This paper presents a high-level overview of Yahoo Research Berkeley's approach to multimedia research and the ideas motivating it. This approach is characterized primarily by a shift away from building subsystems...
详细信息
ISBN:
(纸本)9781595937780
This paper presents a high-level overview of Yahoo Research Berkeley's approach to multimedia research and the ideas motivating it. This approach is characterized primarily by a shift away from building subsystems that attempt to discover or understand the "meaning" of media content toward systems and algorithms that can usefully utilize information about how media content is being used in specific contexts;a shift from semantics to pragmatics. We believe that, at least for the domain of consumer and web videos, the latter provides a more promising basis for indexing media content in ways that satisfy user needs. To illustrate our approach, we present ongoing work on several applications which generate and utilize contextual usage meta-data to provide novel and useful media experiences. Copyright 2007 ACM.
The growing amount of multimedia data available to the average user has reached a critical phase where methods for indexing, searching, and efficient retrieval are expressly needed to manage the information load. In t...
详细信息
ISBN:
(纸本)9780769529325
The growing amount of multimedia data available to the average user has reached a critical phase where methods for indexing, searching, and efficient retrieval are expressly needed to manage the information load. In this paper, we present a hybrid video database model which is a combination of the hierarchical video database model and annotations using. In particular, we extend the original hierarchical indexing mechanism to add frames and salient objects as the lowest granularity level in the video tree with the aim to support multi-level access control. In conjunction, with the use of annotations, we give users more solutions to query for their interesting videos based on the video contents (content-based retrieval). In addition, we also tailor the original database access control model to fit the characteristics of video data. Our updated model supports both multiple access control policies, means a user may be affected by multiple polices, and multilevel access control, means an authorization may be specified at any video levels.
What is considered large is a moving target for modern multimedia files: while storing these files is accommodated by ever larger capacity of storage device, delivering them via the Internet is still outpacing availab...
详细信息
iTVP is a system built for IP-based delivery of live TV programming, video-on-demand and audio-on-demand with interactive access over IP networks. It has a country-wide range and is designed to provide service to a hi...
详细信息
ISBN:
(纸本)9780819466174
iTVP is a system built for IP-based delivery of live TV programming, video-on-demand and audio-on-demand with interactive access over IP networks. It has a country-wide range and is designed to provide service to a high number of concurrent users. iTVP prototype contains the backbone of a two-level hierarchical system designed for distribution of multimediacontent from a content provider to end users. In this paper we present experience gained during a few months of the prototype operation. We analyze efficiency of iTVP content distribution system and resource usage at various levels of the hierarchy. We also characterize contentaccess patterns and their influence on system performance, as well as quality experienced by users and user behavior. In our investigation, scalability is one of the most important aspects of the system performance evaluation. Although the range of the prototype operation is limited, as far as the number of users and the content repository is concerned, we believe that data collected from such a large scale operational system provides a valuable insight into efficiency of a CDN-type of solution to large scale streaming services. We find that the systems exhibits good performance and low resource usage.
In this paper, we address the issues of multimediacontent search and replication over peer-to peer networks. We use the concept of semantic proximity that exploits the file exchange patterns exhibited among peer user...
详细信息
ISBN:
(纸本)9781595937780
In this paper, we address the issues of multimediacontent search and replication over peer-to peer networks. We use the concept of semantic proximity that exploits the file exchange patterns exhibited among peer users so as to decompose the network into semantic clusters. Peer nodes are then decomposed into semantic clusters so that a) the probability that a node locates content within its own cluster is maximized, while simultaneously b) the respective probability of finding this content outside this cluster is minimized The semantic organization is then used for applying efficient cluster-based content replication strategies. Two different schemes are examined;the unrestricted and the restricted approach. The first one distributes multimediacontent within peers of a cluster so that the average hop distance among nodes and objects weighted by the object popularity is minimized. This approach takes into account no Quality of Service (QoS) guarantees. Instead, the second scheme iteratively partitions the nodes of a cluster during each object replication based on a QoS violation criterion. The proposed algorithms are experimentally evaluated and compared with other approaches to demonstrate the efficacy of the proposed schemes. Copyright 2007 ACM.
