Academic literature on the topic 'Multicasting techniques'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multicasting techniques.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Multicasting techniques"

1

Sayed, Rosni, and Asaduzzaman Shobug. "Wireless Multicasting with Diversity Combining Techniques." IOSR Journal of Electronics and Communication Engineering 11, no. 05 (May 2016): 103–9. http://dx.doi.org/10.9790/2834-110501103109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sudharani, D., and K. Amrutasagar. "Cyclic Group Key Administration Techniques for Multicasting in VANETs." International Journal of Computer Applications 168, no. 13 (June 22, 2017): 11–13. http://dx.doi.org/10.5120/ijca2017914552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qadir, Junaid, Adeel Baig, Asad Ali, and Quratulain Shafi. "Multicasting in cognitive radio networks: Algorithms, techniques and protocols." Journal of Network and Computer Applications 45 (October 2014): 44–61. http://dx.doi.org/10.1016/j.jnca.2014.07.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Im, Illkyun, and Jongpil Jeong. "Cost-Effective and Fast Handoff Scheme in Proxy Mobile IPv6 Networks with Multicasting Support." Mobile Information Systems 10, no. 3 (2014): 287–305. http://dx.doi.org/10.1155/2014/131030.

Full text
Abstract:
With recent advancements in wireless communication technologies, mobile multicasting is becoming important, in an effort to use network resources more efficiently. In the past, when various mobile IP-based multicast techniques were proposed, the focus was on the costs needed for network delivery to provide multicast services, as well as on minimizing the multicast handover delay. However, it is fundamentally difficult to resolve the problems of handover delay and tunnel convergence for techniques using MIPv6 (Mobile IPv6), a host-based mobility management protocol. To resolve these problems, t
APA, Harvard, Vancouver, ISO, and other styles
5

Oprea, Simona, Valeria Leggieri, and Chefi Triki. "Reduction Techniques for the Minimum Power Multicasting Problem in Wireless Networks." Journal of Applied Sciences 11, no. 4 (February 1, 2011): 731–36. http://dx.doi.org/10.3923/jas.2011.731.736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Osemwegie, Omoruyi, Samuel John, Adewale Adeyinka, Etinosa Noma-Osaghae, and Kennedy Okokpujie. "Comparative analysis of routing techniques in chord overlay network." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (October 1, 2021): 4361. http://dx.doi.org/10.11591/ijece.v11i5.pp4361-4372.

Full text
Abstract:
Overlay networks are not a new field or area of study. This domain of computing will someday drive P2P systems in various application areas such as block-chain, energy trading, video multicasting, and distributed file storage. This study highlights the two widely known methods of routing information employed in one of such overlay networks called chord. In this study, simulations of both routing modes (iterative and recursive) and their variations under no-churn (leaving and joining of nodes) and churn conditions was carried out. The routing parameter (successor list size) was varied for each
APA, Harvard, Vancouver, ISO, and other styles
7

Tekli, Joe, Ernesto Damiani, and Richard Chbeir. "Using XML-Based Multicasting to Improve Web Service Scalability." International Journal of Web Services Research 9, no. 1 (January 2012): 1–29. http://dx.doi.org/10.4018/jwsr.2012010101.

Full text
Abstract:
Web services’ (WS) emphasis on open standards provides substantial benefits over previous application integration techniques. A major WS feature is SOAP, a simple, robust and extensible XML-based protocol for the exchange of messages. For this reason, SOAP WS on virtual hosts are now widely used to provide shared functionalities on clouds. Unfortunately, SOAP has two major performance-related drawbacks: i) verbosity, related to XML, that leads to increased network traffic, and ii) high computational burden of XML parsing and processing, that leads to high latency. In this paper, we address the
APA, Harvard, Vancouver, ISO, and other styles
8

Uribe, Bernardo, Luis Miguel Méndez, Andrés Tovar, Jean Pierre Charalambos, Olmedo Arcila, and Álvaro David López. "Mixed Reality Boundaries in Museum Preservation Areas." International Journal of Art, Culture and Design Technologies 3, no. 2 (July 2013): 63–74. http://dx.doi.org/10.4018/ijacdt.2013070105.

