#### DMCA

## Optimal Packet Scheduling and Rate Control for Video Streaming

### Citations

337 | Rate-distortion optimized streaming of packetized media,
- Chou, Miao
- 2006
(Show Context)
Citation Context ...imple error concealment scheme is applied. Hence the remaining term is simply calculated as σ2 e0(C, λ) = σ2 u0(C, λ) − σ2 b0 . In case of a packet loss base layer distortion σ2 b0 appears at the (3) =-=(5)-=- (6)sσ 2 u0(C, λ) σ 2 b0 σ 2 v[k − K] K kth frame in T INTRA Period Figure 3. Illustration of the modified distortion model for FGS video base layer as a result of error concealment process. Since bas... |

232 | Analysis of video transmission over lossy channels,”
- Stuhlmuller, Farber, et al.
- 2000
(Show Context)
Citation Context ...ty Pij(a, k) for packet k in the transmission window is given by Eqn. 3 and for non-final states s (i) k probability of not reaching a final state under action a is given by ps (i) (a, k) in Eqn. 4 k =-=(2)-=-s⎧ 1 , s ⎪⎨ Pij(a, k) = ⎪⎩ (i) k final 1 − p (i) (a, k), s s k (i) k p (i) (a, k) , s s k (i) k 0 , s (j) k+1 non-final, s(j) k+1 final non-final, s(j) k+1 non-final not reachable from s(i) k The cond... |

61 | Rate-distortion optimized packet sched- uling and routing for media streaming with path diversity,” in
- Chakareski, Girod
- 2003
(Show Context)
Citation Context ...e error concealment scheme is applied. Hence the remaining term is simply calculated as σ2 e0(C, λ) = σ2 u0(C, λ) − σ2 b0 . In case of a packet loss base layer distortion σ2 b0 appears at the (3) (5) =-=(6)-=-sσ 2 u0(C, λ) σ 2 b0 σ 2 v[k − K] K kth frame in T INTRA Period Figure 3. Illustration of the modified distortion model for FGS video base layer as a result of error concealment process. Since base la... |

58 | Joint source/FEC rate selection for quality-optimal MPEG–2 video delivery - Frossard, Verscheure - 2001 |

52 | Soft ARQ for layered streaming media,”
- Podolsky, McCanne, et al.
- 1998
(Show Context)
Citation Context ...hat no ACK is received for the mth transmission of kth frame until state s (i) k (i.e. qs (i) (a, m) = 1). p (i) (a, k) s k △ = k� m=0, q s (i) (a,m)=1 k k P {RT T > (k − m + 1)∆T |RT T > (k − m)∆T } =-=(4)-=- Hence given the above definitions the average reward optimal policy π∗ (λ) for rate constraint λ is calculated by using linear programming as formulated in Eqn.5 where the πa(i) ∗ denotes the probabi... |

51 | Packet scheduling algorithm for wireless video streaming,” in
- Kang, Zakhor
- 2002
(Show Context)
Citation Context ... fsuc(λ))δ[k] + σ 2 b0(1 − P ∗ 1 − γk fsuc(λ)) , for k ∈ [0, T − 1] (7) 1 − βk The parameters β = 1/T and γ in Eqn. 7 correspond to the intra frame rate and leakage factor, respectively, where β, γ ∈ =-=[0, 1]-=-. Hence Dv(C, λ) can be obtained by the superposition of T shifted error signals in Eqn. 7 under the assumption that the decoder is linear and error signals are uncorrelated. On the other hand De(C, λ... |

33 | Application layer error-correction coding for rate-distortion optimized streaming to wireless clients
- Chakareski, Chou
- 2004
(Show Context)
Citation Context ...nt of the FGS part of the video and the remaining term is the propagated error signal as given in. 2 σ 2 v[k] = σ 2 e0(C, λ)(1 − P ∗ fsuc(λ))δ[k] + σ 2 b0(1 − P ∗ 1 − γk fsuc(λ)) , for k ∈ [0, T − 1] =-=(7)-=- 1 − βk The parameters β = 1/T and γ in Eqn. 7 correspond to the intra frame rate and leakage factor, respectively, where β, γ ∈ [0, 1]. Hence Dv(C, λ) can be obtained by the superposition of T shifte... |

14 | Lowcomplexity rate-distortion optimized video streaming
- Chakareski, Apostolopoulos, et al.
- 2004
(Show Context)
Citation Context ...en simple error concealment scheme is applied. Hence the remaining term is simply calculated as σ2 e0(C, λ) = σ2 u0(C, λ) − σ2 b0 . In case of a packet loss base layer distortion σ2 b0 appears at the =-=(3)-=- (5) (6)sσ 2 u0(C, λ) σ 2 b0 σ 2 v[k − K] K kth frame in T INTRA Period Figure 3. Illustration of the modified distortion model for FGS video base layer as a result of error concealment process. Since... |

13 | Optimal packet scheduling for wireless video streaming with error-prone feedback
- Tian, Li, et al.
- 2004
(Show Context)
Citation Context ...based and ns-2 simulations are conducted by using an I-P-P coded H.264 video with an MPEG4 FGS encoded bit stream as enhancement layer from FOREMAN, CARPHONE sequences for four times sampled at a t=0 =-=(8)-=-slog(D tot (C,λ)) 2.4 2.3 2.2 2.1 2 1.9 1.8 1.7 1.6 1.5 1.4 1.3 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 Rate constraint (λ=C/B) (a) original video μ R =75ms μ R =100ms μ R =150ms μ R =200ms μ R =250ms log(D... |

10 | Throughput optimization using adaptive techniques,” submitted to - Yoo, Lavery, et al. |

2 | An adaptive media-aware retransmission timeout estimation method for low-delay packet video - Begen, Altunbasak - 2007 |

1 |
Rate distortion optimization with adaptive FEC for real-time wireless multimedia
- Seferoglu, Altunbasak, et al.
- 2005
(Show Context)
Citation Context ... determined only by the λ ∗ . Hence the minimization procedure of the RC algorithm in Eqn. 9 is iterated until the value for λ ∗ converges. λ ∗ = arg min λ∈Λ De(C, λ) + Dv(C, λ) = arg max P SNR(C, λ) =-=(9)-=- λ∈Λ 3. SIMULATION RESULTS The simulation results for the OSRC framework are obtained by using both a model based simulator and standard ns-2 simulator. The model based simulator simply applies packet... |

1 | Real-time low-complexity adaptive approach for enhanced QoS and error resilience in MEPG-2 video transport over RTP networks - Cavusoglu, Schonfeld, et al. - 2005 |