Author of the publication

Practical and Scalable Transmission of Segmented Video Sequences to Multiple Players Using H.264.

, , , , and . MIG, volume 5884 of Lecture Notes in Computer Science, page 256-267. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices., , , and . Secur. Commun. Networks, (2017)Improving CEMA using Correlation Optimization., , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 1-24 (2019)ALVIC-NG: state management and immersive communication for massively multiplayer online games and communities., , , , and . Multim. Tools Appl., 45 (1-3): 109-131 (2009)TweetPos: A Tool to Study the Geographic Evolution of Twitter Topics., , , and . WEBIST (1), page 257-266. SciTePress, (2014)Scalable transmission of avatar video streams in virtual environments., , , and . ICME, page 631-634. IEEE Computer Society, (2004)Investigating the Influence of Communication and Input Devices on Collaboration in Virtual Environments., , , , and . GRAPP, page 341-346. INSTICC Press, (2010)Investigating the relationship between QoS and QoE in a mixed desktop/handheld gaming setting., , , and . StudentWorkshop@CoNEXT, page 29-30. ACM, (2009)The Privacy API: Facilitating Insights in How One's Own User Data is Shared., , and . EuroS&P Workshops, page 72-75. IEEE, (2017)A comparative simulation of opportunistic routing protocols using realistic mobility data obtained from mass events., , , , , and . WOWMOM, page 1-6. IEEE Computer Society, (2013)Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering., , , , , and . WISEC, page 161-172. ACM, (2020)