Sciweavers

81 search results - page 14 / 17
» Authenticating real time packet streams and multicasts
Sort
View
JSAC
2007
97views more  JSAC 2007»
13 years 7 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
ICDM
2006
IEEE
124views Data Mining» more  ICDM 2006»
14 years 1 months ago
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering
Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. Howev...
Olivier Verscheure, Michail Vlachos, Aris Anagnost...
TELSYS
2008
70views more  TELSYS 2008»
13 years 7 months ago
On the traffic modeling of burst aggregation algorithms using video and data traces
We obtain analytically the delay per packet in a burst for the three burst aggregation algorithms: Time based, Burst Length based and mixed Time and Burst Length based, assuming r...
Xenia Mountrouidou
IMC
2009
ACM
14 years 2 months ago
Modeling user activities in a large IPTV system
Internet Protocol Television (IPTV) has emerged as a new delivery method for TV. In contrast with native broadcast in traditional cable and satellite TV system, video streams in I...
Tongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, J...
VTC
2010
IEEE
168views Communications» more  VTC 2010»
13 years 6 months ago
Cross-Layer Adaptive H.264/AVC Streaming over IEEE 802.11e Experimental Testbed
—In recent years, the rapid development of wireless communication allows us to enjoy more multimedia services via wireless network. However, due to lack of QoS support and charac...
Cheng-Han Mai, Yin-Cheng Huang, Hung-Yu Wei