Scalable and robust streaming video system challenges
| Main Authors: | Khalifa, Othman Omran, Issa, Sinzobakwira, Siddiqi, Mohammad Umar |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21312/ http://irep.iium.edu.my/21312/1/2.pdf |
Similar Items
Development of a scalable video compression algorithm
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Multilayers fast mode decision algorithms for scalable video coding
by: Gunawan, Teddy Surya, et al.
Published: (2011)
by: Gunawan, Teddy Surya, et al.
Published: (2011)
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
Opportunistic and playback-sensitive scheduling for video streaming
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2014)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2014)
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Resource allocation technique for video streaming applications in the LTE system
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2010)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2010)
Video streaming performance under wellknown packet scheduling algorithms
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2011)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2011)
Impact of CQI feedback rate/delay on scheduling video streaming services in LTE downlink
by: Basukala, Riyaj, et al.
Published: (2010)
by: Basukala, Riyaj, et al.
Published: (2010)
Human detection and tracking for video surveillance system
by: Shafie, Amir Akramin, et al.
Published: (2010)
by: Shafie, Amir Akramin, et al.
Published: (2010)
Impact of outdated CQI report on adapted well-known packet scheduling algorithm when streaming video
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2015)
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2015)
Investigative analysis of clustering routing protocols for scalable sensor networks
by: Salami, A. F., et al.
Published: (2011)
by: Salami, A. F., et al.
Published: (2011)
Privacy and technology: implications and challenges
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
by: Mohammed Jama, Abdi Risaq, et al.
Published: (2009)
Energy-efficient scalable routing protocol based on ACO for WSNS
by: Sharmin, Afsah, et al.
Published: (2019)
by: Sharmin, Afsah, et al.
Published: (2019)
Reliability evaluation of scalable complex networks through delta-star conversion
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2008)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2008)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Optimal biphase sequences with large linear complexity derived from sequences over Z4
by: Udaya, Paramapalli, et al.
Published: (1996)
by: Udaya, Paramapalli, et al.
Published: (1996)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Evaluating average throughput for quantity of data stream in an NDN rendezvous server
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994)
by: Rajan, Sundar B., et al.
Published: (1994)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
Wireless communications for electric system automation
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Analysis of real time video traffic for enhanced distributed channel access over WLAN
by: Jama, Abdirisaq Mohammed, et al.
Published: (2013)
by: Jama, Abdirisaq Mohammed, et al.
Published: (2013)
Performance evaluation of AODV ,OLSR, and GRP for
transmitting video conferencing over MANETs
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
by: Ahmed, Diaa Eldin Mustafa, et al.
Published: (2020)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
Optimal power allocation for the proposed asymmetric turbo code for 3G systems
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
Similar Items
-
Development of a scalable video compression algorithm
by: Khalifa, Othman Omran, et al.
Published: (2012) -
Multilayers fast mode decision algorithms for scalable video coding
by: Gunawan, Teddy Surya, et al.
Published: (2011) -
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
by: Maarif, Haris Al Qodri, et al.
Published: (2011) -
Opportunistic and playback-sensitive scheduling for video streaming
by: Mohd. Ramli, Huda Adibah, et al.
Published: (2014) -
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010)