The nine articles in this special section focus on the use of deep learning program for mobile sensing technologies and applications. Smart devices equipped with a rich set of sensors, such as smartphones and wearable...
详细信息
The nine articles in this special section focus on the use of deep learning program for mobile sensing technologies and applications. Smart devices equipped with a rich set of sensors, such as smartphones and wearables, are enabling an ever-increasing number of mobile applications, ranging from user behavior perception such as gesture recognition and health monitoring to context inference such as driving detection and hazard warning. However, reliably inferring high-value user behavior and context information from noisy and highly heterogeneous sensor data using mobile devices remains an open issue. To combat against the constraints of a mobile device, one conventional approach is to upload raw sensor data to the cloud and run complex inference algorithms remotely. This leads to inefficiency in terms of network overhead and large latency for mobile applications. Recently, deep learning techniques have made significant breakthroughs in achieving state-of-art inference performance in a variety of applications such as computer vision and natural language processing. In general, data modeling challenges found in mobile sensing can often be seen in deep-learningbased inference.
The tremendously rapid popularization of smart phones has significantly impacted our daily lives. Smartphones are used not only for voice communication but also for various purposes such as information search (e.g., W...
The tremendously rapid popularization of smart phones has significantly impacted our daily lives. Smartphones are used not only for voice communication but also for various purposes such as information search (e.g., Web, Location-Based Services (LBS), etc.), E-commerce (e.g., on-line shopping, trading, etc.), and establishing social relationships (i.e., Social networking Services (SNSs)). Meanwhile, in the last decade, various new technical advances such as Internet of Things (IoT), machine-to-machine (M2M), Intelligent Transport Systems (ITS), cloud computing, and crowdsourcing have become a big trend and have had significant impacts on both academic and social aspects.
The 15 papers in this special issue are extended versions of papers presented at the 2010 IEEE International conference on multimedia and Expo (ICME), held in Singapore on July 19-23, 2010. These papers cover a wide r...
详细信息
The 15 papers in this special issue are extended versions of papers presented at the 2010 IEEE International conference on multimedia and Expo (ICME), held in Singapore on July 19-23, 2010. These papers cover a wide range of topics in multimedia including user interface, content understanding, mobility, 3-D processing, storage, and forensics.
Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are...
详细信息
Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the organizations if they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable of devastating the company's intangible assets silently. Vandalism of intellectual property or conducting industrial espionage for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the causes for the associate computer crimes and prevents the related information security incidents from occurring. At last, a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.
Data aggregation in wireless sensor networks is widely accepted as an essential paradigm for energy efficient routing but with low reliability under node and link failures. In this paper, we propose a protocol called ...
详细信息
In this paper, a precise error-tracking scheme for robust transmission of real-time video streaming over wireless IP network is presented. By utilizing negative acknowledgements from feedback channel, the encoder can ...
详细信息
In this paper, a concatenated system combining turbo product codes and convolutional codes with soft decision Viterbi decoding algorithm and diversity is proposed to enhance the robustness of Unequal Error Protection ...
详细信息
An adaptive multimedia proxy is presented which provides (1) caching, (2) filtering, and (3) media gateway functionalities. The proxy can perform media adaptation on its own, either relying on layered coding or using ...
详细信息
An adaptive multimedia proxy is presented which provides (1) caching, (2) filtering, and (3) media gateway functionalities. The proxy can perform media adaptation on its own, either relying on layered coding or using transcoding mainly in the decompressed domain. A cost model is presented which incorporates user requirements, terminal capabilities, and video variations in one formula. Based on this model, the proxy acts as a general broker of different user requirements and of different video variations. This is a first step towards What You Need is What You Get (WYNIWYG) video services, which deliver videos to users in exactly the quality they need and are willing to pay for. The MPEG-7 and MPEG-21 standards enable this in an interoperable way. A detailed evaluation based on a series of simulation runs is provided.
An adaptive multimedia proxy is presented which provides (1) caching, (2) filtering, and (3) media gateway functionalities. The proxy can perform media adaptation on its own, either relying on layered coding or using ...
详细信息
An adaptive multimedia proxy is presented which provides (1) caching, (2) filtering, and (3) media gateway functionalities. The proxy can perform media adaptation on its own, either relying on layered coding or using transcoding mainly in the decompressed domain. A cost model is presented which incorporates user requirements, terminal capabilities, and video variations in one formula. Based on this model, the proxy acts as a general broker of different user requirements and of different video variations. This is a first step towards What You Need is What You Get (WYNIWYG) video services, which deliver videos to users in exactly the quality they need and are willing to pay for. The MPEG-7 and MPEG-21 standards enable this in an interoperable way. A detailed evaluation based on a series of simulation runs is provided.
In 2003, Chien and Jan proposed an authentication scheme for hybrid networking environments. The scheme consisted of two subschemes; an intra-domain authentication subscheme, and an inter-domain authentication subsche...
详细信息
ISBN:
(纸本)9780769529943;0769529941
In 2003, Chien and Jan proposed an authentication scheme for hybrid networking environments. The scheme consisted of two subschemes; an intra-domain authentication subscheme, and an inter-domain authentication subscheme. In 2006, Qiang and Chris analyzed these two subschemes and found security vulnerability. However, they did not correct the security problem they found. In this paper, we propose a scheme to correct that security problem.
暂无评论