Modality conversion is an important part in the content adaptation process of a Universal multimediaaccess system. The decision on modality conversion is dependent on terminal/network conditions and on the user prefe...
详细信息
Modality conversion is an important part in the content adaptation process of a Universal multimediaaccess system. The decision on modality conversion is dependent on terminal/network conditions and on the user preference. We propose a systematic and comprehensive approach to make decision on modality conversion in a UMA system. Our approach includes three integral components, (1) an overlapped content model, (2) a flexible specification of user preference on modality conversion, and (3) a resource allocation method to distribute resource to multiple contents.
This paper proposes two algorithms adopted in a prototype network architecture, for optimal selection of multimediacontent delivery methods, as well as balanced delivery load, by exploiting a novel resource predictio...
详细信息
ISBN:
(纸本)9781467364324
This paper proposes two algorithms adopted in a prototype network architecture, for optimal selection of multimediacontent delivery methods, as well as balanced delivery load, by exploiting a novel resource prediction engine. The proposed architecture exploits both algorithms for the prediction of future multimedia services demands, by providing the ability to keep optimal the distribution of the streaming data, among content Delivery Networks, cloud-based providers and Home Media Gateways. In addition, the prediction of the upcoming fluctuations of the network, provides the ability to the proposed network architecture, achieving optimized Quality of Service (QoS) and Quality of Experience (QoE) for the end users. Both algorithms were evaluated to establish their efficiency, towards effectively predicting future network traffic demands. The experimental results validated their performance and indicated fields for further research and experimentation.
multimedia data, which are direct reflections of the real world, have unlimited semantic interpretations within different application domains. In order to reuse information resources, in this paper, we provide a layer...
详细信息
ISBN:
(纸本)0889863806
multimedia data, which are direct reflections of the real world, have unlimited semantic interpretations within different application domains. In order to reuse information resources, in this paper, we provide a layered architecture of multimedia schema - raw multimedia layer, domain knowledge layer, and user profile layer. Raw multimedia layer provides non-semantic management of data, including storage allocations, buffer algorithms and strategies, and multimedia preprocessing facilities. Domain knowledge layer provides semantic-oriented management and access of multimedia data. Different domains can utilize different knowledge bases to support semantic interpretations. We use Frame and Semantic Network as the representation models for domain knowledge. content-based retrievals can be performed on different levels of visual object constructions or concept abstractions. Furthermore, since different individual users may have different interpretations for fuzzy specifications in their queries, user profiles are created and used to support fuzzy retrievals of multimedia data.
We propose a new index structure, called the HG-tree, to support content-based retrieval in multimedia databases. Our goals are twofold: increasing the storage utilization and decreasing the directory coverage of the ...
详细信息
We propose a new index structure, called the HG-tree, to support content-based retrieval in multimedia databases. Our goals are twofold: increasing the storage utilization and decreasing the directory coverage of the index tree. The first goal is achieved by absorbing splitting if possible, and when splitting is necessary, converting two nodes to three. This is done by proposing a good ordering on the directory nodes. The second goal is achieved by representing the directory regions compactly. We note that there is a trade-off between above two design goals, but the HG-tree is so flexible that it can control the trade-off. We present the design of our index tree and associated algorithms. In addition, we report the results of a series of tests, comparing the proposed index tree with the buddy-tree, which is one of the most successful access methods for a multidimensional space. The results show the superiority of our method.
This article describes primarily the development and empiric validation of a design for security warning messages on smartphones for primary school children (7-10 years old). Our design approach for security warnings ...
详细信息
ISBN:
(纸本)9780819489517
This article describes primarily the development and empiric validation of a design for security warning messages on smartphones for primary school children (7-10 years old). Our design approach for security warnings for children uses a specific character and is based on recommendations of a paediatrician expert. The design criteria are adapted to children's skills, e. g. their visual, acoustic, and haptic perception and their literacy. The developed security warnings are prototypically implemented in an iOS application (on the iPhone 3G/4G) where children are warned by a simulated anti-malware background service, while they are busy with another task. For the evaluation we select methods for empiric validation of the design approach from the field of usability testing ("think aloud" test, questionnaires, log-files, etc.). Our security warnings prototype is evaluated in an empiric user study with 13 primary school children, aged between 8 and 9 years and of different gender (5 girls, 8 boys). The evaluation analysis shows, that nearly all children liked the design of our security warnings. Surprisingly, on several security warning messages most of the children react in the right way after reading the warning, although the meaning couldn't be interpreted in the right way. Another interesting result is, that several children relate specific information, e. g. update, to a specific character. Furthermore, it could be seen that most of the primary school test candidates have little awareness of security threats on smartphones. It is a very strong argument to develop e. g. tutorials or websites in order to raise awareness and teach children how to recognize security threats and how to react to them. Our design approach of security warnings for children's smartphones can be a basis for warning on other systems or applications like tutorials, which are used by children. In a second investigation, we focus on webpages, designed for children since smartphones and webpages (t
The multimedia data are more present in the actual informatics systems. Because of characteristics of multimedia data, their management and querying techniques are unlike than those of traditional data. We can increas...
