2008 2nd International Conference on Internet Multimedia Services Architecture and Applications最新文献

筛选
英文 中文
Real time error concealment in H.264 video decoder for embedded devices
A. Kale, V. Hampiholi
{"title":"Real time error concealment in H.264 video decoder for embedded devices","authors":"A. Kale, V. Hampiholi","doi":"10.1109/IMSAA.2008.4753906","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753906","url":null,"abstract":"Transmission of compressed video over unreliable network is an interesting topic of research. As compression is inversely proportional to data redundancy. Highly compressed data are hence more susceptible to errors. This paper discusses error recovery and concealment techniques for H.264/AVC baseline profile decoder, where bandwidth, decoder performance and memory are critical constraints for real time implementation. This paper proposes a technique which gives improved perceptual concealment without affecting the decoder performance and its memory requirement. The technique is based on novel algorithm which uses the available features in H.264 standard to perform concealment, with minimal pre-processing. Comparison of the novel algorithm has been made with the error concealment capability of JM 13.2 reference software.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126122614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Centralized Service Capability Interaction Manager (SCIM) architecutre to support dynamic-blended services in IMS network 集中式服务能力交互管理器(SCIM)体系结构,支持IMS网络中的动态混合服务
R. Goveas, R. Sunku, D. Das
{"title":"Centralized Service Capability Interaction Manager (SCIM) architecutre to support dynamic-blended services in IMS network","authors":"R. Goveas, R. Sunku, D. Das","doi":"10.1109/IMSAA.2008.4753933","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753933","url":null,"abstract":"Major success factor for the futuristic IP Multimedia Subsystem (IMS) based network is dynamically delivering a blend of one or more services simultaneously to the end-users based on their preferences and context. Such blended services, can range from triple play to dynamic context based services. To deliver such services 3GPP introduces a functional block called SCIM (service capability interaction manager). SCIM works at the service delivery layer and provides a capability to interact across various service capabilities and thereby enabling a framework to deliver a blended service. However to the best of authorspsila knowledge 3GPP has not detailed the roles and responsibilities of SCIM though it has envisioned its need. Moreover, the architectural details (distributed and centralized) of SCIM are kept open for finalization by scientific community or organization-based. In this paper, authors have presented a novel internal architecture for a centralized-SCIM to cater the needs of blended services in IMS networks. Authors study the proposed SCIM architecture by demonstrating a dynamic blended service. In this approach a blended service is represented in the form of an acyclic service graph where each node in the graph represents a service capability. Centralized-SCIM would choose one of the paths in the service graph dynamically resulting in delivering blended service. To demonstrate such functionality a typical use case related to a media, entertainment and content provider enterprise have been chosen. The call flow diagram for the proposed use case has been discussed.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127605698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Access point selection before attaching to foreign network for mobile networks 移动网络连接到国外网络前的接入点选择
Lu Li-hua, Li Yuan-An, Wang Qiu-Tian
{"title":"Access point selection before attaching to foreign network for mobile networks","authors":"Lu Li-hua, Li Yuan-An, Wang Qiu-Tian","doi":"10.1109/IMSAA.2008.4753923","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753923","url":null,"abstract":"Extended from mobile IPv6, NEMO basic support protocol provides mobility management for whole moving networks, but results in suboptimal routing and long handover latency. When multiple MRs connect to each other and form a hierarchical nested mobile network, suboptimal problem is exacerbated. To optimize routing, access point selection(APS) solution is proposed to prevent mobile network from high level nesting. By extending router advertisement message with new options, mobile router can get link information and choose most appropriate access point to attach based on its preference when entering foreign networks. After access point selection, route optimization can be provided to mobile network.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"58 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132604626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VoIP service continuity across HRPD and 3G-1x networks 跨HRPD和3G-1x网络的VoIP业务连续性
K. Satish, H.C. Warrier
{"title":"VoIP service continuity across HRPD and 3G-1x networks","authors":"K. Satish, H.C. Warrier","doi":"10.1109/IMSAA.2008.4753913","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753913","url":null,"abstract":"Service continuity is an important aspect as the existing circuit-based networks evolve towards packet based 3G networks and beyond. VoIP is considered to be the major application in the evolved networks to low cost voice and advance services. This paper discusses the issues surrounding VoIP service continuity, with a 3G-1x network overlaid with HRPD in perspective. Due to deployment considerations, border areas are created between the technologies, wherein VoIP services in the HRPD network have to be seamlessly handed-over to circuit-voice call in the 3G-1x network. This paper explains a mechanism that has been evolved to ensure that VoIP service continuity is maintained across HRPD and 3G-1x networks.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VPN solution for securing voice over third generation networks VPN解决方案,用于在第三代网络上保护语音
W. B. Diab, S. Tohmé
{"title":"VPN solution for securing voice over third generation networks","authors":"W. B. Diab, S. Tohmé","doi":"10.1109/IMSAA.2008.4753921","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753921","url":null,"abstract":"The main idea of the third generation (3G) networks is to merge two of the most important communication systems: cellular networks and Internet. The IP multimedia subsystem (IMS) defined by 3GPP is a technology designed to provide robust multimedia services across roaming boundaries and over diverse access technologies. In this communication converged world, the challenging issues are security and quality of service. This article presents a solution for securing multimedia traffic over 3G networks using an IPSec-based end-to-end virtual private network (VPN). It provides end-to-end security for real-time traffic while guaranteeing the performance and quality of services without reducing the effective bandwidth. Furthermore, this solution provides seamless and fast handover with minimum QoS degradation.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125342779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A security evaluation of IMS deployments IMS部署的安全评估
