The new MPEG-4 Audio standard provides two toolsets for synthetic Audio generation, Audio processing and multimediacontent description called Structured Audio (SA) and BInary Format for Scenes (BIFS). Moving from a s...
详细信息
ISBN:
(纸本)0780370414
The new MPEG-4 Audio standard provides two toolsets for synthetic Audio generation, Audio processing and multimediacontent description called Structured Audio (SA) and BInary Format for Scenes (BIFS). Moving from a systematic analysis of SA and from the implementation of an efficient SA decoder, this paper describes the design of a virtual DSP architecture able to exploit the data level parallelism contained in many typical audio processing algorithms. The proposed virtual DSP architecture shows good performance on general purpose platforms and can be easily adapted and optimized for parallel superscalar devices. The porting and results on a V-LIW DSP device confirm the effectiveness and flexibility of the approach, particularly suitable for standalone embedded solutions.
The emergence of smart Wi-Fi access points (AP), which are equipped with huge storage space, opens a new research area on how to utilize these resources at the edge network to improve users' quality of experience ...
详细信息
The emergence of smart Wi-Fi access points (AP), which are equipped with huge storage space, opens a new research area on how to utilize these resources at the edge network to improve users' quality of experience (e.g., a short startup delay and smooth playback). One important research interest in this area is content prefetching which predicts and accurately fetches contents ahead of users' requests to shift the traffic away during peak periods. However, in practice, the different video watching patterns among users and the varying network connection status lead to the time-varying server load, which eventually makes the content prefetching problem challenging. To understand this challenge, this paper first performs a largescale measurement study on users' AP connection and TV series watching patterns using real traces. Then, based on the obtained insights, we formulate the content prefetching problem as a Markov decision process. The objective is to strike a balance between the increased prefetching and storage cost incurred by incorrect prediction and the reduced content download delay because of successful prediction. A learning-based approach is proposed to solve this problem and another three algorithms are adopted as baselines. In particular, first we investigate the performance lower bound by using a random algorithm and the upper bound by using an ideal offline approach. Then, we present a heuristic algorithm as another baseline. Finally, we design a reinforcement learning algorithm that is more practical to work in the online manner. Through extensive trace-based experiments, we demonstrate the performance gain of our design. Remarkably, our learning-based algorithm achieves a better precision and hit ratio (e.g., 80%) with about 70% (resp. 50%) cost saving compared to the random (resp. heuristic) algorithm.
Image encryption is a fundamental component of modern data security that guarantees the integrity, privacy, and confidentiality of sensitive visual content. This paper provides a thorough examination of image encrypti...
详细信息
This paper presents a new approach for the classification and retrieval of three-dimensional images and models from databases. A set of retrieval algorithms is introduced. These algorithms are content-based, meaning t...
详细信息
The proceedings contain 13 papers. The topics discussed include: case studies on context-aware mobile multimedia services;content-based image retrieval systems - reviewing and benchmarking;delivery context description...
The proceedings contain 13 papers. The topics discussed include: case studies on context-aware mobile multimedia services;content-based image retrieval systems - reviewing and benchmarking;delivery context descriptions - a comparison and mapping model;a novel tool for quick video summarization using keyframe extraction techniques;authoring interactive mobile services using MPEG-7 and MPEG-4 LASeR;an user study on rich media mobile guide applications;what algorithms for urban routing on mobile devices?;towards the use of multimediacontents to represent events in vehicular ad hoc networks;a multimedia service with MPEG-7 metadata and context semantics;a standards-based generic approach for complex multimedia management;contribution to the modeling of multimedia metadata in a distributed architecture;media center oriented Linux operating system;and a multi-level access control scheme for multimedia database.
This paper analyzes the asymptotic performance of Maximum Likelihood (ML) channel estimation algorithms in wideband code division multiple access (WCDMA) scenarios. We concentrate on systems with periodic spreading se...
详细信息
ISBN:
(纸本)0780370414
This paper analyzes the asymptotic performance of Maximum Likelihood (ML) channel estimation algorithms in wideband code division multiple access (WCDMA) scenarios. We concentrate on systems with periodic spreading sequences (period larger than or equal to the symbol span) with high spreading factors, where the transmitted signal contains a code division multiplexed pilot for channel estimation purposes. Assuming randomized training and code sequences, we derive and compare the asymptotic covariances of the training-only (TO), semi-blind conditional ML (CML) and semi-blind Gaussian ML (GML) channel estimators.
content inappropriate for children on Internet television is a serious problem in today's multimedia world. There are numerous methods which are used to control the content of the transmitted television programmes...
