22 research outputs found
Recommended from our members
Decisiones mille et sex casuum conscientiae ::e diversis theologorum scriptis collectae, contractae ... das ist kurtze und richtige erörterung ein Tausend und Sechs Bewissens Fragen ... /
Efficient transmission infrastructure for scalable coded MPEG-4/H.264 video
If the results of the latest studies for Internet usage are to be believed, worldwide 12 million TV consumers will be using Internet Protocol TV (IPTV) instead of the traditional TV broadcasting by the year 2010. These figures were published by ABI Research in 2006. Furthermore, analysts of InformaTelecoms & Media are forecasting the worldwide growth in revenue of IPTV to be ten billion dollar by 2010. The revolution that is described by these figures implies on the one hand an enormous increase in sales values but on the other hand causes problems in handling the data volume. Therefore, efficient encoding of media data has to be applied to save transmission capacity. This paper will give a short overview of a possible infrastructure setup for efficient rate-shaping mechanisms and media delivery
Cycle-based limitation for cryptographic keys to be used in multimedia subscription services
If the results of the latest studies of ABI Research for Internet usage are to be believed, worldwide twelve million TV consumers will be using Internet Protocol Television (IPTV) instead of the traditional TV broadcasting by the end of 2010. Furthermore, analysts of Informa Telecoms & Media are forecasting the worldwide grow in revenue of IPTV to be ten billion US dollar by 2010. The revolution that is described by these figures implies on the one hand an enormous increase in sales values but on the other hand causes problems in handling the data volume. Moreover, IPTV will be attracting criminal attacks like Pay-TV has in traditional broadcasting. Therefore, not only efficient encoding of media data has to be applied to save transmission capacity, but also security mechanisms should be established to prevent unauthorised access. Interesting and promising encryption schemes which can be seamlessly integrated have been proposed in the past. Unfortunately, most of these outstanding solutions missed to cover key generation and management. This paper will unveil methods for both qualitative and cycle-based conditional access (CA)
Decisiones Mille et sex Casuum Conscientiae, E Diversis Theologorum Scriptis collectae, contractae, et in brevitatem redactae, ac Iuxta ordinem Locorum Theologicorum positae. Das ist Kurtze und richtige erörterung Ein Tausendt und Sechs Gewissens Fragen, auff vielerley, in Theologischen Schulen Predigampte, und Consistorien fürfalle[n]den Sachen und Zutragenden wichtigen fällen; Auß vielen Hochgelährter Theologe[n] Schrifften, Consilien, Belehrnungen Urtheilen, unnd Abschieden
Wahre und rechtmessige Ubung Des Christenthumbs/ welche bestehet in Gottseligem Leben/ offentlichem Gottesdienst/ demütiger Busse/ würdigem Gebrauch des heiligen Abendmahls/ und seeligen Abschied von der Welt
Disputatio Theologica De Religione Tutissima Ex judicio Papismi, Calvinismi, Photinianismi
Kurtze und richtige Erörterung/ Tausend und Sechs Gewissens Fragen/ auff vielerley in Theologischen Schulen/ Predigampte/ und Consistorien fürfallenden Sachen und zutragenden wichtigen Fällen
Dissertatio historico-politica de causis expeditionis, à ... memoriae rege Gustavo Adolpho, in Germaniam qvondam susceptae, quam praeside ... Dno. Svenone Dimberg, mathematum professore ordinario, ... in Regia Academia Gustaviano-Carolina, qvae Dorpati Livonorum est, publico placidoq[ue] disqvirentium examini submittet autor & respondens Georgius à Dunte, Rigâ Livonus, die [ ] Januar A. C. M.DC.XCI. Dorpati, typis Johannis Brendeken, Acad. typogr.
https://www.ester.ee/record=b1690695*es
