By Topic

Multimedia and Ubiquitous Engineering, 2008. MUE 2008. International Conference on

Date 24-26 April 2008

Filter Results

Displaying Results 1 - 25 of 125
  • [Front cover]

    Publication Year: 2008 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (3388 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (67 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): v - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (146 KB)  
    Freely Available from IEEE
  • Welcome Message from the General Chairs

    Publication Year: 2008 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (95 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome Message from Program Chairs

    Publication Year: 2008 , Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (101 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2008 , Page(s): xvi - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Publication Year: 2008 , Page(s): xxi
    Save to Project icon | Request Permissions | PDF file iconPDF (96 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IMIS 2008 - Message from the Workshop Organizers

    Publication Year: 2008 , Page(s): xxii - xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IPS/UMS/WNGS/MUS 2008 Workshop - Message from the Workshop Organizers

    Publication Year: 2008 , Page(s): xxiv - xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (110 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • UMOST : Ubiquitous Multimedia Framework for Context-Aware Session Mobility

    Publication Year: 2008 , Page(s): 3 - 8
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (564 KB) |  | HTML iconHTML  

    With the increasing use of small portable devices and wireless networks, a trend to support computing on the move has emerged. This trend is referred to as 'anytime/anywhere computing' for mobility support. In particular, multimedia service with heterogeneous devices, location-free access and user-context awareness is still a very active and evolving field of research in broad areas. In this paper, a movable multimedia framework, namely UMOST(ubiquitous middleware of streaming technology), is proposed for multimedia session mobility. It provides various levels of quality of service management, as well as seamless user-level handoffs using MPEG-21 digital item adaptation (DIA). It serves scalable streaming adaptive to the user, and deploys a back-end content distribution network for adapting dynamically to environmental changes through prefetching. The implemented framework employs a smart space aimed at demonstrating the feasibility of multimedia session mobility.. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image-Based Modeling of Virtual Pagoda of China

    Publication Year: 2008 , Page(s): 9 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (506 KB) |  | HTML iconHTML  

    This paper introduces an image-based pagodas modeling and simulation system that takes a single photo as input. To implement the pagoda modeling system, we have built a component model library of pagodas by L system (e.g. square, hexagonal, and octagonal box, eaves bending upwards or downwards etc.) and a corresponding feature library. Feature points have been detected by improved feature detection algorithm. Once the feature points are detected, they are first checked to see whether they match with the predefined feature library. If so, a corresponding model in component model library is assigned to them. XML code is used to control the process of pagoda generation in detail and ratio parameter added to ensure the coherent architecture styles of ancient vernacular pagodas. Because of the advantages (accurate modeling and rapid generating) of this modeling system, it can be applied to the preserving of the digital heritage in China vernacular architecture. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Modeling in Medical Pattern Semantic Understanding

    Publication Year: 2008 , Page(s): 15 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    In the paper the new approach for cognitive modeling of some medical structures, using picture grammar have been presented. Especially was discussed the method of artificial intelligence dedicated to the syntactic-based semantic inference of selected RTG visualizations with particular attention to the leg bones. The presented methodology makes possible to describe for each biological structure, its semantic characteristics, and allow to formulate a semantic meaning of pathological deformation. Presented approach proofed that cognitive informatics based on semantic formalisms can be used to develop a new classes of intelligent computer-aided diagnosis systems. Such systems authors called UBIAS (understanding based image analysis systems). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IMS Based Inter-working Solution for Multimedia Service in a Converged Network

    Publication Year: 2008 , Page(s): 19 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (548 KB) |  | HTML iconHTML  

    In the evolution of traditional telecom network towards a converged next generation network, inter- working is always challenging due to different name spaces and routing mechanism across communities. Most existing Inter-working solutions are made at the terminal side. It requires mobile phone or PC users to install multiple client-side applications, such as, Google talk client, Skype client, and MSN client, etc. In order to avoid too many client applications running on mobile terminals, a network solution is desired. An IMS based Inter-working solution for multimedia services is proposed. It enables an IMS subscriber make use of a single SIP user agent to communicate with the other users who might have communication means other than IMS based devices. The solution consists of two parts: one is the conference like service; the other is the Inter-working gateway service. The detailed technical description of the proposed solution is described hereafter. The corresponding use cases are present. The solution can also be applied to "group communication", e.g. ad-hoc group or predefined group multimedia service (chat, instant messaging, voice/video conference, etc.). The benefits of the proposed solution for end users and operators are discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Time Slot Count in Window Method Suitable for Long-Term Regularity-Based User Classification for Mobile Internet

