2011 IEEE International Conference on Advanced Information Networking and Applications 2011
DOI: 10.1109/aina.2011.17
|View full text |Cite
|
Sign up to set email alerts
|

A Network Resource Management Framework for Multimedia Applications Distributed in Heterogeneous Home Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…Thanks to these standards and to the improved embedded devices, multimedia application are now $ This work is an extension of the work published in [1] and [2]. This paper presents a more global and integrated contribution, based on the work published in the two conferences.…”
Section: Introductionmentioning
confidence: 87%
“…Thanks to these standards and to the improved embedded devices, multimedia application are now $ This work is an extension of the work published in [1] and [2]. This paper presents a more global and integrated contribution, based on the work published in the two conferences.…”
Section: Introductionmentioning
confidence: 87%
“…The reservationPolicy controls the network interface of the server device as described in [12]. It limits the default outgoing traffic to the capacity of the network interface minus the reservation made for each streaming application.…”
Section: Methodsmentioning
confidence: 99%
“…Two trivial solutions exist to perform such a solution. The first one is based on a constant reservation which equals to the maximal value of necessary bandwidth [12,14,17]. But because VBR includes a lot of peak rates, significantly larger than average rate, this solution leads to an over-reservation of the resource.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…But, in the specific context of closed systems, since we have a full knowledge of contents and architecture, we argue that we can control resource usage precisely using a centralized architecture and an accurate knowledge of bitrate to transmit [4]. In this approach, the network admission is classically solved by limiting the outgoing traffic on server devices with a token bucket that shapes the outgoing traffic.…”
Section: Introductionmentioning
confidence: 98%