Explore chapters and articles related to this topic
Live Video and On-Demand Streaming
Published in Borko Furht, Syed Ahson, Handbook of Mobile Broadcasting, 2008
I. S. Venieris, E. Kosmatos, C. Papagianni, G. N. Prezerakos
Its functionality is similar to HTTP. However while HTTP is stateless, RTSP is not. A session ID is used to keep track of sessions when needed. This way, no permanent TCP connection is needed. The operation of RTSP is based in the client/server model, but both the server and the client can issue request for connection. The most basic commands that are defined by RTSP to control the multimedia session are SETUP, PLAY, RECORD, PAUSE, and TEARDOWN. In a typical session where the client retrieves media content from the server, as soon as the client has collected information about the file it sends a SETUP message to the server to request a connection. The server authenticates the user and establishes the connection. The client sends a PLAY message indicating the wish to stream the file. The server establishes two RTP sessions (audio and video) and an RTCP session for receiving reports from the client. A transmission of a TEARDOWN message informs the server to close corresponding sessions.
Metro Futures 2020: Enabling Participation at Varying Depths and Scales via Digital Technology
Published in International Journal of Human–Computer Interaction, 2022
Simon Bowen, Alexander Wilson, Sunil Rodger, Tom Feltwell, Tom Nappey
The term “engagement” characterizes and quantifies participants’ involvement. One engagement equates to one person responding to a poll on Twitter, participating in a Slido poll during one webinar, or attending a workshop. Hence, for these consultation strands, the number of engagements is not exactly equivalent to the number of people engaging. For example, participants could respond to multiple Twitter and Slido polls and thus create multiple engagements. Website visitors were a given unique identifier (session ID cookie), set when someone visited the website and responded to some basic demographic questions (age, local authority area, etc.), that was recorded with each data entry. 8.7% of participants answering demographic questions did not submit any other data. Whilst this created a greater equivalence between engagements and participants for the website, it was possible for participants to have multiple session IDs. Session ID cookies persisted in visitors’ browsers for typically 6–12 h (differing by web browser), hence if a participant returned to the website outside this period they would receive a new session ID.
Performance Evaluation of the MapReduce-based Parallel Data Preprocessing Algorithm in Web Usage Mining with Robot Detection Approaches
Published in IETE Technical Review, 2022
Mitali Srivastava, Atul Kumar Srivastava, Rakhi Garg, P. K. Mishra
Each output of map functions is a list of . After completion of map task, every is grouped based on IP and User_agent field; furthermore, it is sorted implicitly by timestamp. Furthermore, in reduce function, an input is activities of distinguished users. Furthermore, if activities of a user contain access to robots.txt, then discard the user; otherwise, the value of user is computed if the number of retrieved pages by user are more than 1. If the value of user is less than a threshold θ, then user is discarded; otherwise, its activities are segmented into various sessions according to time-oriented heuristic as discussed in Section 4.3. The output is written into the form of Session ID, User ID, and list of values.
Efficient oblivious transfer construction via multiple bits dual-mode cryptosystem for secure selection in the cloud
Published in Journal of the Chinese Institute of Engineers, 2019
Zengpeng Li, Chunguang Ma, Minghao Zhao, Chang Choi
OT protocols are an important tool for secure cloud computing. In this subsection, we first recall the relevant properties of an protocol. Informally, the sender takes a pair of bits as input and the receiver has a choice bit Actually, learns nothing about the choice bit and receives nothing. But, receives the bit of its choice and learns nothing about the other bit Below, we present a general protocol based on public-key encryption, as shown in Figure 1. For readability, we focus on the choice bit and the input messages. We omit the other information at this stage, e.g. we omit the session ID in each phase.