Full text
Abstract:
The paper presents a work in the field of ‘mixed reality boundaries’ applied to the visualization of museum collections in order to display the collections ‘live’ as a way to extend virtually the preservation areas of museum collections. To achieve this goal, it was set out to integrate several virtual-studio techniques with multicasting IP in the web and the ‘tectonics’ of museums architecture were also redesigned to turn this sort of new infrastructure into what will be a new typology of mixed architectures for museum preservation areas. Dynamic lighting for Chroma-keying techniques were ada
APA, Harvard, Vancouver, ISO, and other styles
9

Alhaisoni, Majed, Mohammed Ghanbari, and Antonio Liotta. "Localized Multistreams for P2P Streaming." International Journal of Digital Multimedia Broadcasting 2010 (2010): 1–12. http://dx.doi.org/10.1155/2010/843574.

Full text
Abstract:
Streaming video over the Internet, including cellular networks, has now become a commonplace. Network operators typically use multicasting or variants of multiple unicasting to deliver streams to the user terminal in a controlled fashion. P2P streaming is an emerging alternative, which is theoretically more scalable but suffers from other issues arising from the dynamic nature of the system. Users' terminals become streaming nodes but they are not constantly connected. Another issue is that they are based on logical overlays, which are not optimized for the physical underlay infrastructure. An
APA, Harvard, Vancouver, ISO, and other styles
10

Madhusudhanan, B., S. Chitra, and C. Rajan. "Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks." Scientific World Journal 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/801632.

Full text
Abstract:
In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is esti
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Multicasting techniques"

1

Khisti, Ashish 1979. "Coding techniques for multicasting." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28546.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (leaves 74-77).<br>We study some fundamental limits of multicasting in wireless systems and propose practical architectures that perform close to these limits. In Chapter 2, we study the scenario in which one transmitter with multiple antennas distributes a common message to a large number of users. For a system with a fixed number (L) of transmit antennas, we show that, as the number of users (K) becomes large, the rate of the worst user decr
APA, Harvard, Vancouver, ISO, and other styles
2

Koneni, Madhu. "Key Management Techniques for Dynamic Secure Multicasting." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/33061.

Full text
Abstract:
Most of the Internet applications today require multicasting. For example, software updates, multimedia content distribution, interacting gaming and stock data distribution require multicast services. All of these applications require privacy and authenticity of the participants. Most of the multicasting groups are dynamic and some of them are large in number. Only those users who belong to the multicasting group should receive the information and be able to decrypt it. New users joining the group should receive information immediately but should not understand the information that was
APA, Harvard, Vancouver, ISO, and other styles
3

Sheta, Khalid H. "Design and performance evaluation of techniques for multicasting support in broadband communication networks /." The Ohio State University, 1997. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487947501134772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Venkatachalaiah, Suresh, and suresh@catt rmit edu au. "Mobility prediction and Multicasting in Wireless Networks: Performance and Analysis." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070301.130037.

Full text
Abstract:
Handoff is a call handling mechanism that is invoked when a mobile node moves from one cell to another. Such movement may lead to degradation in performance for wireless networks as a result of packet losses. A promising technique proposed in this thesis is to apply multicasting techniques aided by mobility prediction in order to improve handoff performance. In this thesis, we present a method that uses a Grey model for mobility prediction and a fuzzy logic controller that has been fine-tuned using evolutionary algorithms in order to improve prediction accuracy. We also compare the self-tuning
APA, Harvard, Vancouver, ISO, and other styles
5

Tsang, Cheuk-man Mark, and 曾卓敏. "Multicast techniques for bandwidth-demanding applications in overlay networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40687508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tsang, Cheuk-man Mark. "Multicast techniques for bandwidth-demanding applications in overlay networks." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B40687508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fariba, Farhad. "An investigation of multicasting techniques in an ATM network to support multilateral multimedia desktop conferencing." Thesis, University of Salford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Donghua. "Scalability and Composability Techniques for Network Simulation." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10450.

