By Topic

The 2nd International Conference on Distributed Frameworks for Multimedia Applications

15-17 May 2006

Filter Results

Displaying Results 1 - 25 of 45
  • [Front cover]

    Publication Year: 2006, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (488 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (226 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (420 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Advertisements]

    Publication Year: 2006, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (264 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • [Commentary]

    Publication Year: 2006, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (409 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contributor Listings

    Publication Year: 2006
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):viii - x
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • A Novel Radio Link Protocol for TCP Throughput Enhancement

    Publication Year: 2006, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5924 KB) | HTML iconHTML

    To support TCP-based multimedia services on cellular networks, radio link protocols (RLP) are usually used to shield the channel related losses from TCP. In this paper, we categorize the RLP frames obtained by fragmenting a single TCP segment as crucial and non-crucial, and propose that different forward error correcting (FEC) schemes be applied to them. We find the fraction that constitute the cr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-Agent Negotiation System Using Adaptive Fuzzy Logic in Resource Allocation

    Publication Year: 2006, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3907 KB) | HTML iconHTML

    This paper addresses the multi-agent system (MAS) with negotiation capability using an artificial intelligent (AI) approach - adaptive fuzzy logic (AFL) - in learning the behavior of other agents when allocating resources. The learning continues during each reasoning process on the subsequent reaction of negotiants. We present the results of multi-agent negotiation with multi-issue (e.g. price, ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CPU Usage Pattern Discovery Using Suffix Tree

    Publication Year: 2006, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6529 KB) | HTML iconHTML

    In the dynamic resource-sharing environment, resource availability often varies from time to time. Resource prediction can be used to enhance scheduler effectiveness on their scheduling strategies and resource allocation. The prediction results can also be used by the applications to adjust themselves to suit the resource availability to get better performance. In this paper, we use a suffix tree ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Distributed Noise Canceling

    Publication Year: 2006, Page(s):1 - 7
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1995 KB) | HTML iconHTML

    This paper tackles the issues which arise when the process of porting conventional algorithms, especially signal processing ones, from their normal centralized form to a parallel distributed form is undertaken. It deals specifically with those all too familiar issues particular to wireless sensor networks of limited power, memory, computational capabilities, and bandwidth. What is the proper appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability study of ad-hoc wireless mobile network routing protocol in sparse and dense networks

    Publication Year: 2006, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6403 KB) | HTML iconHTML

    Ad-hoc wireless mobile network is formed by multiple mobile nodes connected to each other requiring no access point. Every mobile node is a host as well as a router. Nodes are able to communicate with neighboring nodes either one hop away or a few hops away from the source node. In order to allow the pair of nodes that are a few hops away to communicate, the data is relayed through intermediate no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Screening of Diabetic Retinopathy - Automatic Segmentation of Optic Disc in Colour Fundus Images

    Publication Year: 2006, Page(s):1 - 7
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4549 KB) | HTML iconHTML

    In this paper, a novel approach to automatically segment the optic disc contour using the center point of an optic disc candidate is proposed. The optic disc segmentation algorithm consists of 2 stages. The first stage involves the removal of blood vessels that obscure the optic disc. The blood vessel structures are detected using morphological operations. These detected structures are then remove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • L2/OPN design and dynamic TCP manage for Grid High Performance network

    Publication Year: 2006, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3052 KB) | HTML iconHTML

    As the Internet is widely used, high performance networks and systems prompts appearance of various applications and the appearance requests higher capacity resources. Recently, studies on grid are actively conducted to reorganize each computing resource, which used to be scattered for each application requesting these high capacity calculation resources, into a virtual high capacity resource by c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Light P2P platform of computing for DAG

    Publication Year: 2006, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3049 KB) | HTML iconHTML

    HiPoP is a P2P platform of computing specialized in the execution of applications as DAG (directed acyclic graph). This platform works in an heterogeneous environment and relies on the portability of the JAVA language. HiPoP performances are compared to Condor and show an ease of use and good performances. The security of our system is based on the concept of sandboxing View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Admission Control for TDD-CDMA

    Publication Year: 2006, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3153 KB) | HTML iconHTML

    The TDD-CDMA system with unbalanced slot allocation between uplink (UL) and downlink (DL) is useful for the traffic asymmetry, but the unbalanced slot will lead to cross-slot interference. This paper proposes a novel admission control algorithm for TDD-CDMA in order to decrease the cross-slot interference. The novel admission control deal with each user in different slots: for user with high trans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi Agent System-based crawlers for Virtual Organizations

    Publication Year: 2006, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5110 KB) | HTML iconHTML

    Grid computing technology is a new field which focuses on large-scale resource sharing. The grid concept is coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations (VO). In this dynamic and geographically dispersed setting, information services are regarded as a vital component of the grid infrastructure. Grid Information Services (GIS) address the ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Consistency Management Protocols Over a Communication Management Protocol

    Publication Year: 2006, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5182 KB)

    In collaborative environments, sharing notion is everywhere. Concurrency management protocols become very important. We have defined the Chameleon protocol which allows us to obtain a dynamic management of the collaborative architecture on the one hand, and on the other hand, we have improved our consistency management protocol and rendered it optimistic: the Pilgrim and the Optimistic Pilgrim. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Secondary Structure in Medical Images using Wavelet and Watershed

    Publication Year: 2006, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2884 KB) | HTML iconHTML

    Image segmentation is the most essential and crucial process in order to facilitate the delineation, characterization and visualization of structures of interests in medical images. In recent years, various methods of medical image segmentation have been employed depending on the type of tissues, anatomy of object of interest and imaging modality being used. In this paper, a novel problem specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Systems Modeling, Example of a Cooperative e-maintenance System

    Publication Year: 2006, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5298 KB) | HTML iconHTML

    Cooperation is an efficiency factor in many activities like design, medicine or maintenance. Several researches try to optimize cooperation activity by using tools or algorithms designed to enhance human interaction. Few researches are made on conceptual cooperation modeling. However, industrials want to compare different algorithms, organizations or cooperation modes. It is also useful to represe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pre-Authenticated and Adaptive IP Mobility for WLAN nodes

    Publication Year: 2006, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7179 KB) | HTML iconHTML

    When a mobile node roams to another network/subnet, new resource reservation has to be made between the sender and receiver. If enough resources are not available, the quality of service may be disrupted and the connection may fail. If resources are reserved indiscriminately, then most of them would be unused and performance degradation would be the result. We would like to propose a pre-authentic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Video Transmission Framework Using Components and Multi-Agent Systems

    Publication Year: 2006, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4623 KB) | HTML iconHTML

    This paper presents an application of video transmission over Internet, which goal is to be used in a cooperative platform. This application uses proxies during the transmission to adapt the video (changing the size, the frame rate and/or the encoding format). Adaptation is a necessity in this kind of application, due to the diversity of receivers (computers, mobile phones, PDA...). During the des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TEMIC: a New Cooperative Platform for Industrial Tele-Maintenance

    Publication Year: 2006, Page(s):1 - 9
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7265 KB) | HTML iconHTML

    Since the year 2000, the performances that are obtained from the point of view of the networks processors make it possible to use real distribution applications. Particularly, in remote maintenance domain, the network quality makes it possible to have several expertises readily available. As a result, the quality of maintenance increases as it becomes faster, more reliable and highly efficient. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.