    Publication Year: 2008 , Page(s): 25 - 29
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (138 KB) |  | HTML iconHTML  

    The mobile Internet proliferates and penetrates all aspects of daily life. It is crucial to codify methodologies to fit mobile-specific demands, e.g. regularity. Subscription-based mobile services require the analysis of regularity to capture and retain easy-come, easy-go users. The author proposes a method called the "time slot count in window" method (TCW-method) to efficiently capture regular users, while relaxing the explicit splits among time slots with visits. The author shows the case study result from 2001-2002 commercial service logs. A case study conducted in 2001-2002 with commercial news service subscribers shows that the relaxation in the proposed method loses 2-3 % in the recall rate of regularity, but still obtained 88-91 % recall rate. Considering the trade-off with the on-the-fly nature of coping with limited storage capacity, the author considers this method to be very promising for the mobile Internet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FBBM: A New Backup Method with Data De-duplication Capability

    Publication Year: 2008 , Page(s): 30 - 35
    Cited by:  Patents (9)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (266 KB) |  | HTML iconHTML  

    Data de-duplication eliminates multiple copies of the same file and repeated chunks or segments of data within those files, thus reduces disk capacity and bandwidth required for backups. Recently, driven by the needs of large-capacity/high performance data backup, data de-duplication is becoming a new research focus of the storage industry. In this paper, we present a fingerprint-based backup method named FBBM which performs data de-duplication in the backup. FBBM breaks files into variable sized chunks using anchor-based chunking scheme for the purpose of duplication detection. Chunks are stored on a write-once RAID (Redundant Array of Inexpensive Disks) and indexed and addressed by the hash of their content, this leads to intrinsically single instance storage. FBBM outperforms traditional backup methods in terms of storage and bandwidth saving. This makes it a promising tool for modern enterprises to backup or archive their ever-growing valuable data with low storage and bandwidth cost. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abnormal Gait Detection Using Discrete Fourier Transform

    Publication Year: 2008 , Page(s): 36 - 40
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (131 KB) |  | HTML iconHTML  

    Detection of gait characteristics has found considerable interest in fields of biomechanics and rehabilitation sciences. In this paper an approach for abnormal gait detection employing discrete Fourier transform (DFT) analysis has been presented. The joint angle characteristics in frequency domain have been analyzed and using the harmonic coefficients, recognition for abnormal gait has been performed. The experimental results and analysis represent that the proposed algorithm based on DFT can not only reduce the gait data dimensionality effectively, but also lightens the computation cost, with a satisfactory distinction. In order to make the algorithm more generic, a mean square error (MSE) analysis is also presented. Future work will be the expansion of the detection introduced in this system to include abnormality detection instead of just an abnormal or normal detection that would prove to be a valuable addition for use in a variety of applications, including unobtrusive clinical gait analysis, automated surveillance etc. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trust Management Model for P2P File Sharing System

    Publication Year: 2008 , Page(s): 41 - 44
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    Peer-to-peer (P2P) network systems have an open and dynamic nature for sharing files and real-time data transmission. While P2P systems have already many existing and envisioned applications, the security issue of P2P systems is still worth deeply researching. Some traditional approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches, however, only addressed part of the security issues in P2P systems. In this paper, we propose a trust management model for P2P file-sharing systems. We use the incomplete experience to get the trust rating in P2P systems, and use aggregation mechanism to indirectly combine and obtain other node's trust rating. Simulation results and analysis show that our proposed trust management model can quickly detect the misbehavior peers and limit the impacts of them in a P2P file-sharing system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Adaptive Heartbeat Design of High Availability RAID Dual-Controller

    Publication Year: 2008 , Page(s): 45 - 50
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    Designing storage systems to provide high availability in the face of failures needs the use of various data protection techniques, such as dual-controller RAID. The failure of RAID controller may cause RAID storage system to fail to respond to ongoing requests and to no longer be available to new requests. Heartbeat is used to detect controllers whether survival. So, the heartbeat cycle's impact on the high availability of a dual-controller hot-standby system has become the key of current research. To address the problem of fixed setting heartbeat in building high availability system currently, a self-adaptive heartbeat model of dual-controller, which can adjust heartbeat cycle based on the frequency of data read-write request, is designed to improve the high availability of dual-controller RAID storage system. Based on this model, the high availability stochastic Petri net model of fault detection was established and used to evaluate the effect of the availability. In addition, we define a SHA (self-adaptive heart ability) parameter to scale the ability of system heartbeat cycle to adapt to the environment when high availability system is at a changing environment of read and write requests. The results show that, relatively speaking with fixed configuration, the design can enhance dual controller RAID system high availability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Regularity-Oriented Service Model with Sub-Day-Scale User Classifications for Mobile Internet

