default search action
MUE 2009: Qingdao, China
- 2009 Third International Conference on Multimedia and Ubiquitous Engineering, MUE 2009, Qingdao, China, June 4-6, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3658-3
Multimedia Modeling and Processing
- Chao Zhang, Dongxiao Li, Ming Zhang:
Multi-camera Calibration Based on Iterative Factorization of Measurement Matrix. 3-8 - Baoguo Du, Hong Shen:
Encoder Rate Control for Pixel-Domain Distributed Video Coding without Feedback Channel. 9-13 - Shuixian Chen, Ruimin Hu, Jong Hyuk Park, Naixue Xiong, Sang-Soo Yeo:
Analysis and Synthesis of Spatial Parameters Using MDCT. 18-21 - Wenhao Zhang, Bo Yang, Kan Chang:
A Novel Fast Mode Decision Scheme for Spatial Scalable Video Coding. 22-25 - Yuan Li, Ning Han, Chen Chen:
A Novel Deblocking Filter Algorithm in H.264 for Real Time Implementation. 26-30 - Xiongfei He, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Classification between PS and Stego Images Based on Noise Model. 31-36 - Jie Shi, Zhenkuan Pan, Weibo Wei:
An Innovative Variational Level Set Model for Multiphase Image Segmentation. 41-44 - Jie Jia, Daeil Yoon, Hae-Kwang Kim:
An Efficient Coding of Intra Picture Prediction Modes for H.264/AVC. 49-53 - Kan Chang, Aidong Men, Wenhao Zhang:
Adaptive Intra-frame Rate Control for H.264/AVC. 54-58 - Chi-Wen Hsieh, Ying-Che Hsu, Tai-Lang Jong:
Image Interpretations Based on Quantum Resonance Concept. 59-63 - Qing-ming Zhang, Qiang Peng, Jim X. Chen, Ce Zhu:
Video Transmission Channel Distortion Estimation Model for H.264/AVC Based on Channel Simulation. 64-69 - Yanli Li, Zhong Zhou, Wei Wu:
Spherical Mapping Based Motion Recovery for Panoramic Cameras. 70-75 - Yu Song, Wenhong Wang:
Unified Sports Video Highlight Detection Based on Multi-feature Fusion. 83-87
Multimedia Services and Applications
- Tz-Heng Hsu, Yueh-Heng Li:
A Dynamic Cache Scheme for Multimedia Streams on Heterogeneous Networking Environments. 91-98 - Linchen Yu, Hai Jin, Xiaofei Liao, Jiang Xiao:
Hybrid Buffering Scheme for P2P Based VoD System. 99-104 - Zhao Tongzhou, Li Jin, Ai Zelin, Chen Nian, Ming Hui:
New Image Fusion-Based Algorithm to Face Recognition. 105-108 - Khandaker Abir Rahman, Md. Shafaeat Hossain, Md. Al-Amin Bhuiyan, Tao Zhang, Mohammed Hasanuzzaman, Haruki Ueno:
Eye-Distance Based Mask Selection for Person Identification. 114-119 - Xiaohui Chen, Weidong Wang, Guo Wei:
Impact of Noise on Digital Video Traffic Characteristics. 120-124 - Zhiwen Yu, Xingshe Zhou:
Combining Vector Space Model and Category Hierarchy Model for TV Content Similarity Measure. 130-136 - Khandaker Abir Rahman, Md. Shafaeat Hossain, Md. Al-Amin Bhuiyan, Tao Zhang, M. Hasanuzzaman, Haruki Ueno:
Person to Camera Distance Measurement Based on Eye-Distance. 137-141
Multimedia and Ubiquitous Security
- Chin-Chen Chang, Yung-Chen Chou, The Duc Kieu:
Information Hiding in Dual Images with Reversibility. 145-152 - Bo Chen, Hong Shen:
A New Robust-Fragile Double Image Watermarking Algorithm. 153-157 - Yonnim Lee, Ohbyung Kwon:
Criteria for Measuring Information Privacy in Context-Aware Computing Environments. 158-163 - Chu-Hsing Lin, Jung-Chun Liu, Lun-Yuen Cheng, Jung-Jung Chung:
Binary Documents Recovery Based on Skeleton Extraction. 164-167 - Xiaoming Yao, Wencai Du, Jundong Fu:
A Similarity Attack to Correlation-Based Public Watermarking Detection. 168-171 - Junyan Wang, Yuebin Xu, Zhenkuan Pan, Guanfeng Liu, Shanzhou Ma:
