Search results for "Latency"

showing 10 items of 135 documents

Hierarchical Parallelization of an H.264/AVC Video Encoder

2006

Last generation video encoding standards increase computing demands in order to reach the limits on compression efficiency. This is particularly the case of H.264/AVC specification that is gaining interest in industry. We are interested in applying parallel processing to H.264 encoders in order to fulfill the computation requirements imposed by stressing applications like video on demand, videoconference, live broadcast, etc. Given a delivered video quality and bit rate, the main complexity parameters are image resolution, frame rate and latency. These parameters can still be pushed forward in such a way that special purpose hardware solutions are not available. Parallel processing based on…

VideoconferencingComputer scienceComputationMessage passingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONParallel computingLatency (engineering)computer.software_genreVideo qualityFrame rateEncoderImage resolutioncomputerInternational Symposium on Parallel Computing in Electrical Engineering (PARELEC'06)
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments

2017

International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]mobility management protocolshandover latency[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSeamless vertical handover[INFO]Computer Science [cs][INFO] Computer Science [cs]IEEE 802.21 MIH
researchProduct

PV-Alert: Fog Computing based Architecture for Safeguarding Vulnerable Road Users

2018

High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emerging paradigm that has p…

[SPI]Engineering Sciences [physics]Low LatencyCrowd sensing[SPI] Engineering Sciences [physics]Pedestrian SafetyFog ComputingComputingMilieux_MISCELLANEOUSulnerable Road Users
researchProduct

Blockchain based Inter-domain Latency Aware Routing Proposal in Software Defined Network

2018

Border gateway protocol (BGP) version 4 is routing current Internet for more than 20 years. BGP is the only protocol that has proven its routing capability of such size network with continually growing nature. Although BGP is scalable and network layer reachability information it lacks quality of service metrics like latency. BGP routing decision algorithm uses as-path length between autonomous systems (AS) as main factor for most of its best-path calculations. Because of more affordable peering architectures as-path length is generally decreasing in worldwide internet network resulting in less efficient routes for real-time internet protocol traffic. This study proposes future internet arc…

business.industryInter-domainComputer scienceQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSlaw.inventionlawInternet ProtocolPeeringBorder Gateway ProtocolThe InternetLatency (engineering)businessSoftware-defined networkingComputer network2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

New client puzzle approach for DoS resistance in ad hoc Networks

2010

In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.

business.industryWireless ad hoc networkComputer scienceServerMathematicsofComputing_GENERALCryptographyDenial-of-service attackComputational problemLatency (engineering)businessQA76Computer network2010 IEEE International Conference on Information Theory and Information Security
researchProduct

Latency-Oblivious Distributed Task Scheduling for Mobile Edge Computing

2018

Mobile Edge Computing (MEC) is emerging as one of the effective platforms for offloading the resource- and latency-constrained computational services of modern mobile applications. For latency- and resource-constrained mobile devices, the important issues include: 1) minimize end-to-end service latency; 2) minimize service completion time; 3) high quality-of-service (QoS) requirement to offload the complex computational services. To address the above issues, a latencyoblivious distributed task scheduling scheme is designed in this work to maximize the QoS performance and goodput for the MEC services. Unlike most of the existing works, we consider the latency-oblivious property of different …

hajautetut järjestelmätComputer scienceGoodput02 engineering and technologymatkaviestinverkotScheduling (computing)mobiililaitteetedge computing0202 electrical engineering electronic engineering information engineeringpalvelimetschedulingLatency (engineering)Mobile edge computingta213processor schedulingbusiness.industrymobile handsetsQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsserverstask analysisquality of service020201 artificial intelligence & image processingbusinessMobile deviceComputer network
researchProduct

Widespread Decoding of Tactile Input Patterns Among Thalamic Neurons

2021

Whereas, there is data to support that cuneothalamic projections predominantly reach a topographically confined volume of the rat thalamus, the ventroposterior lateral (VPL) nucleus, recent findings show that cortical neurons that process tactile inputs are widely distributed across the neocortex. Since cortical neurons project back to the thalamus, the latter observation would suggest that thalamic neurons could contain information about tactile inputs, in principle regardless of where in the thalamus they are located. Here we use a previously introduced electrotactile interface for producing sets of highly reproducible tactile afferent spatiotemporal activation patterns from the tip of di…

integrative neurophysiologyCognitive NeuroscienceThalamusNeuroscience (miscellaneous)Biologyinformation processingtactilelcsh:RC321-57103 medical and health sciencesCellular and Molecular Neuroscience0302 clinical medicineDevelopmental NeurosciencethalamusmedicineLatency (engineering)lcsh:Neurosciences. Biological psychiatry. NeuropsychiatryOriginal Research030304 developmental biology0303 health sciencesNeocortexSensory stimulation therapyNeurophysiologymedicine.anatomical_structurenervous systemCuneate nucleusneurophysiologyNeuroscienceNucleus030217 neurology & neurosurgeryDecoding methodsNeuroscienceFrontiers in Systems Neuroscience
researchProduct

An Efficient Implementation of Parallel Parametric HRTF Models for Binaural Sound Synthesis in Mobile Multimedia

2020

The extended use of mobile multimedia devices in applications like gaming, 3D video and audio reproduction, immersive teleconferencing, or virtual and augmented reality, is demanding efficient algorithms and methodologies. All these applications require real-time spatial audio engines with the capability of dealing with intensive signal processing operations while facing a number of constraints related to computational cost, latency and energy consumption. Most mobile multimedia devices include a Graphics Processing Unit (GPU) that is primarily used to accelerate video processing tasks, providing high computational capabilities due to its inherent parallel architecture. This paper describes…

interpolation.General Computer Scienceparallel filtersComputer scienceGPUGpuGraphics processing unitLatency (audio)Parametric model02 engineering and technologycomputer.software_genre030507 speech-language pathology & audiology03 medical and health sciencesSoftware portabilityHRTF modeling0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceMultimediaparametric modelGeneral EngineeringTeleconferenceBinaural synthesis020206 networking & telecommunicationsVideo processingEnergy consumptioninterpolationInterpolationHrtf modelingScalabilityParallel filtersElectrónicaAugmented realitylcsh:Electrical engineering. Electronics. Nuclear engineering0305 other medical sciencelcsh:TK1-9971Mobile devicecomputerIEEE Access
researchProduct

Possible Contribution of T-pattern Detection and Analysis to the Study of the Behavioral Correlates of Afferent Inhibition.

2020

A pivotal tenet in modern behavioral sciences is that the study of behavior, in its most intimate structure, necessarily deals with time and, for this reason, behavioral dynamics are not intuitively perceivable and/or detectable (Eibl-Eibesfeldt, 1970). In reality, the possibility to describe a given behavior in terms of its structural/temporal features makes available new and detailed information otherwise unavailable. The aim of the present paper is to discuss the possible application of T-pattern detection and analysis, i.e., a multivariate approach specifically developed to describe the temporal structure of behavior, to the study of an important and still scantly investigated issue, na…

long-latency afferent inhibitionGeneral Neurosciencemedicine.medical_treatmentT-pattern analysiNeurophysiologyT-pattern analysisSettore BIO/09 - Fisiologia030227 psychiatrylcsh:RC321-571Transcranial magnetic stimulationshort-latency afferent inhibition03 medical and health sciencesPattern detectionafferent inhibition0302 clinical medicineEditorialAfferentBehavioral dynamicstranscranial magnetic stimulationmedicineTPAPsychologyNeurosciencelcsh:Neurosciences. Biological psychiatry. Neuropsychiatry030217 neurology & neurosurgeryBrain sciences
researchProduct