Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540)

27-29 March 2000

Filter Results

Displaying Results 1 - 25 of 87
  • Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (410 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 2000, Page(s):527 - 530
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • A hard real-time tasks model for the VBR video server

    Publication Year: 2000, Page(s):190 - 194
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    At the design of the video server to service video data as real-time, we must consider network bandwidth, buffer space and disk bandwidth. As buffer space and disk bandwidth affect each other tightly, they should be considered at the same time. In this paper, we propose the hard real-time tasks' model for the streams on the video server. The stream on the server can be considered as the hard real-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracing and proving ownership of digital objects

    Publication Year: 2000, Page(s):184 - 187
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    If C is a p-ary code of length n and a(1) and a(2) are two codewords, then a(3) is called a descendant of a(1) and a(2) if ai(3)∈{ai(1), ai (2)} for i=1,…, n. We are interested in codes C with the property that if a(1), a(2)∈C then a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmitting datacubes over congested networks

    Publication Year: 2000, Page(s):360 - 365
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    Online analytical processing is an emerging technique for the implementation of decision support applications that access remote datacubes over information highways. We propose a novel approach for sending datacubes over congested networks, so that, in order to preserve fast response time, some datacube tuples can be eventually lost but yet preserving a good approximation of the overall datacube. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical multiplexing and admission control policy for smoothed video streams using e-PCRTT algorithm

    Publication Year: 2000, Page(s):272 - 277
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    Improvements in telecommunication and computer technologies have made integrated services packet-switched networks possible. It is expected that a significant portion of future networks will carry prerecorded video and that traffic in applications such as video on demand (VoD) will include high-fidelity audio, short multimedia clips, and full-length movies. In this paper we study the effect of vid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of interference cancellation for CDMA wireless systems

    Publication Year: 2000, Page(s):86 - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    The paper gives an overview of interference cancellation (IC) methods, in terms of implementation and performance, for third generation CDMA communications systems. The signal processing of each method is outlined and the advantages and challenges are discussed. An exemplary IC application at the mobile receiver and its performance are presented for the WCDMA system setup View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for load balancing using differential load measurement

    Publication Year: 2000, Page(s):355 - 359
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    In distributed systems uneven arrival of the tasks may overload few hosts keeping the rest of the hosts lightly loaded or even idle. This results in overall poor system performance in spite of the system capabilities. To utilize the capabilities of distributed systems load balancing can be used. Load balancing always comes with a lot of overheads. We propose an algorithm based on differential load... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise detection and cleaning by hypergraph model

    Publication Year: 2000, Page(s):416 - 419
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    This paper introduces a new algorithm for visual reconstruction of digital images which have been corrupted by mixed noise. From an image hypergraph model we introduce a combinatorial definition of noisy data. A detection procedure is used to classify the hyperedges either as noisy or clean data. Similar to other techniques, the proposed algorithm uses then an estimation procedure to remove the ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On optimal packetization of embedded bitstreams

    Publication Year: 2000, Page(s):82 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    We investigate the problem of packetizing multiple embedded bitstreams to improve the error resilience of source codes. We discuss various packetization schemes against packet erasure at both low and high bit rates. We formulate various versions of packetization of multiple embedded bitstreams for minimum distortion as discrete optimization problems, and propose efficient algorithms to compute glo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust speech recognition using neural networks and hidden Markov models

    Publication Year: 2000, Page(s):350 - 354
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    This paper proposes a robust, speaker-independent isolated word speech recognition (IWSR) system (SMQ/HMM-SVQ/HMM)/MLP which combines dual split matrix quantization (SMQ) and split vector quantization (SVQ) pair combined with both the strength of the HMM in modeling stochastic sequences and the non-linear classification capability of MLP neural networks (NN). The system efficiently utilizes proces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching information in large and complex distributed information systems: balance between implicit and explicit acquisition of the user model

    Publication Year: 2000, Page(s):380 - 384
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    The knowledge about users acquired and formalised through a model may be used in more than one way in an interactive intelligent system. At the higher level, these models may be used for recognition and interpretation of information about the user's behaviour, to provide him with help facilities and a set of useful information. Literature mainly proposes two different strategies devoted to the acq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How do image statistics impact lossy coding performance?

