Sciweavers

13476 search results - page 129 / 2696
» Learning from Streams
Sort
View
CUZA
2010
150views Cryptology» more  CUZA 2010»
15 years 23 days ago
Symbolic Synthesis of Mealy Machines from Arithmetic Bitstream Functions
In this paper, we describe a symbolic synthesis method which given an algebraic expression that specifies a bitstream function f, constructs a (minimal) Mealy machine that realise...
Helle Hvid Hansen, Jan J. M. M. Rutten
141
Voted
MM
2009
ACM
163views Multimedia» more  MM 2009»
15 years 10 months ago
ISP-friendly peer selection in P2P networks
Peer-to-peer (P2P) multicast is a scalable solution adopted by many video streaming systems. However, a prevalence of P2P applications has caused heavy traffic on the Internet. W...
Zhijie Shen, Roger Zimmermann
ISW
2007
Springer
15 years 9 months ago
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
NLS is a stream cipher which was submitted to eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called as Crossword Puzzle at...
Joo Yeon Cho, Josef Pieprzyk
ICMCS
2005
IEEE
130views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Rate-Distortion Optimized Bandwidth Adaptation for Distributed Media Delivery
We propose a framework for rate-distortion optimized bandwidth adaptation via packet dropping at a network node, when the incoming traffic at the node consists of multiple video ...
Jacob Chakareski, Pascal Frossard
ICN
2005
Springer
15 years 9 months ago
Client-Controlled QoS Management in Networked Virtual Environments
In this paper, we propose an architecture to regulate the bandwidth usage of multimedia streams in networked virtual environments. In this architecture, intelligent proxies are pla...
Patrick Monsieurs, Maarten Wijnants, Wim Lamotte