Full text
Abstract:
Simulation has become an important way to observe and understand various networking phenomena under various conditions. As the demand to simulate larger and more complex networks increases, the limited computing capacity of a single workstation and the limited simulation capability of a single network simulator have become apparent obstacles to the simulationists. In this research we develop techniques that can scale a simulation to address the limited capacity of a single workstation, as well as techniques that can compose a simulation from different simulator components to address the limit
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Tzu-Ching, and 沈子晉. "Rateless Unequal Erasure Protection Coding Techniques Using on H.264/SVC Video Multicasting." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/89844925739294730448.

Full text
Abstract:
碩士<br>國立交通大學<br>網路工程研究所<br>98<br>In this thesis, we propose a rateless cascade channel coding system with Unequal Erasure Protection capability using on H.264/SVC transport for real time transport because so far most of researches does not provide a specific method about how to design a short-length rateless unequal erasure protection code which is (1) with good UEP capability and graceful degradation (2) each UEP layer size is adjustable (3) protection capability for each UEP layer is adjustable (4) the coding system is practical to use on a real H.264/SVC transport. The coding scheme we pro
APA, Harvard, Vancouver, ISO, and other styles
10

Bhardwaj, Kshitij. "On Multicast in Asynchronous Networks-on-Chip: Techniques, Architectures, and FPGA Implementation." Thesis, 2018. https://doi.org/10.7916/D81279JK.

Full text
Abstract:
In this era of exascale computing, conventional synchronous design techniques are facing unprecedented challenges. The consumer electronics market is replete with many-core systems in the range of 16 cores to thousands of cores on chip, integrating multi-billion transistors. However, with this ever increasing complexity, the traditional design approaches are facing key issues such as increasing chip power, process variability, aging, thermal problems, and scalability. An alternative paradigm that has gained significant interest in the last decade is asynchronous design. Asynchronous designs ha
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Multicasting techniques"

1

Transmission techniques for emergent multicast and broadcast systems. Boca Raton, FL: CRC Press / Taylor & Francis, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Multicasting techniques"

1

Dammicco, Giacinto, and Ugo Mocci. "Program caching and multicasting techniques in VoD networks." In Interactive Distributed Multimedia Systems and Telecommunication Services, 65–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/bfb0000340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Min, Chin Teck, and Lim Tong Ming. "Totally Sender- And File-Order Recovery Technique For Reliable Multicasting Solutions Using Heartbeat." In Innovations and Advances in Computer Sciences and Engineering, 555–59. Dordrecht: Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-3658-2_97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pugalenthi, R., V. R. Rajasekar, U. Sakthi, and S. Preetham. "Multicasting of Images Resized Using Enhanced Seam Carving Technique in Hierarchical Group Communication." In Communications in Computer and Information Science, 250–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35211-9_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Xiao, and Jie Wu. "Multicasting Techniques in Mobile Ad Hoc Networks." In Electrical Engineering Handbook. CRC Press, 2002. http://dx.doi.org/10.1201/9781420040401.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shrestha, Anish Prasad, and Kyung Sup Kwak. "Physical Layer Security in Multiuser Wireless Networks." In Developing Next-Generation Countermeasures for Homeland Security Threat Prevention, 263–81. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0703-1.ch012.

Full text
Abstract:
Physical layer (PHY) security has recently gained considerable attention as an alternative option to cryptographic techniques since it can provide unconditional perfect secrecy. This chapter presents brief concept about PHY security and solutions along with quantitative measurement of secrecy performance for multiuser wireless networks. A typical transmitter in wireless communication may be required to send a confidential message to either a single or several users simultaneously. Aiming to provide comprehensive investigation of secrecy performance in such multiuser network, secure multicasting and opportunistic scheduling techniques are presented. Furthermore, to look into the effects of multiple antennas, system model under consideration employ maximal ratio combining at receiver.
APA, Harvard, Vancouver, ISO, and other styles
6

Osawa, Noritaka, and Kikuo Asai. "Multipoint Multimedia Conferencing System for Efficient and Effective Remote Collaboration." In Advances in Distance Education Technologies, 126–46. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-934-2.ch009.