The paper discusses the relation between accessibility and multimodality of learning objects. I present a framework, rooted in linguistics, that supports a clear distinction between content and expression of learning ...
详细信息
ISBN:
(纸本)9783540732822
The paper discusses the relation between accessibility and multimodality of learning objects. I present a framework, rooted in linguistics, that supports a clear distinction between content and expression of learning objects. The framework supports different types of content elements, and different expression elements in which content can be rendered, which include different expression media, multimedia components and spatial/temporal/hyper-relationships. I show what accessibility means in such a framework, and what the consequences of accessibility are in terms of automatic transformations of expression that can occur on student platforms. I argue that accessibility of learning objects, though making them multimodal, is not a satisfactory solution from the viewpoint of learning effectiveness. I claim that content modeling needs to be a crucial step in the development of any learning object, and propose notations based on conceptual maps and UML diagrams.
This paper describes a partial development of the "i2CAT Machine Project", a project that builds a complete framework of media publication and consumption, where users can share audiovisual contents in a sec...
详细信息
ISBN:
(纸本)9780769530307
This paper describes a partial development of the "i2CAT Machine Project", a project that builds a complete framework of media publication and consumption, where users can share audiovisual contents in a secured, adaptive and personalized way, following the concept of Universal multimediaaccess (UMA). Our work focuses on the module in charge of the content metadata storage and management which is called Metadata Management & Personalization (MM&P) module. It embraces content cataloguing, advanced searches, session mobility, strategies for content adaptation, user actions tracking, and it is envisaged to provide content recommendations based on user preferences in the near future. To reach this goal, the module provides extensive use of MPEG-21 and MPEG-7 standards ensuring interoperability with other similar systems.
The ultimate target of the global telecommunication and entertainment companies is pursuing delivery content of "Internet to Home Television and Mobile" devices. But consumers want more. They also want their...
详细信息
ISBN:
(纸本)9780889866584
The ultimate target of the global telecommunication and entertainment companies is pursuing delivery content of "Internet to Home Television and Mobile" devices. But consumers want more. They also want their TV or mobile phone to interact with the content of websites. The IPTV and 3G IPv6 technology makes this possible. This paper proposes to use dual stack, tunneling, and translation techniques to enhance the IPTV system for multimedia services in 3G mobile devices. The new IPTV system will satisfy the desire of consumers for new multimedia devices in the communication and entertainment industry.
For most Portable Media Player (PMP), the demands for large storage space and longer working time usually can not be satisfied at the same time. In this paper, a low power wireless LAN based PMP called WiPMP is propos...
详细信息
ISBN:
(纸本)9781424418893
For most Portable Media Player (PMP), the demands for large storage space and longer working time usually can not be satisfied at the same time. In this paper, a low power wireless LAN based PMP called WiPMP is proposed. WiPMP is basically a disk-less PMP. Instead, it can retrieve a large number of multimedia data from a remote storage device wire-lessly. A prototype of WiPMP has been realized on an Intel Xscale embedded platform with Embedded Linux as the operating system. A systematic power measurement and analysis method is used in this paper to evaluate the prototype from the perspective of power consumption. The result shows that WiPMP does consume less power and is able to access much more multimedia data than the hard disk based PMP.
In this paper, a new multimedia joint fingerprinting and encryption (JFE) scheme embedded into the advanced accesscontent system (AACS) is proposed. Like other security-related systems, there exist some security thre...
详细信息
ISBN:
(纸本)9781424410163
In this paper, a new multimedia joint fingerprinting and encryption (JFE) scheme embedded into the advanced accesscontent system (AACS) is proposed. Like other security-related systems, there exist some security threats to the proposed framework To cope with these difficulties, the contributions of this paper include: (i) we apply multimedia encryption at different points to resist some attacks points,and (ii) we propose rewritable fingerprint embedding (RFE) to deal with some multi-point collusion attacks. Experimental results are provided to demonstrate the proposed AACS-compatible JFE method.
暂无评论