期刊
  出版年
  关键词
结果中检索 Open Search
Please wait a minute...
选择: 显示/隐藏图片
1. Screen Content Coding with Primary and Secondary Reference Buffers for String Matching and Copying
Tao Lin, Kailun Zhou, Liping Zhao
ZTE Communications    2015, 13 (4): 53-60.   DOI: 10.3969/j.issn.1673-5188.2015.04.008
摘要82)      PDF (453KB)(79)    收藏
A screen content coding (SCC) algorithm that uses a primary reference buffer (PRB) and a secondary reference buffer (SRB) for string matching and string copying is proposed. PRB is typically the traditional reconstructed picture buffer which provides reference string pixels for the current pixels being coded. SRB stores a few of recently and frequently referenced pixels for repetitive reference by the current pixels being coded. In the encoder, searching of optimal reference string is performed in both PRB and SRB, and either a PRB or SRB string is selected as an optimal reference string on a string-by-string basis. Compared with HM-16.4+SCM-40 reference software, the proposed SCC algorithm can improve coding performance measured by bit-distortion rate reduction of average 4.19% in all-intra configuration for text and graphics with motion category of test sequences defined by JCT-VC common test condition.
相关文章 | 多维度评价
2. Security Service Technology for Mobile Networks
Aiqun Hu, Tao Li, and Mingfu Xue
ZTE Communications    2011, 9 (3): 49-54.  
摘要49)      PDF (345KB)(71)    收藏
As mobile networks become high speed and attain an all-IP structure, more services are possible. This brings about many new security requirements that traditional security programs cannot handle. This paper analyzes security threats and the needs of 3G/4G mobile networks, and then proposes a novel protection scheme for them based on their whole structure. In this scheme, a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control. At the security management center, security services such as validity verification and integrity check are provided to mobile terminals. In this way, terminals and the network as a whole are secured to a much greater extent. This paper also highlights problems to be addressed in future research and development.
相关文章 | 多维度评价