Frank S. Park, Devdutt Patnaik, Chaitrali Amrutkar, Michael T. Hunter
{"title":"A security evaluation of IMS deployments","authors":"Frank S. Park, Devdutt Patnaik, Chaitrali Amrutkar, Michael T. Hunter","doi":"10.1109/IMSAA.2008.4753937","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753937","url":null,"abstract":"The IP multimedia subsystem (IMS) portends major changes for all parties involved in the exchange of digital content and services. As the IMS architecture moves from specifications to implementations, real-world considerations can influence deployments in ways that have noteworthy security implications. In this work, we present and exemplify a systematic security evaluation of IMS deployments using a threat modeling approach. We also offer suggestions for possible mitigations where appropriate. The experiments conducted are on a production-class IMS deployment and a separate IMS testing environment.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127527922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Designing the Rating Function of 3GPP Online Charging System for IP Multimedia Subsystem IP多媒体子系统3GPP在线收费系统的收费功能设计
H. Oumina, Daniel Ranc
{"title":"Designing the Rating Function of 3GPP Online Charging System for IP Multimedia Subsystem","authors":"H. Oumina, Daniel Ranc","doi":"10.1109/IMSAA.2008.4753917","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753917","url":null,"abstract":"The main function of a rating function in an online charging system is to perform real-time calculations of the tariff. In the context of the IP multimedia subsystem, and the consequent revolution in terms of services and applications, quality of service and network performance play an important role in application delivery and user experience. Consequently, a rating function that integrates these new parameters is important to address the challenge of an accurate real-time charging of applications in IP multimedia subsystem environments. The present contribution suggests an approach for modeling rating functions in the online charging system of IMS. Furthermore it defines the interactions between the rating function and service elements and network elements and business actors.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure and anonymous electronic commerce protocol over a public network 在公共网络上安全、匿名的电子商务协议
V. V. Das
{"title":"Secure and anonymous electronic commerce protocol over a public network","authors":"V. V. Das","doi":"10.1109/IMSAA.2008.4753930","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753930","url":null,"abstract":"Fair exchange and customerpsilas anonymity are the two important properties of any electronic commerce protocol. However most of the existing protocols have missed this focus and a few have any one of this but not both. This paper proposes a secure and efficient electronic commerce protocol that ensures fair exchange and customerpsilas anonymity for any digital transaction over the public network. The new protocol is designed in such a way that it covers all the transaction process starting from negotiation and registration, withdrawal and transfer of electronic cash, purchase, and arbitration phase. The proposed protocol is superior to the related previous protocols in the area of electronic cash management, key management, communication round, and computational cost.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134559817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a recommender system for mobile tourism multimedia selection 手机旅游多媒体选择推荐系统的设计
R. Biuk-Aghai, Simon Fong, Yain-Whar Si
{"title":"Design of a recommender system for mobile tourism multimedia selection","authors":"R. Biuk-Aghai, Simon Fong, Yain-Whar Si","doi":"10.1109/IMSAA.2008.4753931","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753931","url":null,"abstract":"Applications that deliver multimedia content to and display such content on mobile devices have become increasingly common in recent years. When faced with a large amount of content, unfamiliar users can make use of each otherspsila recommendations, through recommender systems, to find content of interest to them. As a case in point we present the design of a recommender system that can be used by tourists to request a travel itinerary, and subsequently browse multimedia content for each recommended tourist spot. The techniques combined in our recommender system include genetic algorithms and fuzzy logic. Recommendations are chosen to match a user profile based on a userpsilas personal preferences. Our system design has wide applicability in multimedia systems where the user requires assistance in content selection.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122541714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Using context transfer mechanisms to Improve Mobile IMS-IPv6 Handover Latency and QoS provisioning 使用上下文传输机制改善移动IMS-IPv6切换延迟和QoS提供
R. Farahbakhsh, N. Movahhedinia
{"title":"Using context transfer mechanisms to Improve Mobile IMS-IPv6 Handover Latency and QoS provisioning","authors":"R. Farahbakhsh, N. Movahhedinia","doi":"10.1109/IMSAA.2008.4753926","DOIUrl":"https://doi.org/10.1109/IMSAA.2008.4753926","url":null,"abstract":"The growing demand for wireless and mobile services has set the recent research sights on mobility support and QoS provisioning for next generation IPv6 networks. To provide seamless communications for such networks, fast mobile IPv6 (FMIPv6) and hierarchical mobile IPv6 (HMIPv6) has been proposed. Moreover, 3GPP has introduced IP multimedia subsystem (IMS) as the next generation IP based infrastructure for multimedia services convergence. In this paper, to Improve mobile IMS-IPv6 handover latency and QoS provisioning we present two context transfer scheme, predictive and reactive, to negotiate QoS parameters and reserve resources along the handover. The proposed schemes improve the service quality. The performances of the proposed mechanisms are evaluated by analysis.","PeriodicalId":393607,"journal":{"name":"2008 2nd International Conference on Internet Multimedia Services Architecture and Applications","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114861294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信