2011
DOI: 10.1016/j.comcom.2010.01.009
|View full text |Cite
|
Sign up to set email alerts
|

Scheduling security-critical multimedia applications in heterogeneous networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The development of automated video surveillance using the WVSNs has drawn considerable attention in recent years [8][9][10][11][12]. Aware of the limitations of the WVSNs and the dynamic nature of the surveillance environment, recent works has focused on certain aspects of visual monitoring, including collaborative data processing, visual data coverage, and visual data coding [13][14][15].…”
Section: Related Workmentioning
confidence: 99%
“…The development of automated video surveillance using the WVSNs has drawn considerable attention in recent years [8][9][10][11][12]. Aware of the limitations of the WVSNs and the dynamic nature of the surveillance environment, recent works has focused on certain aspects of visual monitoring, including collaborative data processing, visual data coverage, and visual data coding [13][14][15].…”
Section: Related Workmentioning
confidence: 99%
“…The DAWVS scheduling algorithm is proposed and analyzed [17]. Zhou et al also propose a graph based authentication method to maximize the quality of video security within the delay [18]. Though these works all apply AMC or similar flow control mechanism to improve the multimedia services, a complete mathematical model to exploit AMC's performance is not yet supplied.…”
Section: Introductionmentioning
confidence: 97%
“…Meanwhile, due to the continuous improvement of the detection, interception and decoding capabilities of communication systems in the modern military field, the security of communication systems [1] has also been greatly challenged. Therefore, cyber security is becoming an increasingly important issue in the design of multimedia applications [2], [3]. Therefore, many encryption schemes have been proposed and obtained excellent results, such as [4].…”
Section: Introductionmentioning
confidence: 99%