A semantic based pre-fetch scheme for SMIL presentation proxy-delivery

被引:0
|
作者
Abdelli, A.
Badache, N.
机构
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We discuss in this paper an adapted proxy working scheme for SMIL presentation delivery and show how to exploit the casual relations, the time requirements as well as the media characteristics, to deduce a semantic based request pattern. The latter is used to efficiently schedule the pre-fetch requests, as well as the send-back delivery, such that the imposed synchronizations constraints can be met while maintaining the proxy jitter under an acceptable threshold. First results towards validating the pre-fetch scheme are reported.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 7 条
  • [1] A proxy pre-fetch scheme for consistent SMIL presentation delivery
    Abdelli, A.
    Badache, N.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 967 - 974
  • [2] Cache Scheme Based on Pre-Fetch Operation in ICN
    Duan, Jie
    Wang, Xiong
    Xu, Shizhong
    Liu, Yuanni
    Xu, Chuan
    Zhao, Guofeng
    [J]. PLOS ONE, 2016, 11 (06):
  • [3] Efficient pre-fetch and pre-release based buffer cache management for web applications
    Ko, Y
    Kim, J
    Choo, H
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 360 - 369
  • [4] A new column redundancy scheme for yield improvement of high speed DRAMs with multiple bit pre-fetch structure
    Lee, JG
    Jun, YH
    Kyung, KH
    Yoo, C
    Cho, YH
    Cho, SI
    [J]. 2001 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS, 2001, : 69 - 70
  • [5] A motion compensation system with a high efficiency reference frame pre-fetch scheme for QFHD H.264/AVC decoding
    Chao, Ping
    Lin, Youn-Long
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 256 - 259
  • [6] Efficient ID-Based Proxy Pre-Encryption Scheme for Data Sharing in Cloud
    Zhang, Jian-Hong
    Zhen, Wei-Na
    Zhao, Xu-Bing
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 378 - 383
  • [7] The Method of Crypto-Semantic Presentation of Images Based on the Floating Scheme in the Basis of the Upper Boundaries
    Barannik, Vladimir
    Tupitsya, Ivan
    Sidchenko, Sergey
    Tarnopolov, Roman
    [J]. 2015 SECOND INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T 2015), 2015, : 248 - 250