    Publication Year: 2000, Page(s):42 - 47
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    It has been observed (Saha and Vemuri, 1999) that when we compress a variety of images of different types using a fixed wavelet filter, the peak signal-to-noise ratio (PSNR) values vary widely from image to image. This large variation in PSNR by as much as 30 dB, can only be attributed to the nature and inherent characteristics of the image, since everything else is fixed. In this paper, we analyz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probability of miscorrection for Reed-Solomon codes

    Publication Year: 2000, Page(s):398 - 401
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    The decoder fails to correct an erroneous message to its original untainted version when the number of errors exceeds half the number of appended Reed-Solomon characters. In most cases, the Reed-Solomon algorithm can detect the presence of an excess of errors through built-in filters. However, in a few cases, the message may be corrected to a different code word in which case it is said to be misc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general interleaver for equal and unequal error protections of turbo codes with short frames

    Publication Year: 2000, Page(s):412 - 415
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The key to the efficient operation of turbo codes is the interleaver design. With proper design, the pairing of low-weight sequences to the input of the encoders can be avoided. Circular shift interleavers can be used to ensure that the minimum distance due to weight-2 input sequences grows roughly as √2N, where N is the block length. We generalized the mapping function of the circular shift... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent and robust audio data hiding in subband domain

    Publication Year: 2000, Page(s):74 - 79
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Data hiding embeds extra information into digital media for the purpose of authentication, annotation and copyright protection. Transparency and robustness are two contradictory requirements for any data hiding scheme. This paper studies audio data hiding using the spread spectrum (SS) technique in the subband domain. On the transparency part, we propose a novel method of tuning psycho-acoustic mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust hash functions for digital watermarking

    Publication Year: 2000, Page(s):178 - 183
    Cited by:  Papers (124)  |  Patents (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Digital watermarks have been proposed for authentication of both video data and still images and for integrity verification of visual multimedia. In such applications, the watermark has to depend on a secret key and on the original image. It is important that the dependence on the key be sensitive, while the dependence on the image be continuous (robust). Both requirements can be satisfied using s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling rate-based dynamic cache sharing for distributed VOD systems

    Publication Year: 2000, Page(s):489 - 494
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    A distributed VOD system includes several VOD sub-systems, each VOD sub-system consisting of an archive server (AS), a continuous media server (CMS) and a medata DB. A VOD sub-system employs an object replacement algorithm by which a video is selected to be replaced by a new video. Upon a miss, the VOD system must decide onto which CMS to load the new video. We address this issue by modelling a dy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient indexing on a broadcast channel in a mobile database access system

    Publication Year: 2000, Page(s):368 - 374
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    Advances in communication and computation technologies and the recent marriage between the two allows users to have access to information sources via portable, mobile computing devices, and wireless connection. Broadcasting has been suggested as a possible solution for several limitations within this new environment. In order to limit the amount of energy consumed at the mobile unit, indexing can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for video content filtering in consumer domain

    Publication Year: 2000, Page(s):214 - 221
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    The transition from analog to digital video enables consumer access to an enormous amount of high quality video material. The authors describe an architecture of a video content filtering system through video analysis and abstraction. They explain the algorithms for video characterization, their performance and practical considerations for including them in the architecture for video filtering. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of informed prefetching and caching in Linux

    Publication Year: 2000, Page(s):443 - 448
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    This paper describes the design and implementation of an application-aware Informed Prefetching and Caching (IPrC) system for the Linux operating system. IPrC is a technique for improving application response time by exploiting I/O and computation parallelism. This proactive mechanism utilizes hints (application disclosed file access patterns) in order to pre-fetch the needed data blocks ahead of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating structured data and text: a multi-dimensional approach

    Publication Year: 2000, Page(s):264 - 269
    Cited by:  Papers (9)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Multidimensional databases are used for online analytic processing (OLAP) applications with great success. We introduce a method of using OLAP techniques on a text collection: combining text searching and ranking techniques from information retrieval and the slicing, dicing, and drill-down from OLAP. Our approach integrates structured and unstructured data and takes advantage of the data hierarchi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A probabilistic image model for smoothing and compression

    Publication Year: 2000, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    In this paper, the problem of edge preserving smoothing in image processing is tackled by combining a noise corruption model and a region and edge image model. The derivation of the probability model for the first order difference in the gray levels of the region pixels and edge pixels leads to a non-linear filter with coefficients as functions of the estimated noise variance and edge intensity. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an effective and integrated design for information systems

    Publication Year: 2000, Page(s):391 - 396
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    The development of information systems (IS) is of great importance for researchers and industrial users. Different methods for IS design have been proposed. Some put the emphasis on statical aspects, and others on dynamical aspects. A third category of methods has recently appeared, which try to take into account both aspects, and therefore provide an unified view of data and treatments. There als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast fractal image compression

    Publication Year: 2000, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1832 KB)

    In this paper, we propose a method of regional search for fractal image compression and decompression. In this method, the search for fractal codes is carried out in a region of the image instead of over the whole image. Because the area surrounding a partitioned block has a high probability of being similar to the block, the use of regional search to find the fractal codes results in sharply redu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.