Automatic fine-grained area detection for thin client systems

نویسندگان

  • Bert Vankeirsbilck
  • Dieter Verslype
  • Nicolas Staelens
  • Pieter Simoens
  • Chris Develder
  • Bart Dhoedt
  • Filip De Turck
  • Piet Demeester
چکیده

The widespread availability of cloud infrastructures is fueling new interest in the thin client computing paradigm. However, current thin client protocols are not designed to handle new content types as often encountered in state-ofthe-art applications (e.g. multimedia editing, gaming, multimedia playback). Conveying this content using traditional thin client protocols typically results in a combination of excessive resource usage and low visual quality. In this paper, we propose an approach where the content type can vary for different portions of the screen (e.g. combination of static text and video). Once the different content types have been detected, each of them can be encoded using the most appropriate algorithm. We present two algorithms for this runtime detection. The first algorithm is operating at the pixel level, thereby being independent of the actual thin client protocol used. The second algorithm assumes the presence of a rectangle-based thin client protocol (such as the popular VNC protocol), trading independence for improved performance. The appropriate parameter settings for these algorithms are experimentally determined. Furthermore, their influence is studied in detail in terms of detection accuracy, and the time to perform the algorithms is analysed. Accurate hints are derived within less than 10 ms, indicating the high potential of this approach for use in next generation thin client systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Study on Fine-Grained Replications of Distributed Java Applications

In distributed object systems, object-oriented (OO) applications are replicated from remote servers to client sites to improve performance, scalability, and availability. This study focuses on fine-grained replications of distributed OO applications. Unlike the traditional replication scheme by which a self-contained application is replicated entirely at once, the finegrained replication scheme...

متن کامل

Contribution à la parallélisation de méthodes numériques à matrices creuses skyline. Application à un module de calcul de modes et fréquences propres de Systus

Distributed memory machines consisting of multiple autonomous processors connected bya network are becoming commonplace. Unlike specialized machines like systolic arrays, such systems ofautonomous processors provide virtual parallelism through standard message passing libraries {PVMor MPI). In the area of parallelizing existing numerical algorithms, two main approaches have been...

متن کامل

First Record of Fresh Water Gastropods and Sedimentary Facies of Nezam-Abad area, South-East Bam, Iran

Sediments of the Nezam-Abad area, south-east of Bam have been studied for the first time. Sedimentary facies are composed of thin-bedded clay, silt and fine grained sand interbedded with thin laminated limestone. Chemical analysis of X-Ray florescent indicates that more than 50% of sediments consist of silisium and aluminum oxide that can be used for reconstruction of environment. Ninety eight ...

متن کامل

Detection and Fine-Grained Classification of Cyberbullying Events

In the current era of online interactions, both positive and negative experiences are abundant on the Web. As in real life, negative experiences can have a serious impact on youngsters. Recent studies have reported cybervictimization rates among teenagers that vary between 20% and 40%. In this paper, we focus on cyberbullying as a particular form of cybervictimization and explore its automatic ...

متن کامل

Whole-system Fine-grained Taint Analysis for Automatic Malware Detection and Analysis

As malware is becoming increasingly sophisticated and stealthy, effective techniques for malware detection and analysis are imperative. Previous detection mechanisms are insufficient. Signature-based detection cannot detect new malware, and watch-point based behavioral detection can be evaded by stealthier design. Most previous analysis mechanisms are too coarse-grained to capture malware behav...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 35  شماره 

صفحات  -

تاریخ انتشار 2012