A New Trust Mechanism with Penalty and Bonus Based on Agent in Grid Market. 172-177 - Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing. 183-188 - Chia-Hui Liu, Yu-Fang Chung, Tzer-Shyong Chen, Sheng-De Wang:
Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent. 189-196 - Ching-Te Wang, Chiu-Hsiung Liao, Ruey-Maw Chen:
High Capacity Image Data Hiding Scheme for Grouping Palette Index. 197-204 - Ken Sakakibara, Kunihiko Higa:
Privacy Violations of Video Communications in a Ubiquitous Environment. 205-211 - Ruey-Maw Chen, Ching-Te Wang, Kuo-ta Hsieh:
A Practice of Allied Network Security System. 212-218
Ubiquitous Services and Applications
- Shujuan Jin, Keqiu Li:
LBCS: A Load Balanced Clustering Scheme in Wireless Sensor Networks. 221-225 - Ching-Hsien Hsu, Bo-Yu Chen, Chao-Tung Yang:
Anticipative Inquiry Scheme for Efficient RFID Tag Identification. 232-237 - Quoc-Cuong Nguyen, Dongil Shin, Dongkyoo Shin, Juhan Kim:
Real-Time Human Tracker Based on Location and Motion Recognition of User for Smart Home. 243-250 - Roman Y. Shtykh, Yishui Zhu, Qun Jin:
A Context-Aware Framework for Flowable Services. 251-256 - Tian Chen, Wenan Zhou, Fei Ma, Junde Song:
A Novel Intra-domain Mobility Management Solution in Heterogeneous Networks Using SIP. 262-267 - Chao-Chun Chen, Jenq-Muh Hsu, Chien-Han Liao:
HAMA: A Three-Layered Architecture for Integrating Object Tracking and Location Management in Wireless Sensor Networks. 268-275
Ubiquitous Computing and Beyond
- Sachin Shetty, Min Song, Jun Wang:
Distributed Adaptive Protocols for Information Dissemination in Large-Scale Communication Systems. 279-286 - Luqun Li:
An Optimistic Differentiated Service Job Scheduling System for Cloud Computing Service Users and Providers. 295-299 - Shanzhou Ma, Guanfeng Liu, Yuebin Xu, Zhenkuan Pan, Junyan Wang, Jun Ji:
A New Resource Pricing Fluctuation Model with Trust System in Grid Economy. 300-305 - Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan:
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis. 306-314 - Panlong Yang, Hai Wang, Guihai Chen:
Tunable Probing: Towards Timely Channel Selection Mechanism in Dynamic Multi-channel Wireless Networks. 315-319 - Jerry Gao, Vijay Kulkarni, Himanshu Ranavat, Lee Chang, Hsing Mei:
A 2D Barcode-Based Mobile Payment System. 320-329 - Yongzhi Yang, Xiang Rao, Dian-xi Shi, Peng Zou:
Extend the Service and Component in Meta-level for Pervasive Computing. 333-338 - Zhi-jie Li, Xiang-dong Liu, Xiao-dong Duan, Cunrui Wang:
Optimal Solution for Grid Resource Allocation Using Particle Swarm Optimization. 339-346 - Yunsong Zhang, Lei Zhao, Jiwen Yang, Liying Yu:
NEM-XML: A Fast Non-extractive XML Parsing Algorithm. 347-350
Other IT and Multimedia Applications
- Yuhua Li, Quan Lin, Gang Zhong, Dongsheng Duan, Yanan Jin, Wei Bi:
A Directed Labeled Graph Frequent Pattern Mining Algorithm Based on Minimum Code. 353-359 - Chin-Chen Chang, Hsien-Wen Tseng:
Data Hiding in Images by Hybrid LSB Substitution. 360-363 - Cunxiang Dong, Wenjun Wang, Peng Wang:
DL-Based the Knowledge Description of Emergency Plan Systems and Its Application. 364-368 - Guohui Li, Fangxiao Hu, Ling Yuan:
An Energy-Efficient Fault-Tolerant Scheduling Scheme for Aperiodic Tasks in Embedded Real-Time Systems. 369-376
WMCS 2009
- Xiaowei Zhang, Donggang Cao, Hong Mei:
