2019
DOI: 10.1109/tcc.2017.2734650
|View full text |Cite
|
Sign up to set email alerts
|

Error Concealment for Cloud–Based and Scalable Video Coding of HD Videos

Abstract: The encoding of HD videos faces two challenges: requirements for a strong processing power and a large storage space. One time-efficient solution addressing these challenges is to use a cloud platform and to use a scalable video coding technique to generate multiple video streams with varying bitrates. Packet-loss is very common during the transmission of these video streams over the Internet and becomes another challenge. One solution to address this challenge is to retransmit lost video packets, but this wil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

4
3

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…This approach relies on beaconless routing and uses multiple metrics for routing decisions. A comparison between the performances of various joint coding solutions based on application layer to support video transmission between mobile devices in IoT applications was provided in [14,[92][93][94]. In this comparison, the quality of video streaming is evaluated based on quality of experience.…”
Section: Internet Of Multimedia Thingsmentioning
confidence: 99%
“…This approach relies on beaconless routing and uses multiple metrics for routing decisions. A comparison between the performances of various joint coding solutions based on application layer to support video transmission between mobile devices in IoT applications was provided in [14,[92][93][94]. In this comparison, the quality of video streaming is evaluated based on quality of experience.…”
Section: Internet Of Multimedia Thingsmentioning
confidence: 99%
“…In the traditional MLEC architecture, the computational resources are usually owned by different providers, e.g., Internet service providers, cloud service providers, and enterprise organizations that own a complete network and a cluster setup [2], [3]. Due to multiple ownership of computing resources in the MLEC architecture, a malicious device can easily enter the network, act like a legitimate edge device, and connect with end-devices and industrial applications to control them.…”
Section: Introductionmentioning
confidence: 99%