2011
DOI: 10.1109/tmm.2011.2126564
|View full text |Cite
|
Sign up to set email alerts
|

On-the-Fly Erasure Coding for Real-Time Video Applications

Abstract: Index Terms-Reliability, Delay recovery, Erasure code, Videoconferencing.Abstract-This paper introduces a robust point-to-point transmission scheme: Tetrys, that relies on a novel on-the-fly erasure coding concept which reduces the delay for recovering lost data at the receiver side. In current erasure coding schemes, the packets that are not rebuilt at the receiver side are either lost or delayed by at least one RTT before transmission to the application. The present contribution aims at demonstrating that Te… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(48 citation statements)
references
References 32 publications
0
47
0
1
Order By: Relevance
“…However, this problem is computationally intractable for three or more receivers and hence only a heuristic solution is presented. The delay benefits of a RLC based scheme have been examined in [21], where repair packets are generated on-the-fly through RLC according to feedback messages that are periodically received by the servers. This scheme copes efficiently with the packet erasures and is appropriate for real-time sources such as video.…”
Section: Related Workmentioning
confidence: 99%
“…However, this problem is computationally intractable for three or more receivers and hence only a heuristic solution is presented. The delay benefits of a RLC based scheme have been examined in [21], where repair packets are generated on-the-fly through RLC according to feedback messages that are periodically received by the servers. This scheme copes efficiently with the packet erasures and is appropriate for real-time sources such as video.…”
Section: Related Workmentioning
confidence: 99%
“…To be specific, we need to evaluate P n ϒ 1:n (r,λ) and R n ϒ 1:n (r,λ) according to (32) and (33), for all choices of r andλ, and then remove the points not lying on the convex hull of these points.…”
Section: A Exact Constructionmentioning
confidence: 99%
“…According to (32) and (33), this P-R characteristic includes a set of scaled version of the P-R characteristic forH (i.e.…”
Section: A Exact Constructionmentioning
confidence: 99%
“…The SGM has been widely used to evaluate application performance since early work used it to model loss processes seen on academic networks [16]. Recent evaluations of video streaming [15] and video quality estimation tools [13] have used SGM models.…”
Section: Modelling Residential Packet Lossmentioning
confidence: 99%
“…Previous studies have used Markov-chain models, such as the classical Gilbert model [3], to generate packet loss processes for evaluation of video streaming applications [15] and error repair [6]. More complex Markov-chain models [16], [5], and Hidden Markov Models (HMMs) [10], [11] have been proposed to describe packet loss on academic networks.…”
Section: Introductionmentioning
confidence: 99%