In live peer-to-peer streaming, a video stream is transmitted to a large population of viewers, through the use of the uplink bandwidth of participating peers. This approach overc...
Stream authentication methods usually impose overhead and dependency among packets. The straightforward application of state-of-the-art rate-distortion (R-D) optimized streaming t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G....
Meeting timing constraint is one of the most important issues for modern design automation tools. This situation is exacerbated with the existence of process variation. Current hi...
We consider streaming video content over an overlay network of peer nodes. Each of the nodes employs a mesh-pull mechanism to organize the download of data units from its neighbou...
We consider transmission scheduling by medium access control (MAC) protocols for energy limited wireless sensor networks (WSN) in order to maximize the network lifetime. Time-vary...