Based on our research, we have put together a collection of papers and tutorials to provide you with insight into the following pioneering areas within the industry:
- Advanced Video Coding (AVC), Multiview Video (MVV) and 3D Video: HEVC (High Efficiency Video Coding) affords new and exciting user experiences including Multiview Video Coding (MVC) and a plethora of Mixed Reality (MR) 3D video experiences. Yet, while these technologies offer exciting user experiences, commonly deployed networks typically have inadequate bandwidth to support such content. See some of the latest solutions and proposed advances to make MVC and MR a reality over commonly deployed networks.
Richard A. Kramer, “Optimization of Interactive Live Free Viewpoint Multiview Video Streaming Bandwidth”, Oregon State University, April 10, 2017 (presented April 10, 2017).
Optimization of Interactive Live Free Viewpoint Video – Paper (link)
Optimization of Interactive Live Free Viewpoint Video – Presentation (PDF)
Richard A. Kramer, Aashutosh Y. Taikar, Warit Paweenbampen, Haya Alorayj, Surabhi Tushar Godambe, “The Challenges and Advances in Mixed Reality Video Technology”, Oregon State University, June 7, 2017 (presented, June 7, 2017).
The Challenges and Advances in Mixed Reality Video Technology – Presentation (PDF)
The Challenges and Advances in Mixed Reality Video Technology – Paper (PDF) - Data Protection and Secure Cyber Security Audit Logs: Unfortunately, data breaches and other malicious cyber security attacks have become commonplace. The following is an in-depth look at the latest technology in secure audit logging (used in forensically tracking malicious cyber attacks) and advances in technology to protect the audit log itself:
Richard A. Kramer, “Secure Audit Logging Systems with Privacy Preservation”, Oregon State University, October 25, 2016.
Secure Audit Logging Systems – Presentation (PDF) - Electronic Signatures Using a Variety of Encryption / Cryptographic Algorithms: Electronic signatures are wide-spread and many different encryption / cryptographic technologies abound related to creating electronic signatures, but which one is best? Surprisingly, while RSA is one of the best known signature schemes, RSA has many drawbacks related to the processing power required. The following provides a review of some alternative algorithms, including improved ESIGN algorithms, ECDSA (Elliptical-Curve, Digital Signature Algorithm), and ED25519 (Edwards-curve, Digital Signature Algorithm 25519) – see how they stack up against RSA.
Richard A. Kramer, “ESIGN and Other RSA Alternative Signature Schemes”, Oregon State University, February 8, 2017.
Efficient RSA Alternatives – Presentation (PDF)Richard A. Kramer, “A Survey of ESIGN: State of the Art and Proof of Security”, Oregon State University, January 16, 2017.
ESIGN and RSA Alternatives – Paper (PDF) - Video Streaming and Dynamic Network Traffic Flow: With video streaming making up the majority of today’s network traffic, the need for optimal network coding, video streaming, and dynamic flow scheduling technology has never been greater. The following is a review of some leading-edge technical solutions and proposals.
Richard A. Kramer, “An analysis of the paper: Efficient Multimedia Distribution in Source Constraint Networks”, Oregon State University, November 3, 2015.
Analysis of the Paper – Efficient Multimedia (PDF)Richard A. Kramer, “An analysis of the paper: Interactive Streaming of Stored Multiview Video Using Redundant Frame Structures”. Oregon State University, December 22, 2015.
Analysis of the Paper – Interactive Streaming of Stored Multiview (PDF)Richard A. Kramer, “An analysis for the paper: Video Streaming with Network Coding”, Oregon State University, November 2, 2015.
Analysis of the Paper – Video Streaming with Network Coding (PDF)Richard A. Kramer, Presentation/Lecture: “Hedera – An Analysis of Dynamic Flow Scheduling for Data Center Networks”, Oregon State University, October 25, 2015.
An Analysis of Dynamic Flow Scheduling – Presentation (PDF)
An Analysis of the Paper – Dynamic Flow Scheduling (PDF) - Wireless Communications and Mobile Devices: The proliferation of mobile technologies stretches the technological bounds ranging from battery efficient wireless communications to new and exciting technologies that can save people’s lives. Here, a couple select topics in wireless technology and mobile devices are reviewed:
- WBAN Communications: One exciting new area in wireless communications is WBAN (Wireless Body Area Networks) offering the proliferation technologies to monitor a person’s health and even detect and automatically seek help for emergency situations. See here the latest advances and promises in WBAN technology to detect life-threatening conditions before they happen.
Richard A. Kramer, Jin Phoy Rhee, “The Need, Advances and Challenges Related to Wireless Body Area Network Communications Technology”, Oregon State University, June 6, 2017 (presented, June 8, 2017).
Advances and Challenges Related to WBAN Technology – Presentation (PDF)
WBAN Challenges and Opportunities – Paper (PDF) - Cache Memory Enhancements Applicable to Mobile Devices: Surprisingly, the cache memory in mobile devices commands more silicon real-estate and power than the processor itself. Here we provide an examination of cache memory enhancements applicable to mobile devices.
Richard A. Kramer, Mathias Elmlinger, Abhishek Ramamurthy, Siva Pranav Kumar Timmireddy, “A Comprehensive Review of the Challenges and Opportunities Confronting Cache Memory System Performance”, Oregon State University, March 13, 2017 (presented March 16, 2017).
A Compressive Review of Cache Memory Performance Opportunities – Presentation (PDF)
Cache_Challenges_and_Opportunities_for_Mobile_Devices – Paper (PDF)
- WBAN Communications: One exciting new area in wireless communications is WBAN (Wireless Body Area Networks) offering the proliferation technologies to monitor a person’s health and even detect and automatically seek help for emergency situations. See here the latest advances and promises in WBAN technology to detect life-threatening conditions before they happen.