1,847 Hits in 3.7 sec

Table of contents

2013 IEEE transactions on broadcasting  
Oh 693 Subspace-Based Blind Channel Estimation by Separating Real and Imaginary Symbols for Cyclic-Prefixed Single-Carrier Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Sikora 602 A Novel Depth-Based Virtual View Synthesis Method for Free Viewpoint Video . . . . . . . . . . . . . . . . . . . . . . . . . . I. Ahn and C.  ... 
doi:10.1109/tbc.2013.2292741 fatcat:i3e6zl3auffr3nhnm2vfzpuada

Special issue on video and imaging systems for critical engineering applications [SI 1096]

Gwanggil Jeon, Awais Ahmad, Abdellah Chehri, Salvatore Cuomo
2020 Multimedia tools and applications  
Various challenges and issues brought by this integration for mobile and video lie ahead, and many research questions remain to be answered.  ...  For instance, the complex nature of mobile and video imaging need radical version to the swift changes in our society, economy, environment, and technological revolution; there is an utmost need to address  ...  Acknowledgments We would like to express our appreciation to all the authors for their informative contributions and the reviewers for their support and constructive critiques in making this special issue  ... 
doi:10.1007/s11042-020-08672-5 fatcat:dmusbepcancb5i6jqo7hhf6a2m

VCIP 2020 Index

2020 2020 IEEE International Conference on Visual Communications and Image Processing (VCIP)  
Detection based on Featu Competition Xu, Zhimin APL: Adaptive Preloading of Short Video with Lyapunov Optimization T Y Yan, Hang Fast Video Saliency Detection based on Featu Competition  ...  Deep Learning Based EBCOT Source Symbol Prediction Technique for JPEG2000 Image Compression Architecture Doermann, David Orthogonal Features Fusion Network for Anomaly Detection Dong, Junyu  ... 
doi:10.1109/vcip49819.2020.9301896 fatcat:bdh7cuvstzgrbaztnahjdp5s5y

Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation

Changhoon Lee, Geyong Min, Weifeng Chen
2016 Multimedia tools and applications  
Data mining and machine learning have permeated nearly every area of multimedia content analysis, multimedia retrieval and recommendation, the vast sources of multimedia in audio, image, text and video  ...  We have finally selected 11 manuscripts for this special issue after the first, second review processes.  ...  a HMM-based event classification system integrating frequent pattern analysis by representing a video using a temporal database of multimodal interval features, different symbol coding methods could be  ... 
doi:10.1007/s11042-016-3537-5 fatcat:4ayzbsbcvzfnhg57dtgcwj7kfe

Video Repeat Recognition and Mining by Visual Features [chapter]

Xianfeng Yang, Qi Tian
2010 Studies in Computational Intelligence  
Repeat video clips such as program logos and commercials are widely used in video productions, and mining them is important for video content analysis and retrieval.  ...  For unknown video repeat mining, we address robust detection, searching efficiency and learning issues.  ...  Three hour CNN news videos are randomly chosen for training. Videos are segmented by content based keyframes.  ... 
doi:10.1007/978-3-642-12900-1_12 fatcat:kjo2lo5xkbarxmmijcwjuvt2di

Multirate Delivery Of Scalable Video With Progressive Network Codes

Ebroul Izquierdo, Michele Sanna
2011 Zenodo  
The second receiver decodes two source symbols, which carries the data of another video layer, and the third receiver can detect the whole codeword.  ...  INTRODUCTION Universal systems for video streaming are meant to provide a centralized source of multimedia content to be delivered to different classes of users.  ... 
doi:10.5281/zenodo.42708 fatcat:d6zndf5oxjbn5cdgz3bumqxr7q

A Cross-Media Advertising Design and Communication Model Based on Feature Subspace Learning

Shanshan Li, Gengxin Sun
2022 Computational Intelligence and Neuroscience  
The clustering quality of images and audios is corrected in the feature subspace obtained by dimensionality reduction through an optimization algorithm based on similarity transfer.  ...  and artists to better utilize digital media technology for artistic design activities at the level of theoretical research and applied practice.  ...  algorithm based on the subspace representation into three steps, and the overall flow of the subspace-based community detection algorithm is given in Figure 7 . e adjacency matrix A of graph G is known  ... 
doi:10.1155/2022/5874722 fatcat:qsh45riw7vfhfjrvorwwamf7ne

