Multimedia Computing, Communications, and Applications (TOMM)


Search Issue
enter search term and/or author name


ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 5 Issue 2, November 2008

Dynamic privacy assessment in a smart house environment using multimodal sensing
Simon Moncrieff, Svetha Venkatesh, Geoff West
Article No.: 10
DOI: 10.1145/1413862.1413863

Surveillance applications in private environments such as smart houses require a privacy management policy if such systems are to be accepted by the occupants of the environment. This is due to the invasive nature of surveillance, and the private...

Sensing and using social context
Brett Adams, Dinh Phung, Svetha Venkatesh
Article No.: 11
DOI: 10.1145/1413862.1413864

We present online algorithms to extract social context: Social spheres are labeled locations of significance, represented as convex hulls extracted from GPS traces. Colocation is determined from Bluetooth and GPS to extract social rhythms,...

Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks
Saraju P. Mohanty, Bharat K. Bhargava
Article No.: 12
DOI: 10.1145/1413862.1413865

This article presents a novel invisible robust watermarking scheme for embedding and extracting a digital watermark in an image. The novelty lies in determining a perceptually important subimage in the host image. Invisible insertion of the...

Offering data confidentiality for multimedia overlay multicast: Design and analysis
Wai-Pun Ken Yiu, Shueng-Han Gary Chan
Article No.: 13
DOI: 10.1145/1413862.1413866

Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast for large-group multimedia communication. We address offering data confidentiality tailored for ALM. To achieve confidentiality, a node may need to...

Estimation of certainty for responses to multiple-choice questionnaires using eye movements
Minoru Nakayama, Yosiyuki Takahasi
Article No.: 14
DOI: 10.1145/1413862.1413867

To examine the feasibility of estimating the degree of strength of belief (SOB) of responses using eye movements, the scan paths of eye movements were analyzed while subjects reviewed their own responses to multiple choice tasks. All fixation...

Authoring, viewing, and generating hypervideo: An overview of Hyper-Hitchcock
Frank Shipman, Andreas Girgensohn, Lynn Wilcox
Article No.: 15
DOI: 10.1145/1413862.1413868

Hyper-Hitchcock consists of three components for creating and viewing a form of interactive video called detail-on-demand video: a hypervideo editor, a hypervideo player, and algorithms for automatically generating hypervideo summaries....

End-to-end delay control of multimedia applications over multihop wireless links
Wenbo He, Klara Nahrstedt, Xue Liu
Article No.: 16
DOI: 10.1145/1413862.1413869

The proliferation of multimedia applications over mobile, resource-constrained wireless networks has raised the need for techniques that adapt these applications both to clients' Quality of Service (QoS) requirements and to network resource...

A criterion-based multilayer access control approach for multimedia applications and the implementation considerations
Leon Pan, Chang N. Zhang
Article No.: 17
DOI: 10.1145/1413862.1413870

In this article, a novel criterion-based multilayer access control (CBMAC) approach is presented to enhance existing access control models such as Role-Based, Mandatory, and Discretionary Access Control models to support multilayer (multilevel)...