Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Franco Tommasi"'
Autor:
Franco Tommasi
Publikováno v:
SCIRES-IT, Vol 1, Iss 2, Pp 1-12 (2011)
ItMolti vizi e virtù di Apple hanno le radici in vizi e virtù di Steve Jobs. Questi a loro volta derivano dalla spiccata originalità del suo percorso creativo e professionale e dai problemi piuttosto pressanti che questa ha creato. Ad essi egli ha
Externí odkaz:
https://doaj.org/article/b9de13ca7116407eb6cc21e5c8c141a4
Autor:
Franco Tommasi
Publikováno v:
SCIRES-IT, Vol 1, Iss 1, Pp 113-124 (2011)
ItIn quanti modi è possibile trasmettere audio e video in diretta a un gran numero di destinatari? Se da una parte il grosso pubblico può ritenere banale il problema, uno sguardo più attento rivela senza difficoltà che è vero l'esatto opposto. L
Externí odkaz:
https://doaj.org/article/473d8dac5d644dfebf0a544c99133f16
Publikováno v:
Journal of Communications Software and Systems, Vol 2, Iss 2, Pp 152-160 (2006)
The Satellite Reliable Distribution Protocol (SRDP) is proposed and discussed. SRDP is designed for satellite-based data broadcasting and aims at transmitting reliably multicast via satellite Internet applications’ data in an efficient and scalable
Externí odkaz:
https://doaj.org/article/63d591eb95044e968f14e89eaa4d95fd
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 18:333-346
The introduction of new memory-based crypto-mining techniques and the rise of new web technologies like WebAssembly, made the use of browsers for crypto-currencies mining more and more convenient and popular. That, in turn, originated a new form of c
Publikováno v:
2022 7th International Conference on Smart and Sustainable Technologies (SpliTech).
Publikováno v:
IEEE Access, Vol 7, Pp 41576-41583 (2019)
The rapid spread of micropayment systems, together with some peculiarity of their typical use, have attracted computer criminals and dishonest companies aiming at exploiting the systems’ weaknesses to steal from users both personal data and money.
Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::421ff1c384e17cbdacd94e979e0692db
https://hdl.handle.net/11587/473424
https://hdl.handle.net/11587/473424
Autor:
Catiuscia Melle, Franco Tommasi
The chapter describes an architecture to relay on demand a real-time IP multicast audio-video stream broadcasted by a satellite on a terrestrial link. The stream is received by suitably equipped sites and then relayed to other sites that are not equi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1ea0f30baf6d9cc291188a1236cb6d99
https://stm.bookpi.org/CTMCS-V8/article/view/3068
https://stm.bookpi.org/CTMCS-V8/article/view/3068
Peer-to-peer streaming is a well-known technology for the large-scale distribution of real-time audio/video contents. Delay requirements are very strict in interactive real-time scenarios (such as synchronous distance learning), where playback lag sh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::58dcf9ee57185395b2484409d9e199cc
https://link.springer.com/article/10.1007/s11042-020-10198-9
https://link.springer.com/article/10.1007/s11042-020-10198-9
Publikováno v:
Journal of Visual Communication and Image Representation. 27:7-27
We analyzed PSNR, BIPSNR, SSIM, 3SSIM, MSSSIM, VQM for various packet loss fractions.A lower bitrate mitigates PSNR impairments caused by packet losses.BIPSNR has less probability than PSNR to be significantly influenced by packet losses.Among struct