Full text
Abstract:
A multipoint, multimedia conferencing system called FocusShare is described. It uses IPv6/IPv4 multicasting for real-time collaboration, enabling video, audio, and group-awareness and attention-sharing information to be shared. Multiple telepointers provide group-awareness information and make it easy to share attention and intention. In addition to pointing with the telepointers, users can add graphical annotations to video streams and share them with one another. The system also supports attention-sharing using video processing techniques. FocusShare is a modularly designed suite consisting of several simple tools, along with tools for remotely controlling them. The modular design and flexible management functions enable the system to be easily adapted to various situations entailing different numbers of displays with different resolutions at multiple sites. The remote control tools enable the chairperson or conference organizer to simultaneously change the settings for a set of tools distributed at multiple sites. Evaluation showed that the implemented attention-sharing techniques are useful: FocusShare was more positively evaluated than conventional video conferencing systems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Multicasting techniques"

1

Yan Sun and K. J. Ray Liu. "Transmit diversity techniques for multicasting over wireless networks." In 2004 IEEE Wireless Communications and Networking Conference. IEEE, 2004. http://dx.doi.org/10.1109/wcnc.2004.1311613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ali, Qutaiba I., and Basil Sh Mahmood. "Enhancement of Industrial Ethernet Performance Using Multicasting/VLAN techniques." In Communication Technologies: from Theory to Applications (ICTTA). IEEE, 2008. http://dx.doi.org/10.1109/ictta.2008.4530180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhattacharjee, Suman, Ranit Chatterjee, Tamal Pal, and Sipra DasBit. "Implementing Multicasting and Broadcasting of Multimedia Data in ONE Simulator." In SIMUTOOLS '17: 10th EAI International Conference on Simulation Tools and Techniques. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3173519.3173540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Abdelkader, A., M. Pesavento, and A. B. Gershman. "Orthogonalization techniques for single group multicasting in cooperative amplify-and-forward networks." In 2011 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP). IEEE, 2011. http://dx.doi.org/10.1109/camsap.2011.6135989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Swetha, P. K., and Uma Maheswari B. "An Improved Cluster based Multicasting Technique on Vehicular Adhoc Network." In 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2018. http://dx.doi.org/10.1109/icgciot.2018.8753067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Micanti, Paolo, Giuseppe Baruffa, and Fabrmzio Frescura. "A packetization technique for D-Cinema contents multicasting over metropolitan wireless networks." In 2007 IEEE Mobile WiMAX Symposium. IEEE, 2007. http://dx.doi.org/10.1109/wimax.2007.348707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Atallah, Michael, and Georges Kaddoum. "Secrecy Analysis of Cooperative Network with Untrustworthy Relays Using Location-Based Multicasting Technique." In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud: Workshops (W-FiCloud). IEEE, 2017. http://dx.doi.org/10.1109/ficloudw.2017.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hsiao, Chang-Lung, Jiann-Ching Guey, Wern-Ho Sheen, and Ren-Jr Chen. "A New Transmit Beamforming Technique for Physical-Layer Multicasting in Cellular Downlink Systems." In 2014 IEEE 80th Vehicular Technology Conference (VTC Fall). IEEE, 2014. http://dx.doi.org/10.1109/vtcfall.2014.6965822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ansari, A. Q., and V. K. Nangia. "Efficient electricity grid management for distributed generation using a fuzzy logic-based multicasting technique." In 2010 Power India. IEEE, 2010. http://dx.doi.org/10.1109/pedes.2010.5712478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gopalakrishnan, S., and P. GaneshKumar. "Secure and efficient transmission in wireless network using key authentication based secured multicasting technique." In 2015 International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2015. http://dx.doi.org/10.1109/icaccs.2015.7324064.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!