메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 429-435

Scheduling security-critical multimedia applications in heterogeneous networks

Author keywords

Heterogeneous networks; Multimedia applications; QoS; Scheduling; Security critical

Indexed keywords

AUTHENTICATION METHODS; CONTROL DECISIONS; DISTORTION MODEL; EXTENSIVE SIMULATIONS; GRAPH-BASED; MULTIMEDIA APPLICATIONS; MULTIMEDIA SCHEDULING; PRECEDENCE CONSTRAINTS; QOS; QUALITY-OF-SECURITY; REAL TIME MULTIMEDIA SERVICE; SCHEDULING SCHEMES; SECURITY REQUIREMENTS; SECURITY-CRITICAL;

EID: 78751644528     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.01.009     Document Type: Article
Times cited : (8)

References (22)
  • 2
    • 33947135327 scopus 로고    scopus 로고
    • The IMS platform: A solution for next generation network operators to be more than bit pipes
    • A. Cuevas, J.I. Moreno, P. Vidales, and H. Einsiedler The IMS platform: a solution for next generation network operators to be more than bit pipes IEEE Communications Magazine 44 2006 75 81
    • (2006) IEEE Communications Magazine , vol.44 , pp. 75-81
    • Cuevas, A.1    Moreno, J.I.2    Vidales, P.3    Einsiedler, H.4
  • 3
    • 34247606829 scopus 로고    scopus 로고
    • Efficient hybrid security mechanisms for heterogeneous sensor networks Traynor
    • K. Patrick, C. Raju, H. Cao, G. Zhu, and S. Porta Efficient hybrid security mechanisms for heterogeneous sensor networks Traynor IEEE Transactions on Mobile Computing 6 6 2007 663 677
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.6 , pp. 663-677
    • Patrick, K.1    Raju, C.2    Cao, H.3    Zhu, G.4    Porta, S.5
  • 4
    • 78751643330 scopus 로고    scopus 로고
    • Multimedia encryption and watermarking in wireless environment
    • Idea Group Reference, An imprint of Idea Group Inc.
    • S. Lian, Multimedia encryption and watermarking in wireless environment, in: Book Handbook of Research on Wireless Security, Idea Group Reference, An imprint of Idea Group Inc., 2008.
    • (2008) Book Handbook of Research on Wireless Security
    • Lian, S.1
  • 6
    • 33750592891 scopus 로고    scopus 로고
    • Handoffs in fourth generation heterogeneous networks Nasser
    • N. Nasser, A. Hasswa, and H. Hassanein Handoffs in fourth generation heterogeneous networks Nasser IEEE Communications Magazine 44 10 2006 96 103
    • (2006) IEEE Communications Magazine , vol.44 , Issue.10 , pp. 96-103
    • Nasser, N.1    Hasswa, A.2    Hassanein, H.3
  • 7
    • 67349248080 scopus 로고    scopus 로고
    • Quality of protection analysis and performance modeling in IP multimedia subsystem
    • A. Luo, C. Lin, K. Wang, L. Lei, and C. Liu Quality of protection analysis and performance modeling in IP multimedia subsystem Computer Communications 32 11 2009 1336 1345
    • (2009) Computer Communications , vol.32 , Issue.11 , pp. 1336-1345
    • Luo, A.1    Lin, C.2    Wang, K.3    Lei, L.4    Liu, C.5
  • 8
    • 34948897571 scopus 로고    scopus 로고
    • Performance analysis of priority scheduling mechanisms under heterogeneous network traffic
    • DOI 10.1016/j.jcss.2007.02.008, PII S002200000700013X, Network-Based Computing
    • X. Jin, and G. Min Performance analysis of priority scheduling mechanisms under heterogeneous network traffic Journal of Computer and System Sciences 73 8 2007 1207 1220 (Pubitemid 47531813)
    • (2007) Journal of Computer and System Sciences , vol.73 , Issue.8 , pp. 1207-1220
    • Jin, X.1    Min, G.2
  • 9
    • 42549122454 scopus 로고    scopus 로고
    • Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters
    • T. Xie, and X. Qin Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters IEEE Transactions on Parallel and Distributed Systems 19 5 2008 682 697
    • (2008) IEEE Transactions on Parallel and Distributed Systems , vol.19 , Issue.5 , pp. 682-697
    • Xie, T.1    Qin, X.2
  • 11
    • 44649188536 scopus 로고    scopus 로고
    • A robust resolution-enhancement scheme for video transmission over mobile ad-hoc networks
    • L. Zhou, B. Zheng, A. Wei, B. Geller, and J. Cui A robust resolution-enhancement scheme for video transmission over mobile ad-hoc networks IEEE Transactions on Broadcasting 54 2 2008 312 321
    • (2008) IEEE Transactions on Broadcasting , vol.54 , Issue.2 , pp. 312-321
    • Zhou, L.1    Zheng, B.2    Wei, A.3    Geller, B.4    Cui, J.5
  • 12
    • 70349577638 scopus 로고    scopus 로고
    • A scalable information security technique: Joint authentication-coding mechanism for multimedia over heterogeneous wireless networks
    • L. Zhou, B. Zheng, A. Wei, B. Geller, and J. Cui A scalable information security technique: joint authentication-coding mechanism for multimedia over heterogeneous wireless networks Wireless Personal Communications 51 1 2009 5 16
    • (2009) Wireless Personal Communications , vol.51 , Issue.1 , pp. 5-16
    • Zhou, L.1    Zheng, B.2    Wei, A.3    Geller, B.4    Cui, J.5
  • 13
    • 78751645631 scopus 로고    scopus 로고
    • .
  • 14
    • 78751644733 scopus 로고    scopus 로고
    • .
  • 15
    • 78751642682 scopus 로고    scopus 로고
    • .
  • 16
    • 78751648978 scopus 로고    scopus 로고
    • .
  • 19
    • 34249320884 scopus 로고    scopus 로고
    • Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks
    • Z. Li, Q. Sun, and Y. Lian Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks IEEE Transactions on Multimedia 9 4 2007 837 850
    • (2007) IEEE Transactions on Multimedia , vol.9 , Issue.4 , pp. 837-850
    • Li, Z.1    Sun, Q.2    Lian, Y.3
  • 20
    • 31344458019 scopus 로고    scopus 로고
    • Scalable authentication of MPEG-4 streams
    • Y. Wu, and R.H. Deng Scalable authentication of MPEG-4 streams IEEE Transactions on Multimedia 8 1 2006 152 161
    • (2006) IEEE Transactions on Multimedia , vol.8 , Issue.1 , pp. 152-161
    • Wu, Y.1    Deng, R.H.2
  • 21
    • 34250021566 scopus 로고    scopus 로고
    • Authentication without identification
    • L. Anna Authentication without identification IEEE Security & Privacy Magazine 5 3 2007 69 71
    • (2007) IEEE Security & Privacy Magazine , vol.5 , Issue.3 , pp. 69-71
    • Anna, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.