首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
To provide a secure traversal service, firewalls need more than static packet filtering and application-level proxies. SOCKS (Secure sOCKets) is an application-independent transport-level proxy that offers user-level authentification and data encryption. An extended SOCKS UDP (user datagram protocol) binding model with appropriate socket calls is proposed to provide complete support for UDP-based multimedia streaming applications  相似文献   

2.
Multimedia Tools and Applications - Through the rapid evolution of information technology, there are many innovative services and products bring a lot of convenience for people especially...  相似文献   

3.
In nowadays World Wide Web topology, it is not difficult to find the presence of proxy servers. They reduce network traffic through the cut down of repetitive information. However, traditional proxy server does not support multimedia streaming. One of the reasons is that general scheduling strategy adopted by most of the traditional proxy servers does not provide real-time support to multimedia services. Based on the concept of contractual scheduling, we have developed a proxy server that supports real-time multimedia applications. Moreover, we developed the group scheduling mechanism to enable processing power transfer between tasks that can hardly be achieved by traditional schedulers. They result in a substantially improved performance particularly when both time-constrained and non-time-constrained processes coexist within the proxy server. In this paper, the design and implementation of this proxy server and the proposed scheduler are detailed. Wai-Kong Cheuk received the B.Eng. (Hons.) and M. Phil. degrees in 1996 and 2001, respectively, from the Hong Kong Polytechnic University, where he is currently pursuing the Ph.D. degree. His main research interests include distributed operating systems and video streaming. Tai-Chiu Hsung (M'93) received the B.Eng. (Hons.) and Ph.D. degrees in electronic and information engineering in 1993 and 1998, respectively, from the Hong Kong Polytechnic University, Hong Kong. In 1999, he joined the Hong Kong Polytechnic University as a Research Fellow. His research interests include wavelet theory and applications, tomography, and fast algorithms. Dr. Hsung is also a member of IEE. Daniel Pak-Kong Lun (M'91) received his B.Sc. (Hons.) degree from the University of Essex, Essex, U.K., and the Ph.D. degree from the Hong Kong Polytechnic University, Hung Hom, Hong Kong, in 1988 and 1991, respectively. He is currently an Associate Professor and the Associate Head of the Department of Electronic and Information Engineering, the Hong Kong Polytechnic University. His research interests include digital signal processing, wavelets, multimedia technology, and Internet technology. Dr. Lun was the Secretary, Treasurer, Vice-Chairman, and Chairman of the IEEE Hong Kong Chapter of Signal Processing in 1994, 1995–1996, 1997–1998, 1999–2000, respectively. He was the Finance Chair of 2003 IEEE International Conference on Acoustics, Speech and Signal Processing, held in Hong Kong, in April 2003. He is a Chartered Engineer and a Corporate member of the IEE.  相似文献   

4.
The design and implementation of a secure auction service   总被引:1,自引:0,他引:1  
We present the design and implementation of a distributed service for performing sealed bid auctions. This service provides an interface by which clients, or “bidders”, can issue secret bids to the service for an advertised auction. Once the bidding period has ended, the auction service opens the bids, determines the winning bid, and provides the winning bidder with a ticket for claiming the item bid upon. Using novel cryptographic techniques, the service is constructed to provide strong protection for both the auction house and correct bidders, despite the malicious behavior of any number of bidders and fewer than one third of the servers comprising the auction service. Specifically, it is guaranteed that: bids of correct bidders are not revealed until after the bidding period has ended; the auction house collects payment for the winning bid; losing bidders forfeit no money; and only the winning bidder can collect the item bid upon. We also discuss techniques to enable anonymous bidding  相似文献   

5.
The World Wide Web uses a naming scheme (URLs), transfer protocol (HTTP), and cache algorithms that are different from traditional network file systems. This makes it impossible for unmodified Unix applications to access the Web; as a result, the Web is only accessible to special Web‐enabled applications. Gecko bridges the gap between Web‐enabled applications and conventional applications, allowing any unmodified Unix application to access the Web. We developed two prototypes of the Gecko system at the University of Arizona and incorporated the many lessons learned from the first into the second. Minimizing the amount of state was a key goal of the Gecko redesign and the second prototype uses a unique compression technique to reduce server state. Experiments performed on the prototype show that Gecko not only makes the Web accessible to unmodified applications, but does so at a performance that meets or exceeds that of HTTP. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   

6.
7.
面向声音监测的多媒体传感器节点硬件设计与实现   总被引:3,自引:0,他引:3  
多媒体传感器网络能够采集和传输信息丰富的音频、视频、图像等多媒体信息,具有十分广泛的应用前景,是近年来无线传感器网络的研究热点。目前,国外多媒体传感器节点主要针对图像传输;国内使用的节点大多都难以满足多媒体信息处理和传输等方面的应用要求。本文针对鄱阳湖鸟类声音监测的应用,设计实现了一种新型的高性能多媒体传感器节点。实验结果表明,由该节点组成的多媒体传感器网络,能有效建立路由,实时地感知和采集网络覆盖区域内的多媒体信息。  相似文献   

