The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The classification of IP flows according to the application that generated them has become a popular research subject in the last few years. Several recent papers based their studies on the analysis of features of flows such as the packet size and inter-arrival time, which are then used as input to classification techniques derived from various scientific areas such as pattern recognition. In this...
In this paper, we propose a novel communication paradigm called group-oriented communication. Different from conventional unicast-based communications, group-oriented communication is entirely based on group-based communication. Our group-oriented communication is essentially a type of many-to- many communication, but it realizes any type of communications including one-to-one, one-to-many, many-to-one...
This paper introduces software architectures of streaming server and client, which can operate on both an Ethernet and IEEE1394 network for IEEE1394c-based in-home multimedia streaming service, and describes simulation results with Fast Ethernet and IEEE1394a. The emerging IEEE1394c specification allows its hardware physical layer to automatically detect and choose between gigabit Ethernet and IEEE1394b...
Connectivity is a basic quality of a network since it is required to obtain useful information out of the network. Research literature has mainly focused on the connectivity of wireless networks having a single connected network. However, due to diverse factors, it is feasible that a wireless network will have multiple base stations or sinks, i.e. it will have infrastructure. In this paper we analyze...
Wireless sensors are increasingly adopted in manufacturing and vehicular systems for monitoring critical components under continuous operation. Many such components move rapidly and frequently in metallic containments with challenging radio propagation characteristics. For wireless sensors mounted on rotating structures, previous studies identified an eminent increase in packet transmission errors...
We address the problem of modeling and adapting JPEG to the energy requirements of visual sensor networks (VSN). For JPEG modeling purposes, we develop a simplified high-level energy consumption model for each stage of JPEG-like scheme, which can be used to roughly evaluate the energy dissipated by a given visual sensor. This model is based on the basic operations needed at each stage of JPEG, and...
Whether interacting with a collaborative virtual environment, or CVE, locally or one networked across the Internet, any delay in the system can lead to a reduced sense of immersion. Input sensor delay and network delay are two common problems in CVE design that can be overcome with the application of prediction algorithms to the system. The purpose of this experiment was to assess the quality of feed...
In this paper, we consider distributed estimation in energy-limited wireless sensor networks from lifetime-distortion perspective, where the goal is to maximize the network lifetime for a given distortion requirement. To take into account both local quantization and multi-hop transmission, which are essential to save transmission energy and thus prolong the network lifetime, the network lifetime maximization...
In this paper we present the difficulties involved in recognizing pitch-shifted audio, discussing its usage and implications. In the framework of audio fingerprinting techniques, we address the issue by proposing two complementary solutions, both of which can be exploited without affecting an existing reference database. As fingerprint algorithm, a well-known, robust method is employed in a modified...
Hybrid variable length coding (HVLC) was recently proposed as a novel entropy coding scheme for block-based image and video compression, which divides each transform block into low frequency (LF) region and high frequency (HF) region and codes them differently. To take advantage of the clustered nature of the nonzero coefficients in the LF region, a two-dimensional position and one-dimensional amplitude...
We present the CROWN (collaborative routing, scheduling and frequency assignment for wireless ad hoc networks) scheme. CROWN is a cross-layer optimization approach for spectrum-agile nodes to adjust their spectrum allocation and transmission scheduling according to the underlying traffic demands. Instead of choosing the optimal route based on predetermined transmission scheduling and frequency assignment...
Ultra-wide-band (UWB) is expected to enable highspeed short-range wireless connectivity of numerous devices in the consumer application space. It is also a very promising candidate technology for medical applications. However, a good understanding of the performance of the technology in the medical application environment is essential. In this paper, we present the results of the study on the effects...
We propose an efficient heuristic algorithm to rearrange multicast trees proactively in delay constrained dynamic membership multicast networks. The objective is to construct low cost multicast tree with controlled number of disrupted members within a very short rearrangement time when a member joins and leaves the tree. In addition, a heuristic algorithm to obtain near-optimal solution to the problem...
We propose novel tree construction algorithms for multicast communication in photonic networks. Since multicast communications consume many more link resources than unicast communications, effective algorithms for route selection and wavelength allocation are required. We propose novel tree construction algorithms called the weighted Steiner tree (WST) algorithm and the composite weighted Steiner...
This paper presents a scheme for video transmission over wireless LANs based on an effective QoS model and channel state estimation (CSE). The proposed QoS model is able to effectively characterize the performance of video transmission over error prone wireless channels. Unlike existing schemes that use complicated metrics based on the actual distortion computed from decoded video frames, the proposed...
In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer network to compute the trust values of other peers in these networks. According to our model, the trust value of a peer is the probability that this peer sends correct messages to other peers, provided that this probability is at...
We discuss the effect of physical impairments on manycasting service over optical burst-switched (OBS) networks. Signal quality degradation in manycast networks is an important issue and it can occur due to fiber attenuation, splitter switch, and amplified spontaneous noise in EDFA. These physical layer impairments causes the signal quality to be weak at the receiver and hence burst may not be detected...
With the advent of multimedia applications over wireless local area networks (WLANs), the IEEE 802.11e standard was proposed to incorporate quality of service (QoS) parameters in the medium access control (MAC) layer. It has been found through previous research work that the throughput of transport control protocol (TCP) is less when compared to that of User Datagram Protocol (UDP) in the IEEE 802...
We consider an optimization problem in wireless sensor networks (WSNs) that is to find a multicast tree rooted at the source node and including all the destination nodes such that the lifetime of the tree is maximized. While a recently proposed distributed algorithm for this problem guarantees to obtain optimal solutions, we show that its high message complexity may prevent such contribution from...
A mathematical model for analytical study of complete and partial channel allocation schemes is presented in this research paper. Expression for the queue length distribution has been analytically derived. The mathematical model can be used for analysis of multiple call categories like new calls, handoff calls, delay tolerant or delay sensitive calls. This adaptive mathematical model can be utilized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.