نتایج جستجو برای: broadcast application

تعداد نتایج: 788973  

2011
Yu Cao Amir H. Banihashemi Minhua Ding Xin Guan Luis Gurrieri Leon Lee Guangping Li Patrick Li

Rateless codes, also known as fountain codes, are a class of erasure error-control codes that are particularly well suited for broadcast/ multicast systems. Raptor codes, as a particularly successful implementation of digital fountain codes, have been used as the applicationlayer forward error correction (FEC) codes in the third generation partnership program (3GPP) Multimedia Broadcast and Mul...

2006
Yu Zou Min Hou Yudong Chen Fengguo Hu Li Fu

The main purpose of this paper is the exploitation and application of an audio and video bimodal corpus of the Chinese language in broadcasting. It deals with the designation of the size and structure of speech samples according to radio and television program features. Secondly, it discusses annotation method of broadcast speech with achievements made and suggested future improvements. Finally...

2006
Wei Chen

This paper introduces the specification of abortable consensus in message passing systems with prob-abilistic message delivery behaviors to address the tradeoff between progress and agreement in asyn-chronous consensus. The paper presents an abortable consensus algorithm, proves its correctness, andshows how to configure the parameters of the algorithm to satisfy the explicit re...

2005
Hrvoje Jenkač Joachim Hagenauer Timo Mayer

Reliable wireless broadcast with asynchronous data access based on fountain coding is investigated. We review the traditional problem formalization for fountain codes operating on erasure channels and we generalize the problem formalization to arbitrary types of channels. We introduce a novel type of rateless codes based on the turbo principle: the Turbo-Fountain. The TurboFountain is able to c...

Journal: :Inf. Process. Lett. 1999
Douglas R. Stinson Ruizhong Wei

2005
Joonsang Baek Reihaneh Safavi-Naini Willy Susilo

In this paper, we construct an efficient “multi-receiver identity-based encryption scheme”. Our scheme only needs one (or none if precomputed and provided as a public parameter) pairing computation to encrypt a single message for n receivers, in contrast to the simple construction that re-encrypts a message n times using Boneh and Franklin’s identity-based encryption scheme, considered previous...

2007
Jari Porras Veikko Hara Jarmo Harju Jouni Ikonen

In this paper the logical process structure of the Chandy-Misra parallel simulation algorithm has been studied. The excessive synchronization caused by the algorithm is avoided by minimizing the number of connections between logical processes. The amount of connections are reduced by restricting the direct communication of the logical processes to their neighborhoods. Two methods, message path ...

Journal: :Computer Communications 2003
Marius Portmann Aruna Seneviratne

Recently, there has been a growing interest in peer-to-peer networks, sparked by the popularity of file sharing applications such as Napster and Gnutella. A typical characteristic of a peer-to-peer system is that all the nodes are equal participants in the network. Gnutella is an example of a ‘pure’ peer-to-peer system, being fully distributed where all nodes are equal and no special nodes with...

Journal: :The Journal of The Institute of Image Information and Television Engineers 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید