The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: Internet technologies; multimedia over wireless networks; coding and channel estimation; routing and mobility; multicast routing; security and privacy.
The following topics are dealt with: audio processing; speech processing; security; fingerprinting based multimedia content management; virtual reality signal processing; video coding; joint source channel coding; and quality evaluation.
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
In developed countries, technical service system is a basic national policy of the government. As China's economic and social progress, government's service capability is more strengthen, a variety of departments provide related services for the trade or industry. The MVC design model is composed of Data layer, Page layer and Control layer. Through the example of e-service application system for local...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Due to the resource constraints, pre-distribution secrets keys into sensor nodes before they are deployment are an applicable approach. Several key pre-distribution schemes have been proposed in literature to establish pairwise keys between sensor nodes. However, as the...
In this paper, we introduce an IP multimedia sub-system (IMS) based testbed which provides a platform for the study of real-time services integration and orchestration. This open-source based testbed is built on the principle of service oriented architecture (SOA), with an emphasis for real-time network services. We further developed service-oriented system functionalities such as optical network...
Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in next generation networks. Related research work is being carried out for years, and various service composition approaches have been proposed by different standardization organizations and companies catering to different network requirements...
The following topics are dealt with: power systems; media processing; circuits; wireless communications; computational intelligence; renewable energy sources; wired networks; pattern recognition; computing architectures; software systems; database systems; signal processing; power electronics; optical communication; VLSI systems; traffic control; network security; and design automation.
Over the last three years, mobile handsets have evolved from voice based services to multimedia terminals that is gradually leading towards a new era of consumer entertainment, fostered by mobile communications and consumer networks. The need for mobile digital rights management solutions is thus intensified in order to safeguard mobile media content. Various types of content protection solutions...
In the applications of multimedia communication, besides the content-based authentication, the user authentication is also an important issue to protect the multimedia resources. In this paper, we improve a fingerprint-based remote user authentication proposed by Lee, Ryu and Yoo (Electron. Lett., vol. 38, no. 12, pp. 554-555, 2002). The scheme is novel by introducing a fingerprint-based verification...
Copyright protection of digital contents, as one of the most important application of digital watermarks, works by watermark verification. In traditional watermark authentication schemes, a prover exposed a watermark to be present in a digital data to the possible dishonest verifier. However, a potential attacker is able to spoil or remove the watermark entirely once classified information like the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.