection may fail. If resources are reserved indiscriminately, then most of them would be unused and performance degradation would be the result. We would like to propose a pre-authenticated and adaptive micro-mobility management architecture in IP networks. We use pre-authentication to hasten the handoff process. Also the mobility predictor block used will help in reserving the resources aptly. The packets are generally classified based on the ToS field in IPv4 (or traffic class and the flow label fields in IPv6). Here we focus more on the special case of wireless local area networks (WLANs) installation within a building or in a restricted campus. In this paper, we propose a fast and adaptive IP micro mobility management scheme with mobility prediction for WLAN nodes. We also present some basic simulation on WLAN mobile node roaming","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Lassabe, P. Canalda, P. Chatonnay, F. Spies, Damien Charlet
{"title":"Positioning Awareness: an Essential Component for Mobile Multimedia Applications","authors":"F. Lassabe, P. Canalda, P. Chatonnay, F. Spies, Damien Charlet","doi":"10.1109/DFMA.2006.296916","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296916","url":null,"abstract":"The spreading of the WiFi networks allows new applications. New problems bound to the mobility of the terminals arise. In this article, we deal with the requirements and the solutions to address the service continuity in mobility. These requirements are integrated in mobility management middleware. It requires terminal positioning. The solution proposed is trilateration for which the distances are computed according to the signal strength. To provide the service continuity, the mechanism called handover is used. It requires an anticipation which is realized through mobility prediction. The handover is done transparently by an adapted protocol. All of these functions are implemented in GeoMoVie, the mobility component in a multimedia content streaming platform","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114107988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Radio Link Protocol for TCP Throughput Enhancement","authors":"M. Chatterjee, S. Ganguly","doi":"10.1109/DFMA.2006.296887","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296887","url":null,"abstract":"To support TCP-based multimedia services on cellular networks, radio link protocols (RLP) are usually used to shield the channel related losses from TCP. In this paper, we categorize the RLP frames obtained by fragmenting a single TCP segment as crucial and non-crucial, and propose that different forward error correcting (FEC) schemes be applied to them. We find the fraction that constitute the crucial frames. We consider preemptive transmissions i.e., retransmissions of dropped or corrupt frames are given priority over new frames. Through qualitative analysis we demonstrate that the proposed RLP performs better than the traditional ones. We also show how the TCP throughput is improved because of the new RLP","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CPU Usage Pattern Discovery Using Suffix Tree","authors":"Ooi Boon Yaik, C. Yong, F. Haron","doi":"10.1109/DFMA.2006.296889","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296889","url":null,"abstract":"In the dynamic resource-sharing environment, resource availability often varies from time to time. Resource prediction can be used to enhance scheduler effectiveness on their scheduling strategies and resource allocation. The prediction results can also be used by the applications to adjust themselves to suit the resource availability to get better performance. In this paper, we use a suffix tree to discover CPU usage patterns to find opportunities for exploiting the available CPU resources. We introduced a prediction strategy that uses discovered frequent patterns to predict CPU load. We defined that a CPU usage behavior as a set of CPU usage patterns. Our experiment results showed that CPU usage does exhibit certain behavior and our model is capable of discovering the usage and utilized it to perform prediction. The discovered patterns are interesting because some of the discovered cyclic patterns seem to be related to users' usage behaviour. In order to justify our model prediction capability, we compared our prediction model with the state-of-the-art methods such as Network Weather Services","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Secondary Structure in Medical Images using Wavelet and Watershed","authors":"A. Achuthan, M. Rajeswari, D. Ramachandram","doi":"10.1109/DFMA.2006.296898","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296898","url":null,"abstract":"Image segmentation is the most essential and crucial process in order to facilitate the delineation, characterization and visualization of structures of interests in medical images. In recent years, various methods of medical image segmentation have been employed depending on the type of tissues, anatomy of object of interest and imaging modality being used. In this paper, a novel problem specific segmentation method is proposed to detect secondary structures in medical images incorporating wavelet transform and watershed transformation. The proposed method consists of 5 stages: wavelet transformation, inter scale linking, feature calculation and clustering, morphological processing and watershed transformation. This paper presents the proposed method and preliminary results tested using computed tomography (CT) images of human anatomy. The preliminary experimental results of this research have shown encouraging results with elimination of over segmentation problem frequently faced in watershed transformation","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}