详细信息
ISBN:
(纸本)9789537138158
The multimedia data are more present in the actual informatics systems. Because of characteristics of multimedia data, their management and querying techniques are unlike than those of traditional data. We can increase the potential use of multimedia data across various applications by assuring semantics-driven access to multimedia data. In this paper we propose a solution, based on MPEG-21 standard, to describe the multimediacontent and to integrate it with the semantic web.
This paper provides an overview of 2 different methods for evaluation of multimedia (video) summarizations. A tag-based method focuses on tags selected for an analyzed video sequence. It checks if a summarized video s...
详细信息
ISBN:
(纸本)9783319986784;9783319986777
This paper provides an overview of 2 different methods for evaluation of multimedia (video) summarizations. A tag-based method focuses on tags selected for an analyzed video sequence. It checks if a summarized video sequence contains important content. An annotation method uses an annotation procedure to exact the key shots from full video sequences. Both methods used collectively allow for complex evaluation of summarizing algorithms. The paper contains descriptions and test results for both methods. The paper concludes with some suggestions for future directions.
The paper presents an MPEG-7 multimedia Description Schemes (MDS)-based metadata and user profile model used within,in enhanced DTV environment for semantic annotation and personalized access to multiple sports DTV se...
详细信息
ISBN:
(纸本)0780393317
The paper presents an MPEG-7 multimedia Description Schemes (MDS)-based metadata and user profile model used within,in enhanced DTV environment for semantic annotation and personalized access to multiple sports DTV services. It is shown that in order to enable intelligent and personalized processing, management and use of multimediacontent and services, the use of application specific metadata descriptions and adequately formulated user profiles is most important. Thus, application specific semantic metadata and user profile definitions are presented in this paper. Metadata and user profile instances are generated by Authoring/Annotation tools or User Profile Registration client applications respectively. Personalized access to sports DTV services is achieved by metadata and user profile instance description matching and content filtering at either the server or the client side. At the same time, dynamic client configuration, transparent to the end-User, is accomplished by automatically processing configuration specific metadata descriptions using specially designed application modules at the client side. The main purpose is to enable personalized integrated multimedia services access in the sports domain over DTV infrastructures.
Many proposed video content analysis algorithms for surveillance applications are very computationally intensive, which limits the integration in a total system, running on one processing unit (e.g. PC). To build flex...
详细信息
ISBN:
(纸本)081946113X
Many proposed video content analysis algorithms for surveillance applications are very computationally intensive, which limits the integration in a total system, running on one processing unit (e.g. PC). To build flexible prototyping systems of low cost, a distributed system with scalable processing power is therefore required. This paper discusses requirements for surveillance systems, considering two example applications. From these requirements, specifications for a prototyping architecture are derived. An implementation of the proposed architecture is presented, enabling mapping of multiple software modules onto a number of processing units (PCs). The architecture enables fast prototyping of new algorithms for complex surveillance applications without considering resource constraints.
The sharing, distribution and transmission of proliferated digital multimediacontents over the insecure worldwide available Internet and wired/wireless networks has encouraged the copyright fraud, unauthorized access...
详细信息
ISBN:
(纸本)9783642292156
The sharing, distribution and transmission of proliferated digital multimediacontents over the insecure worldwide available Internet and wired/wireless networks has encouraged the copyright fraud, unauthorized access and illegal usage. This brings new technical challenges to provide the end-to-end security to multimediacontents for establishing ownership rights, ensuring authorized access, preventing illegal replication etc. To address the above mentioned requirements, a visual multimediacontent protection technique is proposed. The technique is based on the high dynamic responses of multiple high-dimensional chaotic systems. The multimedia encryption is achieved by randomly picking the actual encryption keys out of numbers of hybridized keys that are extracted from complex sequences of three high dimensional chaotic systems. Accordingly, a high encryption effect is turned up in the encrypted content. The proposed technique is experimented on the multimedia color imagery. The decomposed R, G, B components of color plain-image are initially diffused with their self, before diffusing with encryption keys. It is experimentally verified that the proposed technique has great encryption performance and achieves high confidential security. Eventually, the statistical results confirm the practicability and suitability of the approach for visual multimediacontent protection.
暂无评论