By Topic

Multimedia and Ubiquitous Engineering, 2008. MUE 2008. International Conference on

Date 24-26 April 2008

Filter Results

Displaying Results 1 - 25 of 125
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (3388 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chairs

    Publication Year: 2008, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from Program Chairs

    Publication Year: 2008, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008, Page(s):xvi - xx
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Publication Year: 2008, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • IMIS 2008 - Message from the Workshop Organizers

    Publication Year: 2008, Page(s):xxii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • IPS/UMS/WNGS/MUS 2008 Workshop - Message from the Workshop Organizers

    Publication Year: 2008, Page(s):xxiv - xxvi
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • UMOST : Ubiquitous Multimedia Framework for Context-Aware Session Mobility

    Publication Year: 2008, Page(s):3 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    With the increasing use of small portable devices and wireless networks, a trend to support computing on the move has emerged. This trend is referred to as 'anytime/anywhere computing' for mobility support. In particular, multimedia service with heterogeneous devices, location-free access and user-context awareness is still a very active and evolving field of research in broad areas. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image-Based Modeling of Virtual Pagoda of China

    Publication Year: 2008, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    This paper introduces an image-based pagodas modeling and simulation system that takes a single photo as input. To implement the pagoda modeling system, we have built a component model library of pagodas by L system (e.g. square, hexagonal, and octagonal box, eaves bending upwards or downwards etc.) and a corresponding feature library. Feature points have been detected by improved feature detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Modeling in Medical Pattern Semantic Understanding

    Publication Year: 2008, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    In the paper the new approach for cognitive modeling of some medical structures, using picture grammar have been presented. Especially was discussed the method of artificial intelligence dedicated to the syntactic-based semantic inference of selected RTG visualizations with particular attention to the leg bones. The presented methodology makes possible to describe for each biological structure, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IMS Based Inter-working Solution for Multimedia Service in a Converged Network

    Publication Year: 2008, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB) | HTML iconHTML

    In the evolution of traditional telecom network towards a converged next generation network, inter- working is always challenging due to different name spaces and routing mechanism across communities. Most existing Inter-working solutions are made at the terminal side. It requires mobile phone or PC users to install multiple client-side applications, such as, Google talk client, Skype client, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Time Slot Count in Window Method Suitable for Long-Term Regularity-Based User Classification for Mobile Internet

    Publication Year: 2008, Page(s):25 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    The mobile Internet proliferates and penetrates all aspects of daily life. It is crucial to codify methodologies to fit mobile-specific demands, e.g. regularity. Subscription-based mobile services require the analysis of regularity to capture and retain easy-come, easy-go users. The author proposes a method called the "time slot count in window" method (TCW-method) to efficiently capture regular u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FBBM: A New Backup Method with Data De-duplication Capability

    Publication Year: 2008, Page(s):30 - 35
    Cited by:  Papers (1)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Data de-duplication eliminates multiple copies of the same file and repeated chunks or segments of data within those files, thus reduces disk capacity and bandwidth required for backups. Recently, driven by the needs of large-capacity/high performance data backup, data de-duplication is becoming a new research focus of the storage industry. In this paper, we present a fingerprint-based backup meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abnormal Gait Detection Using Discrete Fourier Transform

    Publication Year: 2008, Page(s):36 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB) | HTML iconHTML

    Detection of gait characteristics has found considerable interest in fields of biomechanics and rehabilitation sciences. In this paper an approach for abnormal gait detection employing discrete Fourier transform (DFT) analysis has been presented. The joint angle characteristics in frequency domain have been analyzed and using the harmonic coefficients, recognition for abnormal gait has been perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trust Management Model for P2P File Sharing System

    Publication Year: 2008, Page(s):41 - 44
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Peer-to-peer (P2P) network systems have an open and dynamic nature for sharing files and real-time data transmission. While P2P systems have already many existing and envisioned applications, the security issue of P2P systems is still worth deeply researching. Some traditional approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches, however, only addres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Adaptive Heartbeat Design of High Availability RAID Dual-Controller

    Publication Year: 2008, Page(s):45 - 50
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Designing storage systems to provide high availability in the face of failures needs the use of various data protection techniques, such as dual-controller RAID. The failure of RAID controller may cause RAID storage system to fail to respond to ongoing requests and to no longer be available to new requests. Heartbeat is used to detect controllers whether survival. So, the heartbeat cycle's impact ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Regularity-Oriented Service Model with Sub-Day-Scale User Classifications for Mobile Internet

    Publication Year: 2008, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    The Internet has been rapidly mobilized by increasing penetration to wireless users. Important issues in mobile user behaviors include identification of long-term regular users in dynamic 24-hour behaviors. The author proposes a regularity-oriented service model to outline the mobile- specific aspects of usage regularity to obtain clues to user preferences on content and services. Then, the author... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network

    Publication Year: 2008, Page(s):57 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Retrieval Using Maximum Frequency of Local Histogram Based Color Correlogram

    Publication Year: 2008, Page(s):62 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    Color histogram is widely used for image indexing in content-based image retrieval (CBIR). A color histogram describes the global color distribution of an image. It is very easy to compute and is insensitive to small changes in viewing positions. However, the histogram is not robust to large appearance changes. Moreover, the histogram might give similar results for different kinds of images if the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Aware Distributed Algorithm for Sensor Nodes Clustering

    Publication Year: 2008, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    The sensor devices of wireless sensor networks (WSN) are severely resource constrained having limited operational lifetime. The clustering of sensor nodes provides longer operational lifetime of the nodes and facilitates data aggregation. This paper proposes a distributed algorithm for clustering of sensor nodes based on the one-hop-neighbours of the nodes. The cluster heads of the clusters are el... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Information Retrieval by Dispatching Mobile Agents in Parallel

    Publication Year: 2008, Page(s):73 - 76
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Due to the explosive growth of the WWW and the increasing amount of data available via the Internet, how to retrieve desired information from the Internet with high efficiency and good effectiveness is of great importance. In this paper, we propose an information retrieval model based on mobile agent technology. Theoretical analysis on the time complexity is also provided. Experiments are conducte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.