2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698) 2003
DOI: 10.1109/icme.2003.1221357
|View full text |Cite
|
Sign up to set email alerts
|

On designing end-user multicast for multiple video sources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2006
2006
2009
2009

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…bandwidth) friendly for multiple prioritybased channels. Emma protocol [7] constructs firstly an overlay network in which traffic of the logic links and the out-degree of the nodes are restricted. Each channel priority of Emma is determined according to each overlay peer's favor to the channel.…”
Section: Related Workmentioning
confidence: 99%
“…bandwidth) friendly for multiple prioritybased channels. Emma protocol [7] constructs firstly an overlay network in which traffic of the logic links and the out-degree of the nodes are restricted. Each channel priority of Emma is determined according to each overlay peer's favor to the channel.…”
Section: Related Workmentioning
confidence: 99%
“…Multiple path approaches where the redundant paths are used in case of original path failure ( [5], [6]), or restore schemes where the overlay topology is re-established using a previously or immediately calculated restore mission ( [7], [8], [9]) are often used to realize this. The third one corresponds to the ALM schemes like [10], [11], [12], which are targeted to provide some other QoS features like bandwidth.…”
Section: Related Workmentioning
confidence: 99%
“…We also assume that each node knows the maximum delays from all the senders. The way of this information collection will be explained later in Section 3.3. w1 w2 core(Tv,w1) (repair sub-master) [2] (repair initiater) [2] [3] [3] Tv,u Tv,w1 Tv,w2…”
Section: Join Procedures Designmentioning
confidence: 99%
“…We assume that there exists a node that never disappears, for example, the first member node or a well-known node. Such a node is called the root node 2 . The root node starts the information collection in the collection phase for every (regular) interval by broadcasting synchronization messages on the current tree.…”
Section: Information Collectionmentioning
confidence: 99%
See 1 more Smart Citation