A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Table of contents
2013
IEEE transactions on broadcasting
Oh 693 Subspace-Based Blind Channel Estimation by Separating Real and Imaginary Symbols for Cyclic-Prefixed Single-Carrier Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Sikora 602 A Novel Depth-Based Virtual View Synthesis Method for Free Viewpoint Video . . . . . . . . . . . . . . . . . . . . . . . . . . I. Ahn and C. ...
doi:10.1109/tbc.2013.2292741
fatcat:i3e6zl3auffr3nhnm2vfzpuada
Special issue on video and imaging systems for critical engineering applications [SI 1096]
2020
Multimedia tools and applications
Various challenges and issues brought by this integration for mobile and video lie ahead, and many research questions remain to be answered. ...
For instance, the complex nature of mobile and video imaging need radical version to the swift changes in our society, economy, environment, and technological revolution; there is an utmost need to address ...
Acknowledgments We would like to express our appreciation to all the authors for their informative contributions and the reviewers for their support and constructive critiques in making this special issue ...
doi:10.1007/s11042-020-08672-5
fatcat:dmusbepcancb5i6jqo7hhf6a2m
VCIP 2020 Index
2020
2020 IEEE International Conference on Visual Communications and Image Processing (VCIP)
Detection based on Featu
Competition
Xu, Zhimin
APL: Adaptive Preloading of Short Video with
Lyapunov Optimization
T
Y
Yan, Hang
Fast Video Saliency Detection based on Featu
Competition ...
Deep Learning Based EBCOT Source Symbol
Prediction Technique for JPEG2000 Image
Compression Architecture
Doermann, David
Orthogonal Features Fusion Network for
Anomaly Detection
Dong, Junyu ...
doi:10.1109/vcip49819.2020.9301896
fatcat:bdh7cuvstzgrbaztnahjdp5s5y
Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation
2016
Multimedia tools and applications
Data mining and machine learning have permeated nearly every area of multimedia content analysis, multimedia retrieval and recommendation, the vast sources of multimedia in audio, image, text and video ...
We have finally selected 11 manuscripts for this special issue after the first, second review processes. ...
a HMM-based event classification system integrating frequent pattern analysis by representing a video using a temporal database of multimodal interval features, different symbol coding methods could be ...
doi:10.1007/s11042-016-3537-5
fatcat:4ayzbsbcvzfnhg57dtgcwj7kfe
Video Repeat Recognition and Mining by Visual Features
[chapter]
2010
Studies in Computational Intelligence
Repeat video clips such as program logos and commercials are widely used in video productions, and mining them is important for video content analysis and retrieval. ...
For unknown video repeat mining, we address robust detection, searching efficiency and learning issues. ...
Three hour CNN news videos are randomly chosen for training. Videos are segmented by content based keyframes. ...
doi:10.1007/978-3-642-12900-1_12
fatcat:kjo2lo5xkbarxmmijcwjuvt2di
Multirate Delivery Of Scalable Video With Progressive Network Codes
2011
Zenodo
The second receiver decodes two source symbols, which carries the data of another video layer, and the third receiver can detect the whole codeword. ...
INTRODUCTION Universal systems for video streaming are meant to provide a centralized source of multimedia content to be delivered to different classes of users. ...
doi:10.5281/zenodo.42708
fatcat:d6zndf5oxjbn5cdgz3bumqxr7q
A Cross-Media Advertising Design and Communication Model Based on Feature Subspace Learning
2022
Computational Intelligence and Neuroscience
The clustering quality of images and audios is corrected in the feature subspace obtained by dimensionality reduction through an optimization algorithm based on similarity transfer. ...
and artists to better utilize digital media technology for artistic design activities at the level of theoretical research and applied practice. ...
algorithm based on the subspace representation into three steps, and the overall flow of the subspace-based community detection algorithm is given in Figure 7 . e adjacency matrix A of graph G is known ...
doi:10.1155/2022/5874722
fatcat:qsh45riw7vfhfjrvorwwamf7ne
Intelligent video processing using data mining techniques
2011
ACM SIGMultimedia Records
For the second query type, a Query-By-Example (QBE) interface is provided where relevant videos are retrieved based on their similarities to example videos provided by the user. ...
