Table of Contents
ISRN Communications and Networking
Volume 2011, Article ID 898254, 10 pages
http://dx.doi.org/10.5402/2011/898254
Research Article

Group-Based Reduction Schemes for Streaming Applications

DIEGM, University of Udine, Via delle Scienze 208, 33100 Udine, Italy

Received 4 May 2011; Accepted 3 July 2011

Academic Editors: A. K. Agrawala, G. Hasegawa, E.-C. Park, and A. B. Sesay

Copyright © 2011 Riccardo Bernardini et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Bernardini, R. Rinaldo, and A. Vitali, “A reliable chunkless peer-to-peer architecture for multimedia streaming,” in Proceedings of the IEEE Data Compression Conference (DCC '08), pp. 242–251, Brandeis University, Snowbird, UT, USA, March 2008. View at Publisher · View at Google Scholar
  2. S. Alstrup and T. Rauhe, “Introducing—a new technology for large-scale streaming over the internet,” EBU Technical Review, no. 303, 2005. View at Google Scholar · View at Scopus
  3. M. Castro, P. Druschel, A.-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh, “SplitStream: high-bandwidth multicast in cooperative environments,” in Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003.
  4. M. Yang and Y. Yang, “Peer-to-peer file sharing based on network coding,” in Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS '08), pp. 168–175, Beijing, China, June 2008. View at Publisher · View at Google Scholar
  5. R. Bernardini, R. C. Fabbro, and R. Rinaldo, “Peer-to-peer epi-transport protocol,” 2011, http://tools.ietf.org/html/draft-bernardini-ppetp-02.
  6. R. Ahlswede, N. Cai, S. Y. R. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  7. P. Dhungel, X. Hei, K. W. Ross, and N. Saxena, “Pollution in P2P live video streaming,” International Journal of Computer Networks and Communications, vol. 1, pp. 99–110, 2009. View at Google Scholar
  8. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley and Sons, 1994.
  9. S. C. Kothari, “Generalized linear threshold scheme,” in Proceedings of the CRYPTO 84 on Advances Incryptology, pp. 231–241, Springer, 1985.
  10. R. Bernardini, R. C. Fabbro, and R. Rinaldo, “Peer-to-peer streaming based on network coding improves packet jitter,” in Proceedings of the ACM International Conference on Multimedia, Florence, Italy, October 2010.
  11. N. Jacobson, Basic Algebra. I, Freeman, New York, NY, USA, 1985.
  12. W. Scott, Group Theory, Dover, New York, NY, USA, 1987.
  13. A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  14. T. M. Cover and J. A. Thomas, Information Theory, John Wiley & Sons, New York, NY, USA, 1991.
  15. V. Kucera, Discrete Linear Control: The Polynomial Equation Approach, John Wiley & Sons, New York, NY, USA, 1979.
  16. R. Bernardini, “An efficient algorithm to find lattice chains,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 6, no. 5, pp. 496–505, 1996. View at Google Scholar · View at Scopus
  17. J. H. Conway, N. J. A. Sloane, and E. Bannai, Sphere-Packings, Lattices, and Groups, Springer, New York, NY, USA, 1987.