Intelligent video processing using data mining techniques

Kimiaki Shirahama
2011 ACM SIGMultimedia Records  
For the second query type, a Query-By-Example (QBE) interface is provided where relevant videos are retrieved based on their similarities to example videos provided by the user.  ...  However, since features only represent physical contents (e.g. color, edge, motion, etc.), retrieval methods require knowledge of how to use/integrate features for retrieving relevant videos to a query  ...  Forward phase: Based on the already detected symbols, we select a symbol (v i+1 , t i+1 ) for the (i + 1)-th symbol.  ... 
doi:10.1145/2069203.2069207 fatcat:66pv4qvzofgz3oyanwu6dgjcoa

Loss Visibility Optimized Real-Time Video Transmission Over MIMO Systems

Amin Abdel Khalek, Constantine Caramanis, Robert W. Heath
2015 IEEE transactions on multimedia  
We solve the problem of mapping video packets to MIMO subchannels and adapting per-stream rates to maximize the proposed objective.  ...  The structured nature of video data motivates introducing video-aware decisions that make use of this structure for improved video transmission over wireless networks.  ...  Adaptive MIMO transmission for video content has been investigated in [7] - [10] .  ... 
doi:10.1109/tmm.2015.2468196 fatcat:clzbknty35dpxcia7dt7a5digq

Visual tracking via efficient kernel discriminant subspace learning

Chunhua Shen, A. van den Hengel, M.J. Brooks
2005 IEEE International Conference on Image Processing 2005  
We present a tracking method based on this result and show promising experimental results on real videos undergoing large pose and illumination changes.  ...  Kernel based methods, in contrast, are able to extract nonlinear subspaces, and thus represent more complex characteristics of the tracked object and background.  ...  For clarity we still use the symbol zt to represent the re-sampled image observation. 3 This video is courtesy of David Ross.  ... 
doi:10.1109/icip.2005.1530124 dblp:conf/icip/ShenHB05 fatcat:5bav5wp43rfqtee6wqa4ijwbyy

Semi-supervised Domain Adaptation with Subspace Learning for visual recognition

Ting Yao, Yingwei Pan, Chong-Wah Ngo, Houqiang Li, Tao Mei
2015 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)  
and video concept detection.  ...  This paper proposes a novel domain adaptation framework, named Semi-supervised Domain Adaptation with Subspace Learning (SDASL), which jointly explores invariant lowdimensional structures across domains  ...  In this experiment, we focus on one source to one target domain adaptation on image object detection task.  ... 
doi:10.1109/cvpr.2015.7298826 dblp:conf/cvpr/YaoPNLM15 fatcat:uxgbcxd2kfagtj5nknmsmuo234

Table of Contents

2020 IEEE Transactions on Signal Processing  
Zhou 2045 (Contents Continued on Page vi) (Contents Continued from Page v) Distributed Signal Processing and Optimization Based on In-Network Subspace Projections . . . . . . . . . . . . . . . . .  ...  Davidson 1646 Rao-Based Detectors for Adaptive Target Detection in the Presence of Signal-Dependent Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tsp.2020.3042287 fatcat:nh7viihaozhd7li3txtadnx5ui

Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking

G. Doerr, J.-L. Dugelay
2004 IEEE Transactions on Signal Processing  
As examples, two very common video watermarking systems will be presented as well as the associated intra-video collusion attacks which defeat them.  ...  Watermarking digital video material is usually considered as watermarking a sequence of still images.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and Professor Ton Kalker for their helpful comments which improved the quality of this paper.  ... 
doi:10.1109/tsp.2004.833867 fatcat:sbdnt7timvabzlqloslzub3r3q

A Survey of Watermarking Security [chapter]

Teddy Furon
2005 Lecture Notes in Computer Science  
For each context, a threat analysis is purposed. This presentation allows us to illustrate all the certainties the community has on the subject, browsing all key papers.  ...  This tools is used for attacking video watermarking techniques [34, Sect. IV.D] or block based authentication schemes [35] .  ...  There is nothing new here except the adaptation. Ideas of this adaptation work firstly appeared in [ [23, Sect. 4] are tools used for this purpose.  ... 
doi:10.1007/11551492_16 fatcat:5z7hphix35arvoypseqkmoyeuy

Table of Contents [EDICS]

2020 IEEE Transactions on Signal Processing  
Zhao 1181 Rao-Based Detectors for Adaptive Target Detection in the Presence of Signal-Dependent Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Varshney 2963 (Contents Continued on Page xxviii) 503 Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge 990Robust SINR-Constrained Symbol-Level Multiuser Precoding  ...  Cheung So 2770 Invariance Theory for Adaptive Detection in Non-Gaussian Clutter . . . . . . . . . . . . M. Tang, Y. Rong, X. R. Li, and J.  ... 
doi:10.1109/tsp.2020.3045363 fatcat:wcnvdcy3rvhblh7rtxfe6gz4re
« Previous Showing results 1 — 15 out of 1,847 results