The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There has been a lot of work on finding safest path from source to destination. However, all these works mainly rely on the crime data available through government sources. The works are missing many important factor that affect safety of a route. In this work, we first propose safety measurement score and then show how it can be used for safe navigation. We proposed a comprehensive safety measure...
Video summarization is an important multimedia task for applications such as video indexing and retrieval, video surveillance, human-computer interaction and video "storyboarding". In this paper, we present a new approach for automatic summarization of video collections that leverages a structured minimum-risk classifier and efficient submodular inference. To test the accuracy of the predicted...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The domain of minimally invasive surgery has recently attracted attention from the Multimedia community due to the fact that systematic video documentation is on the rise in this medical field. The vastly growing volumes of video archives demand for effective and efficient techniques to retrieve specific information from large video collections with visually very homogeneous content. One specific...
Video shot boundary detection is a fundamental step towards video information processing in e-learning scenarios. In the field of shot boundary detection, there still exists difficulty in choosing suitable thresholds for different videos, and empirical thresholds usually lead to low precision. Thus, we propose an original method to generate video-based threshold which is calculated by video itself...
As of February 2014 there were around 10 million registered user for massive open online courses(MOOCS) in about 1500 courses. One of the many reasons for such a huge user base is the advancements in the media streaming and storage technologies. Multimedia has emerged as a powerful and expressive medium for presenting information. However, according to a study, the average completion of MOOCS is around...
Keypoint matching between images is an important technique for computer vision applications such as image retrieval. Although binary feature descriptors such as BRIEF enable fast measurement of distance, exhaustive search is still time-consuming. Hashing methods such as Locality Sensitive Hashing (LSH), while being effective to accelerate searching, result in large memory consumption and thus are...
Traditional video mashup and summarization methods assume that all video clips have common audio, but with varying quality. Hence, selecting the best quality audio is sufficient. In this work we explore a new scenario in which a single person plays each instrument one by one, leading to multi-view video clips, but each video clip having only partial audio, e.g. a single instrument or vocal. To get...
Most modern keyboard-based computer systems cannot be operated without pointing devices such as mice, trackballs or touch interfaces. They hence have two input modes: keyboard and pointing. A pointing device's purpose is to convey the user's focus of attention to the computer in order to connect actions like clicking or moving the mousepointer to specific areas of the display such as buttons or input...
Perceptual quantization (PQ) for HDR video coding has good perceptual uniformity in the luminance range with the modest bit-depth. However, the dynamic range of HDR videos is not well-used in PQ according to contents, especially for chroma channels. Thus, there exist the wasted dynamic ranges in PQ which cause detail loss and color distortions. In this paper, we propose adaptive quantization-based...
In this paper, we design a system that can make calligraphy in real-time by using real Chinese brush. The system consists of two parts: calligraphy stroke generation and ink dispersion. In the calligraphy stroke generation, we use Kalman filter algorithm to deal with the unsmooth points at low speed, and combine arc and linear interpolation method to interpolate points with high speed, then we fill...
To effectively promote the development of national science and technology research, and evaluate the impact that emerging technologies on society culture and people's livelihood by taking into account the economic and social factors, this study has conducted feasibility analysis on evaluation of impact of science and technology on Taiwan. It establishes the parameters for such evaluation including:...
In this paper, the characteristics and effects of the data-open, function-reform and data-governance in the process of dealing with the challenges brought by the age of big data, were analyzed firstly. In China, these action plans adopted by governments have brought new changes in government functions restructuring, leading to a new pattern of government information resources management. Secondly,...
In 2015, around 3,000 websites, including Google, Yahoo, Facebook, Youtube and Twitter were blocked in mainland China under the policy of Internet censorship. Quite a number of these websites are social media and instant messaging related. This motivates us to investigate about the relationship between online activities and offline activities. We are especially interested in whether online political...
A smart city is an interconnected entity of internet of things and intelligent systems to provide qualify services to its citizens in various sectors such as public safety, healthcare, transportation and energy. In order for users to get the provided services, they have to access these services, provide and exchange a lot of personal information in an open, unsafe and interconnected environment. Therefore,...
Privacy for mobile devices will be more and more important, while data in the devices are easily be hacked. Traditional mobile unlocking systems such as inner password unlock and graphics unlock are unsecure so that this study is based on fingerprint with touch identify and Advanced Encryption Standard (AES) to effectively secure mobile privacy data and to reduce the risk of data leaking.
Application mobility is the paradigm where users can move parts of their running applications across multiple heterogeneous devices in a seamless manner. This mobility involves dynamic context changes of hardware, network resources, user environment and user preferences. State-of-the-art adaptive applications adapt in multiple ways to a subset of scenarios in application mobility, however, adaptation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.