2000
DOI: 10.1109/49.824788
|View full text |Cite
|
Sign up to set email alerts
|

Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2001
2001
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 77 publications
(37 citation statements)
references
References 42 publications
0
37
0
Order By: Relevance
“…However, as in the previously tested CPN routing scheme [20], we have to widen our probing at random over other paths, so that we do not miss out on paths whose latency has substantially improved over recent history, and we use Reinforcement Learning [27] to adjust the parameters of a Random Neural Network (RNN), acting as an adaptive critic, as first suggested in [28]. The RNN has been used in many other applications, such as image processing [29], [30] and virtual reality [31].…”
Section: Learning With the Random Neural Networkmentioning
confidence: 99%
“…However, as in the previously tested CPN routing scheme [20], we have to widen our probing at random over other paths, so that we do not miss out on paths whose latency has substantially improved over recent history, and we use Reinforcement Learning [27] to adjust the parameters of a Random Neural Network (RNN), acting as an adaptive critic, as first suggested in [28]. The RNN has been used in many other applications, such as image processing [29], [30] and virtual reality [31].…”
Section: Learning With the Random Neural Networkmentioning
confidence: 99%
“…Their approach was to interpolate video sequences and compensate for frames that may have been lost or deliberately dropped [22].…”
Section: Data Communicationsmentioning
confidence: 99%
“…The communication schemes may be opportunistic [25] and attacks may use similar opportunistic means to access IoT devices, viruses and worms will continue being important threats [16] and they can diffuse opportunistically through a network [17], video input is one of the uses of the IoT and video encoding [7] can also be specifically targeted by attacks. Furthermore, many network services are organised to flow over overlay networks [4] that cooperate with the Cloud [43,44] to offer easy deployable and flexible services for the mobile network control plane.…”
Section: Introductionmentioning
confidence: 99%