However, since features only represent physical contents (e.g. color, edge, motion, etc.), retrieval methods require knowledge of how to use/integrate features for retrieving relevant videos to a query ...
Forward phase: Based on the already detected symbols, we select a symbol (v i+1 , t i+1 ) for the (i + 1)-th symbol. ...
doi:10.1145/2069203.2069207
fatcat:66pv4qvzofgz3oyanwu6dgjcoa
Loss Visibility Optimized Real-Time Video Transmission Over MIMO Systems
2015
IEEE transactions on multimedia
We solve the problem of mapping video packets to MIMO subchannels and adapting per-stream rates to maximize the proposed objective. ...
The structured nature of video data motivates introducing video-aware decisions that make use of this structure for improved video transmission over wireless networks. ...
Adaptive MIMO transmission for video content has been investigated in [7] - [10] . ...
doi:10.1109/tmm.2015.2468196
fatcat:clzbknty35dpxcia7dt7a5digq
Visual tracking via efficient kernel discriminant subspace learning
2005
IEEE International Conference on Image Processing 2005
We present a tracking method based on this result and show promising experimental results on real videos undergoing large pose and illumination changes. ...
Kernel based methods, in contrast, are able to extract nonlinear subspaces, and thus represent more complex characteristics of the tracked object and background. ...
For clarity we still use the symbol zt to represent the re-sampled image observation. 3 This video is courtesy of David Ross. ...
doi:10.1109/icip.2005.1530124
dblp:conf/icip/ShenHB05
fatcat:5bav5wp43rfqtee6wqa4ijwbyy
Semi-supervised Domain Adaptation with Subspace Learning for visual recognition
2015
2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
and video concept detection. ...
This paper proposes a novel domain adaptation framework, named Semi-supervised Domain Adaptation with Subspace Learning (SDASL), which jointly explores invariant lowdimensional structures across domains ...
In this experiment, we focus on one source to one target domain adaptation on image object detection task. ...
doi:10.1109/cvpr.2015.7298826
dblp:conf/cvpr/YaoPNLM15
fatcat:uxgbcxd2kfagtj5nknmsmuo234
Table of Contents
2020
IEEE Transactions on Signal Processing
Zhou 2045 (Contents Continued on Page vi)
(Contents Continued from Page v) Distributed Signal Processing and Optimization Based on In-Network Subspace Projections . . . . . . . . . . . . . . . . . ...
Davidson 1646 Rao-Based Detectors for Adaptive Target Detection in the Presence of Signal-Dependent Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/tsp.2020.3042287
fatcat:nh7viihaozhd7li3txtadnx5ui
Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking
2004
IEEE Transactions on Signal Processing
As examples, two very common video watermarking systems will be presented as well as the associated intra-video collusion attacks which defeat them. ...
Watermarking digital video material is usually considered as watermarking a sequence of still images. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and Professor Ton Kalker for their helpful comments which improved the quality of this paper. ...
doi:10.1109/tsp.2004.833867
fatcat:sbdnt7timvabzlqloslzub3r3q
A Survey of Watermarking Security
[chapter]
2005
Lecture Notes in Computer Science
For each context, a threat analysis is purposed. This presentation allows us to illustrate all the certainties the community has on the subject, browsing all key papers. ...
This tools is used for attacking video watermarking techniques [34, Sect. IV.D] or block based authentication schemes [35] . ...
There is nothing new here except the adaptation. Ideas of this adaptation work firstly appeared in [ [23, Sect. 4] are tools used for this purpose. ...
doi:10.1007/11551492_16
fatcat:5z7hphix35arvoypseqkmoyeuy
Table of Contents [EDICS]
2020
IEEE Transactions on Signal Processing
Zhao 1181 Rao-Based Detectors for Adaptive Target Detection in the Presence of Signal-Dependent Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Varshney 2963 (Contents Continued on Page xxviii) 503 Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge
990Robust SINR-Constrained Symbol-Level Multiuser Precoding ...
Cheung So 2770 Invariance Theory for Adaptive Detection in Non-Gaussian Clutter . . . . . . . . . . . . M. Tang, Y. Rong, X. R. Li, and J. ...
doi:10.1109/tsp.2020.3045363
fatcat:wcnvdcy3rvhblh7rtxfe6gz4re
« Previous
Showing results 1 — 15 out of 1,847 results