Systems designed to extract time-critical information from large volumes of unstructured data must include the ability, both from an architectural and algorithmic point of view, t...
Upendra V. Chaudhari, Olivier Verscheure, Juan Hue...
People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...
Weblog (usually shortened as blog) has gained its popularity lately. There are about 70,000 new blogs a day and about 29,100 blog updates an hour. As an emerging blogging phenomen...
Pujianto Cemerlang, Joo-Hwee Lim, Yilun You, Jun Z...
This paper investigates asymptotically optimal scalar quantizers to address QIM watermark detection with i.i.d. host data and additive noise. False-alarm probability of detection ...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
In this paper, we propose a remote control system which controls a haptic interface device with another remote haptic interface device. Haptic feeling can be transmitted by the sy...
In this paper a novel cyclic interface for searching through a song database is proposed. The method, which merges multiple audio streams on a server and broadcasts only a single ...
Given a number of available layers of source data and a transmission bit budget, we propose an algorithm that determines how many layers should be sent and how many protection bit...
A novel framework is introduced for visual event detection. Visual events are viewed as stochastic temporal processes in the semantic concept space. In this concept-centered appro...
IP-multicast is a bandwidth efficient transmission mechanism for group communications. Reliability in IP-multicast, however, poses a set of significant challenges. To address the ...
Measurement of the delay is an important and common problem in communication over packet networks. The endto-end and the round trip delay are among the factors directly impacting ...
Mohammad Zad-issa, Norbert Rossello, Laurent Pilat...