Explore chapters and articles related to this topic
Emerging Technologies in Multimedia Communications and Networking: Challenges and Research Opportunities
Published in Ling Guan, Yifeng He, Sun-Yuan Kung, Multimedia Image and Video Processing, 2012
Because of limitations for wireless P2P streaming, transmission control protocol (TCP)-based HTTP video streaming has also been exploited for video streaming. As TCP was originally designed for wired networks, the TCP-based HTTP video streaming encounters considerable challenges when it is extended to wireless networks. However, recent engineering practices have found strong evidences that the advantages for wireless TCP streaming outweigh its drawbacks. Compared with user datagram protocol (UDP)-based P2P video streaming, the TCP-based approach has major advantages of (1) being able to penetrate firewalls without adding explicit rules; (2) requiring no additional user end communication software beyond a regular web browser; and (3) guaranteeing fairness among concurrent TCP flows. However, in last-hop WiFi access networks, which is the most widely used network configuration nowadays for home, campus, coffee shop, airport, and so on, fading and interfering make the underlying TCP’s additive increase multiplicative decrease (AIMD) congestion control algorithm too conservative in reducing the congestion window. This results in increased traffic dynamics and decreased average throughput. In contrast, high throughput with low dynamics is very much desired for video streaming. Balancing these conflicting factors in TCP video streaming constitutes the major challenge in contemporary mobile media applications.
Efficiency analysis of prototype evolution methodology on collaborative design
Published in Paulo Jorge Bártolo, Artur Jorge Mateus, Fernando da Conceição Batista, Henrique Amorim Almeida, João Manuel Matias, Joel Correia Vasco, Jorge Brites Gaspar, Mário António Correia, Nuno Carpinteiro André, Nuno Fernandes Alves, Paulo Parente Novo, Pedro Gonçalves Martinho, Rui Adriano Carvalho, Virtual and Rapid Manufacturing, 2007
It is also important to provide an efficient information platform for adequate communication between designers, to organize large amounts of information to produce the product design process. Reasonable sharing information behavior in any design stage should be encouraged. Even in the detail design process of each team, designers still can share information by phone, fax, email, point-to-point communication software, web pages, BBS, digit models, file servers, and so on. These communication tools have built a network of design information to help designers, which is good for decreasing communication costs. There are other PDM solutions to provide more professional services instead of idiographic industry.
Explainable AI for Security of Human-Interactive Robots
Published in International Journal of Human–Computer Interaction, 2022
Antonio Roque, Suresh K. Damodaran
Second, attacks have been characterized in terms of the type of vulnerability exploited. For example, the vulnerability might involve physical, sensor, communication, software, system-level (e.g., involving complexity of integration), and user-related (Archibald et al., 2017), or it might involve the level of attack: hardware, network, firmware, application (Lacava et al., 2020), or it might involve exploiting insecure communication, authentication issue, missing authorization, privacy issues, or weak default configuration (Lacava et al., 2020), or control-based physical vs informational attacks (Archibald et al., 2017). Bou-Harb identifies security approaches on CPSs in general and classifies attacks based on the vulnerability that is exploited (Bou-Harb, 2016); Lin et al. consider two types of CPSs, power grids and surgical robots, and similarly describe general challenges to detecting attacks (Lin et al., 2016).