The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An Image acquisition device for a CMOS digital image sensor typically uses a high-performance processor or CPLD/FPGA. When the image is gray and its resolution is not high, MCU can be applied. There are many acquisition methods employed. This paper describes a binary image inquiry method based on the microcontroller Serial Peripheral Interface (SPI). Using the SPI interface can decrease requirements...
Service-oriented computing is an emerging commercial infrastructure paradigm, which lightens the burden of maintaining expensive computing facilities by customers. Through the virtualization and consolidation of resources, multiple networking-based technology services are implemented. However, service-oriented network virtualization for supporting Cloud computing suffered from system un-stability...
Chunk scheduling is one of the main challenges and one of the keys to success for mesh-based Peer-to-Peer (P2P) streaming applications. Several chunk scheduling strategies have been proposed to achieve dissemination at an optimal rate or at an optimal delay. DLc strategy selects the minimum scheduling deadline to achieve optimal delay performance under neighbor-hood restrictive environments. By careful...
Peer-to-Peer streaming systems (or P2P-TV) have been studied in the literature for some time, and are being considered as the most promising approach to deliver real-time video to large scale users over the Internet. Neighbor selection is one of the key components to construct overlay topology for P2P streaming system. The common QoS-awareness neighbor selection algorithms in existing overlay construction...
Software reverse engineering in embedded system is not convenient than it on the PC. There are many debugging and analysis software on the PC. In embedded systems, due to the diversity types of processors, it is difficult to make software tools using anywhere. However, the diversity types of processors also provide us with convenience. We can use some special features of the processors to complete...
Video surveillance becomes more and more popular as it is a high-tech method to protect personal safety and public property. Recently it is not the privilege of police and common people can view videos of many public places lively or by on-demand way. Traditional client-server based video streaming solutions incur expensive bandwidth provision cost on the server and are not scale well. Peer-to-Peer...
In order to compensate for functional defects or add new features of an embedded product, the designer need to continuously update the system program. With the development of network technology, the end-user can download the update program through the network and complete the update process. But for the unattended equipments, they are often used of automatic remote update. On-line programming function...
P2P technology is promising for large-scale content distribution over the Internet. Evaluating and analyzing new and existing algorithms and protocols is a key issue for developers of P2P systems. Simulation has become one of the most popular tools comparing to mathematical modeling, analytical modeling and real-time monitoring. In this paper, we overview the large number of P2P simulators developed...
In this paper, we present a receiver-based, bandwidth estimation rate control mechanism with content-aware probability retransmission to limit the burden on multimedia transmission congested network. Like the TCP friendly rate control (TFRC) protocol, we compute the sending rate as a function of the loss event rate and round-trip time. Considering the different importance of four distinct types of...
Boundary-scan technology is a popular design-for-test technology, which is used by some embedded chips by means of embedding special boundary scan cells inside the circuits. It allows the debugger to talk via a JTAG port directly to the IC's core. As more and more chips using the JTAG interface, the application of JTAG emulator becomes frequent. Commercial JTAG emulators using parallel port on the...
The success of peer-to-peer overlay multicast for media streaming depends on their scalability. However, as multicast functionality is pushed to autonomous, unpredictable end systems, significant performance loss can be resulted from their higher degree of churn when compared to routers. Data distribution path over an overlay consisting of unreliable peers is inherently subject to disturbances. Resilience...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.