Improve the Portability of J2ME Applications: An Architecture-Driven Approach. 386-391 - Jeongkyu Park, Keung Hae Lee:
A Sensor for Ubiquitous Point-of-Interest Services. 392-398 - Nandini S. Sidnal, Sunilkumar S. Manvi:
Auction Service Discovery Model - An Agent Based Approach. 399-406 - Toshihiko Yamakami:
Mobile Data Services 2.0: Analysis of 3G and Flat Rate Impacts on Mobile Data Services. 407-412 - Jeung-tai Eddie Tang, Chihui Chiang:
Perceived Innovativeness, Perceived Convenience and TAM: Effects on Mobile Knowledge Management. 413-420 - Shuliang Zhang, Shaosong Ma, Yiming Zhang:
Research on Collaborative Environment of Data Collection and Application in Mobile GIS. 421-428 - Weider D. Yu, Asim Siddiqui:
Towards a Wireless Mobile Social Network System Design in Healthcare. 429-436
TAFLBS 2009
- Yuefeng Liu, Xin Zhang, Huabo Sun:
The P2P Wireless Network Applied in Real-Time Vehicle Navigation. 439-444 - Dunli Liu, Jianghua Zheng, Zhihui Liu, Yuan Zhao:
Valley Landscape Reconstruction Based on VRGIS - A Case Study in Juntang Lake Valley. 445-451 - Jianghua Zheng, Adam C. Winstanley, Zheng Pan, Seamus Coveney:
Spatial Characteristics of Walking Areas for Pedestrian Navigation. 452-458 - X. Sun, Qing W. Hu, Hua Y. Wu:
Design and Implementation of Global 3D Visualization Client Program on Intelligent Mobile Devices. 459-464 - Yuefeng Liu, Ting Liu, Min Lu, Huabo Sun:
Study on the Pedestrian Network Model Oriented to Pedestrian Navigation. 465-470 - Xiaoqian Wu, Chuanqin Zang:
A New Spatial Index Structure for GIS Data. 471-476 - Chih-Ning Huang, Chih-Yen Chiang, Jui-Sheng Chang, Yi-Chieh Chou, Ya-Xuan Hong, Steen Jun-Ping Hsu, Woei-Chyn Chu, Chia-Tai Chan:
Location-Aware Fall Detection System for Medical Care Quality Improvement. 477-480 - Feng Yang, Lifeng Jiao, Zhizheng Zhou, Cuiju Li:
Call Taking, Dispatch Decision Supporting, Vehicle Tracing: Emergency Response Systems under Location Based Services. 481-484 - Zheng Pan, Lei Yan, Adam C. Winstanley, A. Stewart Fotheringham, Jianghua Zheng:
A 2-D ESPO Algorithm and Its Application in Pedestrian Path Planning Considering Human Behavior. 485-491 - Masatoshi Arikawa, Tatsuya Kida:
Mobile Real-Time Animated Maps for Moving Trains: Mobile JaPOPPO. 492-495
NSNM 2009
- Cuixia Gao, Zhitang Li, Haigang Song:
Security Evaluation Method Based on Host Resource Availability. 499-504 - Yunhe Zhang, Zhitang Li, Song Mei, Cai Fu:
Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN. 505-510 - Fuliang Guo, Bin Zeng, Liangzhong Cui:
A Distributed Network Management Framework Based on Mobile Agents. 511-515 - Bin Zeng, Fuliang Guo, Lu Yao:
Optimal Integration Model of Multiple Information Security Methods. 516-521 - Longjun Zhang, Shifeng Wang:
Analyzed and Improved on the Security of IKE Protocol. 522-528
IMP 2009
- Wei Wang, Peng Zhang, Runsheng Wang:
Abnormal Video Sections Detection Based on Inter-frames Information. 529-533 - Yu Han, Aidong Men, Ziyi Quan:
Combined Spatial Correlation of Coded Neighboring Blocks for Intra-frame Coding Mode Prediction. 534-538 - Jaekyong Jeong, Hyeongyong Jeon, Chijung Hwang, Byeungwoo Jeon:
Efficient Image Feature Combination with Hierarchical Scheme for Content-Based Image Management System. 539-545 - Shay Horovitz, Danny Dolev:
Maxtream: Stabilizing P2P Streaming by Active Prediction of Behavior Patterns. 546-553
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.