enter search term and/or author name
Dynamic privacy assessment in a smart house environment using multimodal sensing
Simon Moncrieff, Svetha Venkatesh, Geoff West
Article No.: 10
Surveillance applications in private environments such as smart houses require a privacy management policy if such systems are to be accepted by the occupants of the environment. This is due to the invasive nature of surveillance, and the private...
We present online algorithms to extract social context: Social spheres are labeled locations of significance, represented as convex hulls extracted from GPS traces. Colocation is determined from Bluetooth and GPS to extract social rhythms,...
Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks
Saraju P. Mohanty, Bharat K. Bhargava
Article No.: 12
This article presents a novel invisible robust watermarking scheme for embedding and extracting a digital watermark in an image. The novelty lies in determining a perceptually important subimage in the host image. Invisible insertion of the...
Offering data confidentiality for multimedia overlay multicast: Design and analysis
Wai-Pun Ken Yiu, Shueng-Han Gary Chan
Article No.: 13
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast for large-group multimedia communication. We address offering data confidentiality tailored for ALM. To achieve confidentiality, a node may need to...
Estimation of certainty for responses to multiple-choice questionnaires using eye movements
Minoru Nakayama, Yosiyuki Takahasi
Article No.: 14
To examine the feasibility of estimating the degree of strength of belief (SOB) of responses using eye movements, the scan paths of eye movements were analyzed while subjects reviewed their own responses to multiple choice tasks. All fixation...
Authoring, viewing, and generating hypervideo: An overview of Hyper-Hitchcock
Frank Shipman, Andreas Girgensohn, Lynn Wilcox
Article No.: 15
Hyper-Hitchcock consists of three components for creating and viewing a form of interactive video called detail-on-demand video: a hypervideo editor, a hypervideo player, and algorithms for automatically generating hypervideo summaries....
End-to-end delay control of multimedia applications over multihop wireless links
Wenbo He, Klara Nahrstedt, Xue Liu
Article No.: 16
The proliferation of multimedia applications over mobile, resource-constrained wireless networks has raised the need for techniques that adapt these applications both to clients' Quality of Service (QoS) requirements and to network resource...
A criterion-based multilayer access control approach for multimedia applications and the implementation considerations
Leon Pan, Chang N. Zhang
Article No.: 17
In this article, a novel criterion-based multilayer access control (CBMAC) approach is presented to enhance existing access control models such as Role-Based, Mandatory, and Discretionary Access Control models to support multilayer (multilevel)...