    Publication Year: 2008 , Page(s): 51 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (152 KB) |  | HTML iconHTML  

    The Internet has been rapidly mobilized by increasing penetration to wireless users. Important issues in mobile user behaviors include identification of long-term regular users in dynamic 24-hour behaviors. The author proposes a regularity-oriented service model to outline the mobile- specific aspects of usage regularity to obtain clues to user preferences on content and services. Then, the author performs some user surveys to identify the diversity of mobile Internet use. It brings our attention on user segment awareness to identification of regularity. The author proposes a clustering method based on an assumption of three different segments of mobile users. The author examines the clustering result with the revisit ratio in the next month to demonstrate the usefulness of the method in the context of long- term use regularity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor Network

    Publication Year: 2008 , Page(s): 57 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (143 KB) |  | HTML iconHTML  

    Hierarchical wireless sensor networks (WSNs) have been shown to improve system performance, reduce messages redundancy, and economize energy. However, due to the characteristics of WSN, such as restricted resources and operation in a hostile environment, WSNs are subjected to numerous threats and are vulnerable to attacks. In this paper, we present a rekey-boosted security protocol in LEACH (RBS-LEACH) to enhance network security and survivability. Compared to other LEACH security solutions, the salient advantage of this work is that a unique rekey mechanism, which can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safe under the timely protection of the rekey mechanism. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Retrieval Using Maximum Frequency of Local Histogram Based Color Correlogram

    Publication Year: 2008 , Page(s): 62 - 66
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (439 KB) |  | HTML iconHTML  

    Color histogram is widely used for image indexing in content-based image retrieval (CBIR). A color histogram describes the global color distribution of an image. It is very easy to compute and is insensitive to small changes in viewing positions. However, the histogram is not robust to large appearance changes. Moreover, the histogram might give similar results for different kinds of images if the distributions of colors are same in the images. On the other hand, color correlogram is efficiently used for image indexing in content-based image retrieval. Color correlogram extracts not only the color distribution of pixels in images like color histogram, but also extracts the spatial information of pixels in the images. The characteristic of the color Correlogram to take into account the spatial information as well as the distribution of color pixels greatly attracts the researcher for content based image retrieval. In this paper, we propose the image bin (histogram value divisions) separation technique followed by extracting maxima of frequencies and plotting a correlogram. At first, the histogram is first calculated for an image. After that, it is subdivided into four equal bins. Each bin is subdivided into four more bins and for every such subdivision the maxima of frequencies s calculated. This information is stored in the form of a correlogram. The distance between correlogram of the query image with the corresponding correlogram of database images is calculated. The proposed algorithm is tested on a database comprising a large number of images. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Aware Distributed Algorithm for Sensor Nodes Clustering

    Publication Year: 2008 , Page(s): 67 - 72
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (268 KB) |  | HTML iconHTML  

    The sensor devices of wireless sensor networks (WSN) are severely resource constrained having limited operational lifetime. The clustering of sensor nodes provides longer operational lifetime of the nodes and facilitates data aggregation. This paper proposes a distributed algorithm for clustering of sensor nodes based on the one-hop-neighbours of the nodes. The cluster heads of the clusters are elected based on the local energy levels of the nodes without involving any distributed messaging. This paper presents the model, design and analysis of the algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Information Retrieval by Dispatching Mobile Agents in Parallel

    Publication Year: 2008 , Page(s): 73 - 76
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (209 KB) |  | HTML iconHTML  

    Due to the explosive growth of the WWW and the increasing amount of data available via the Internet, how to retrieve desired information from the Internet with high efficiency and good effectiveness is of great importance. In this paper, we propose an information retrieval model based on mobile agent technology. Theoretical analysis on the time complexity is also provided. Experiments are conducted on the performance of the proposed approach comparing with two existing approaches. Our approach well utilize mobile agents' inherent merits and provide useful tools for efficient information retrieval. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.