Sciweavers

ISM
2008
IEEE
83views Multimedia» more  ISM 2008»
14 years 6 months ago
Fast and Flexible Tree Rendering with Enhanced Visibility Estimation
We present a set of techniques to simplify tree models for faster rendering while retaining their visual resemblance to the original model. This goal is achieved by setting a budg...
Jessy Lee, C. C. Jay Kuo
ISM
2008
IEEE
157views Multimedia» more  ISM 2008»
14 years 6 months ago
PhotoGeo: A Self-Organizing System for Personal Photo Collections
Nowadays the photo-capturing devices are no longer limited to digital cameras but include mobile phones, PDAs and others. This is leading to a new problem: a very large number of ...
Yuri Almeida Lacerda, Hugo Feitosa de Figueir&ecir...
ISM
2008
IEEE
97views Multimedia» more  ISM 2008»
14 years 6 months ago
A Fast and Effective Text Tracking in Compressed Video
Haixia Jiang, Guizhong Liu, Xueming Qian, Nan Nan,...
ISM
2008
IEEE
116views Multimedia» more  ISM 2008»
14 years 6 months ago
A Distributed Platform for Multimedia Communities
Abstract— Online community platforms and multimedia content delivery are merging in recent years. Current platforms like Facebook and YouTube are client-server based which result...
Kalman Graffi, Sergey Podrajanski, Patrick Mukherj...
ISM
2008
IEEE
119views Multimedia» more  ISM 2008»
14 years 6 months ago
Evaluation of Error Resilience Mechanisms for 3G Conversational Video
Communication in 3G networks may experience packet losses due to transmission errors on the wireless link(s) which may severely impact the quality of conversational and streaming ...
Jegadish Devadoss, Varun Singh, Jörg Ott, Che...
ISM
2008
IEEE
127views Multimedia» more  ISM 2008»
14 years 6 months ago
To Be or Not to Be a Behaviorist? Facial Recognition Systems and Critical Knowledge
In this paper, we assess the possibility of a critical knowledge of technology. In the case of facial recognition systems, ‘FRS’, we argue that behaviorism underlies this tech...
Mathieu Cornélis, Nathalie Grandjean, Clair...
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 6 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
ISM
2008
IEEE
72views Multimedia» more  ISM 2008»
14 years 6 months ago
A Novel Noncausal Whole-Frame Concealment Algorithm for Video Streaming
Error concealment is very important for video communication as an application-layer error control mechanism which can be used independently of the underlying communication infrast...
S. Mohsen Amiri, Ivan V. Bajic
ISM
2008
IEEE
100views Multimedia» more  ISM 2008»
14 years 6 months ago
Robust Edge Detection Based on Non-local Contribution of Local Frequency Characteristics
This paper introduces a robust approach to the problem of edge detection in situations characterized by high levels of image degradation and illumination non-uniformity. Popular e...
Alexander Wong, William Bishop
ISM
2008
IEEE
185views Multimedia» more  ISM 2008»
14 years 6 months ago
A Framework for Collaborative Real-Time 3D Teleimmersion in a Geographically Distributed Environment
In this paper, we present a framework for immersive 3D video conferencing and geographically distributed collaboration. Our multi-camera system performs a full-body 3D reconstruct...
Gregorij Kurillo, Ramanarayan Vasudevan, Edgar J. ...