000 04598nam a22005295i 4500
001 u374079
003 SIRSI
005 20160812084217.0
007 cr nn 008mamaa
008 100311s2010 gw | s |||| 0|eng d
020 _a9783642116865
_9978-3-642-11686-5
040 _cMX-MeUAM
050 4 _aTA329-348
050 4 _aTA640-643
082 0 4 _a519
_223
100 1 _aChen, Chang Wen.
_eeditor.
245 1 0 _aIntelligent Multimedia Communication: Techniques and Applications
_h[recurso electrónico] /
_cedited by Chang Wen Chen, Zhu Li, Shiguo Lian.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aX, 510 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Computational Intelligence,
_x1860-949X ;
_v280
505 0 _aRate Control and Error Resilience for Object-based Video Coding -- Representation and Coding Formats for Stereo and Multiview Video -- Present and Future Video Coding Standards -- AVS Video Coding Standard -- A Resolution Adaptive Video Compression System -- Peer-to-Peer Streaming Systems -- Topology Construction and Resource Allocation in P2P Live Streaming -- Intelligent Video Network Engineering with Distributed Optimization: Two Case Studies -- Media coding for streaming in networks with source and path diversity -- Peer-assisted Media Streaming: a Holistic Review -- Free-Viewpoint TV (FTV) -- UGC Video Sharing: Measurement and Analysis -- Terrestrial Television Broadcasting in China: Technologies and Applications -- Network Topology Inference for Multimedia Streaming -- Resolution-Improvement Scheme for Wireless Video Transmission.
520 _aMultimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers’ properties to improve the network’s resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network’s bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.
650 0 _aEngineering.
650 0 _aInformation systems.
650 0 _aArtificial intelligence.
650 0 _aEngineering mathematics.
650 0 _aTelecommunication.
650 1 4 _aEngineering.
650 2 4 _aAppl.Mathematics/Computational Methods of Engineering.
650 2 4 _aArtificial Intelligence (incl. Robotics).
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aInformation Systems and Communication Service.
700 1 _aLi, Zhu.
_eeditor.
700 1 _aLian, Shiguo.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642116858
830 0 _aStudies in Computational Intelligence,
_x1860-949X ;
_v280
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-11686-5
596 _a19
942 _cLIBRO_ELEC
999 _c201959
_d201959