8.
Parametric types offer an attractive solution to the problems of dealing with arrays in Pascal. These problems arise from the use of strong, static type checking, especially of array-type procedure arguments. Parametric types provide solutions both for the array procedure argument problem and allow the consistent inclusion of arrays with dynamic bounds. A parametric type mechanism is proposed and design issues are discussed. The inclusion of parametric types has major effects on the implementation of a language like Pascal. The implementation issues and implementation versus design tradeoffs are examined. The implementation strategy used can be extended to accommodate the standard and generic types in Ada.  相似文献   

9.
Mobile cloud is not just a traditional cloud, but a concept of virtualization that has expanded into mobile technology. It provides access to the data created and used by a user and content service by cloud platform. A feature of mobile cloud is supported that is the convenience of multimedia content sharing by mobile devices. However, there is a problem of inaccuracy of information retrieval in the process of sharing as well as personal information leakage and service inability status due to the malicious access to the mobile terminal in the retrieval process. This paper suggests the model to which the protective technique of multimedia content retrieval & access in mobile cloud is applied. The model stores and manages the individually different forms of content, and constructs the multimedia ontology in order to enhance the reliability in mismatched problems occurring in the retrieval process, and also suggests the response technique to security vulnerability occurring in the content access.  相似文献   

10.
Tan  Yongjie  Qin  Jie 《Multimedia Tools and Applications》2020,79(3-4):1625-1640
Multimedia Tools and Applications - Reversible image watermarking algorithm is an important branch of information hiding, which can protect the integrity of data. Therefore, it is of great...  相似文献   

11.
This paper presents SEAS, the Secure E-voting Applet System, a protocol for implementing a secure system for polling over computer networks, usable in distributed organizations whose members may range up to dozens of thousands. We consider an architecture requiring the minimum number of servers involved in the validation and voting phases. Sensus, [Cranor L, Cytron RK. Sensor: a security-conscious electronic polling system for the internet. In: Proceedings of HICSS'97. IEEE; 1997. p. 561–70], a well-known e-voting protocol, requires only two servers, namely a validator and a tallier. Even if satisfying most of the security requirements of an e-voting system, Sensus suffers from a vulnerability that allows one of the entities involved in the election process to cast its own votes in place of those that abstain from the vote. SEAS is a portable and flexible system that preserves the limited number of servers of Sensus, but it avoids the mentioned vulnerability. We propose a prototype implementation of SEAS based on Java applet and XML technology.  相似文献   

12.
As the Internet has become a more central aspect for information technology, so have concerns with supplying enough bandwidth and serving web requests to end users in an appropriate time frame. Web caching was introduced in the 1990s to help decrease network traffic, lessen user perceived lag, and reduce loads on origin servers by storing copies of web objects on servers closer to end users as opposed to forwarding all requests to the origin servers. Since web caches have limited space, web caches must effectively decide which objects are worth caching or replacing for other objects. This problem is known as cache replacement. We used neural networks to solve this problem and proposed the Neural Network Proxy Cache Replacement (NNPCR) method. The goal of this research is to implement NNPCR in a real environment like Squid proxy server. In order to do so, we propose an improved strategy of NNPCR referred to as NNPCR-2. We show how the improved model can be trained with up to twelve times more data and gain a 5–10% increase in Correct Classification Ratio (CCR) than NNPCR. We implemented NNPCR-2 in Squid proxy server and compared it with four other cache replacement strategies. In this paper, we use 84 times more data than NNPCR was tested against and present exhaustive test results for NNPCR-2 with different trace files and neural network structures. Our results demonstrate that NNPCR-2 made important, balanced decisions in relation to the hit rate and byte hit rate; the two performance metrics most commonly used to measure the performance of web proxy caches.  相似文献   

13.
In this paper, we present a theoretical framing of the functions of a mirror by breaking the synchrony between the state of a reference object and its reflection. This framing provides a new conceptualization of the uses of reflections for various applications. We describe the fundamental technical components of such systems and illustrate the technical challenges in two different forms of electronic mirror systems for apparel shopping. The first example, the Responsive Mirror, is an intelligent video capture and access system for clothes shopping in physical stores that provides personalized asynchronous reflections of clothing items through an implicitly controlled human–computer interface. The Responsive Mirror employs computer vision and machine learning techniques to interpret the visual cues of the shopper’s behavior from cameras to then display two different reflections of the shopper on digital displays: (1) the shopper in previously worn clothing with matching pose and orientation and (2) other people in similar and dissimilar shirts with matching pose and orientation. The second example system is a Countertop Responsive Mirror that differs from the first in that the images do not respond to the real-time movement of the shopper but to frames in a recorded video so that the motion of the shopper in the different recordings are matched non-sequentially. These instantiations of the mirror systems in fitting room and jewelry shopping scenarios are described, focusing on the system architecture and the intelligent computer vision components. The effectiveness of Responsive Mirror is demonstrated by the user study. The paper contributes a conceptualization of reflection and examples of systems illustrating new applications in multimedia systems that break traditional reflective synchronies.  相似文献   