详细信息
ISBN:
(纸本)9781467344715
content inappropriate for children on Internet television is a serious problem in today's multimedia world. There are numerous methods which are used to control the content of the transmitted television programmes. However, these well-known methods do not solve the above mentioned problem completely. The paper presents a more effective method for automatic identification of the provider's logo based on an original image sequence analysis. The automatic identification of the provider's logo can be used to block access to video programmes of the selected providers. The method has been tested on some chosen video transmissions on-line, achieving over 98% of correct identification.
The paper describes Ethersim, a simulation tool to model and study the performance of integrated service networks that provide multimedia (audio, video, data) information access to mobile users carrying portable wirel...
详细信息
ISBN:
(纸本)0780333373
The paper describes Ethersim, a simulation tool to model and study the performance of integrated service networks that provide multimedia (audio, video, data) information access to mobile users carrying portable wireless terminals and hosts. The design process of such networks requires a proper understanding of how network and multimedia application performance is affected by (i) the choice of algorithms and protocols at various network layers, (ii) the wireless link characteristics, (iii) the presence of mobile hosts, and (iv) the host mobility patterns. Analytic approaches to study these problems suffer from intractability in such complex systems, while the inflexibility of making measurements on testbed systems makes it difficult to draw generalized conclusions. Simulation is an alternative, but available simulators provide poor support, many, for mobility and wireless. Ethersim has been built using a discrete event based simulator core and incorporates models of user applications and transport, network and MAC layer protocols. It provides the capability to specify network topology and host mobility patterns. The software architecture of Ethersim employs five special entities: an air module, a map, a mover, mobile hosts, and basestations. The air module models the physical air-interface effects (e.g., RF power decay, frequency collisions etc.). The mover is a central entity that moves the mobile hosts on the map. Ethersim allows for both random and goal-directed movements of mobile hosts, and also allows synchronized goal-directed movements to model conference room type mobility patterns. We also present case-studies of using Ethersim to model and study the interaction of transport layer, connection rerouting protocol, and radio characteristics in a mobile and wireless ATM network at Bell Laboratories.
The proceedings contain 65 papers. The special focus in this conference is on Collaborative multimedia environments, multimedia databases, Distributed multimediasystems/computing I, multimedia software engineering, m...
ISBN:
(纸本)1891706217
The proceedings contain 65 papers. The special focus in this conference is on Collaborative multimedia environments, multimedia databases, Distributed multimediasystems/computing I, multimedia software engineering, multimedia for ambient and environment management and Distributed multimedia computing ii. The topics include: Assessing and computing blended and pure learning approaches;a scalable architecture for latency sensitive massively multiplayer online games;E-education to reach the unreached;region based image clustering using distributed K-median clustering;appropriate cutting segments of XML elements for multiple keywords queries;an interactive visualization system for exploring time-series data;a conceptual approach for active surveillance of indoor environments;a self-organizing approach to mission initialization and control in emergency management;a black-box testing method for multi-agent systems;a new browsing model based on AJAX strategies;a method for verifying usability and performance of a multi-user healthcare embedded system;towards a formal semantics for distributed multimedia computing;data normalization and fusion in multibiometric systems;an ambient intelligence application for cultural heritage;an integrated system for easying the access to georeferenced information on the web;exploiting MPEG-21 file format for cross media content;effects of agents communications on system performance in medical organizations;vLab, a virtual laboratory for computer engineering education;multimedia knowledge eclipse environment;distributed E-learning with TAO through eclipse and grid computing;teaching with eclipse through the simulations;improving student’s self-efficacy using an adaptive approach and beyond learning management systems in lifelong learning.
Based on the blobworld method, we propose a blob-centric image querying scheme that is comprised of several new techniques in content-based image retrieval. We report our research results in the database structure and...
详细信息
Based on the blobworld method, we propose a blob-centric image querying scheme that is comprised of several new techniques in content-based image retrieval. We report our research results in the database structure and maintenance algorithms for image indexing. We further conduct a performance comparison of image retrieval efficiency for three possible image retrieval methods, the naive method, the representative-blobs method, and the indexing method. Our quantitative analysis shows over 90% reduction in query response time by using the representative-blobs method and the indexing method.
暂无评论