14.
《微型机与应用》2015,(10):35-37
为了实现基于Android手机平台的音频会话和图像上传,设计了一个基于Android手机的多媒体应用软件。首先介绍了Android端的多媒体发展趋势,然后介绍了如何设计并实现在手机端的VOIP以及利用FTP协议上传图像。测试结果表明,用户可以通过软件客户端与PC客户端进行音频会话,并有良好的通话体验,登录FTP服务器可以查看到通过软件上传的图像。  相似文献   

15.
16.
With more and more computer users having access to the Internet, it is important for them to access the vast amount of information in an efficient and easy manner. This project explores one of the possibilities for providing an integrated system to the user to access the different types of media like text, image, audio and video stored in different databases on remote machines without the user having to know about the underlying mechanism involved in accessing the database. Such a system must hide the location of the remote data, retrieve the information, process the results and present it to the user. We have used the National Center for Supercomputer Applications (NCSA) Mosaic's Gateway Structured Query Language (GSQL), which enables a system developer to build input forms, query to the remote database in a relatively easy manner and present the results to the user. With the help of this prototype, the development time to build such an application is considerably reduced as compared with developing the same application using the existing Graphical User Interface (GUI) tools like the X-Window system.  相似文献   

17.
针对通用的课件开发工具在化学教学领域中个性化、可视化方面的不足,提出了一种基于可视化文档和数据库技术开发“个性化多媒体化学课件”的新思路,并通过对其个性化和可视化特征的分析,重点介绍了这一开发工具的结构和功能。给出了利用Borland C Builder的VCL组件实现可视化的方法。  相似文献   

18.
As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the course of ordinary activity. With such prevalence of pervasive technology, the interaction between portable devices needs to be continuous and imperceptible to device users. Pervasive computing requires a small, scalable and robust network which relies heavily on the middleware to resolve communication and security issues. In this paper, we present the design and implementation of S-MARKS which incorporates device validation, resource discovery and a privacy module.  相似文献   

19.
In many three-dimensional imaging applications the three-dimensional scene is represented by a three-dimensional array of volume elements, or voxels for short. A subset Q of the voxels is specified by some property. The objects in the scene are then defined as subsets of Q formed by voxels which are “connected” in some appropriate sense. It is often of interest to detect and display the surface of an object in the scene, specified, say, by one of the voxels in it. In this paper, the problem of surface detection is translated into a problem of traversal of a directed graph, G. The nodes of G correspond to faces separating voxels in Q from voxels not in Q. It is proven that connected subgraphs of G correspond to surfaces of connected components of Q (i.e., of objects in the scene). Further properties of the directed graph are established which allow us to keep the number of marked nodes (needed to avoid loops in the graph traversal) to a small fraction of the total number of visited nodes. This boundary detection algorithm has been implemented. We discuss the interaction between the underlying mathematical theory and the design of the working software. We illustrate the software by some clinical studies in which the input is computed tomographic (CT) data and the output is dynamically rotating three-dimensional displays of isolated organs. Even though the medical application leads to very large-scale problems, our theory and design allows us to use our method routinely on the minicomputer of a CT scanner.  相似文献   

20.
Proxy mobile IPv6 (PMIPv6) is a network-based mobility management protocol that improves performance in terms of handover latency, signaling cost, and packet loss compared to host-based mobility management protocols. However, still packet loss occurs during the handover of the mobile node (MN). Several attempts have been made to improve the reliability of PMIPv6 service by proposing schemes in which packets are buffered in network entities during the handover of the MN to prevent packet loss, and performance improvement has been demonstrated via simulations. So far, there have been no implementations of buffering functions in the literature. This paper addresses design of buffering function and its implementation to prevent packet loss, and demonstrates the results. We have implemented a PMIPv6 testbed based on open source resources. We discuss the functional and performance enhancements, comparing PMIPv6 with the buffering implemented and standard PMIPv6. We also propose an improved buffering function where the packet forwarding rate of the buffer is adjusted. The results through the testbed show that the buffering function in PMIPv6 effectively prevents packet loss during the handover of the MN. We have found out that we can manage the amount of packets in the buffer without further increment by adjusting the packet forwarding rate of the buffer as well.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号