SNS. Selection of news story series based on the responses by SNS users for the summarization of multiple news videos
|
|
- Brook Hudson
- 7 years ago
- Views:
Transcription
1 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. SNS, SNS SNS SNS SNS Selection of news story series based on the responses by SNS users for the summarization of multiple news videos Kosuke KATO, Ichiro IDE, Daisuke DEGUCHI,, and Hiroshi MURASE Nagoya University, Graduate School of Information Science Furo-cho, Chikusa-ku, Nagoya-shi, Aichi, Japan Nagoya University, Information and Communications Headquarters Furo-cho, Chikusa-ku, Nagoya-shi, Aichi, Japan Abstract Archiving news videos is regarded as important since they are valuable as sources of important social information. When exploiting archived news videos as information sources, it is important to track the flow of topics to understand their contents comprehensively. Concerning it, a method that structures the chronological semantic relations between news stories, namely the topic thread structure has been proposed. It allows the understanding of the circumstance of the topic by tracking related stories one after another from the initial story. However, it imposes a user to watch many stories along the topic thread structure when it contains various topics. On the other hand, social networking services (SNS) are explosively prevalent. SNS users aim to send and receive information in which they are interested. Thus, we considered editing news videos from the viewpoint of the viewers, and we have decided to summarize multiple news videos based on the responses by SNS users. In this report, we introduce a method that selects news story series which will be used for the news video summarization. Key words News video, news video archive, SNS 1
2 1 : mediawalker 1. [1] Duygulu [2] [3] Wu [4] 2 [5] mediawalker [6] mediawalker 1 SNS SNS [7] SNS SNS SNS Kobayashi [8] Doman [9] Kobayashi Twitter Doman Twitter SNS 2. SNS SNS [5] CC w 2
3 2 w 1 10 w T r T S (i) T S (j) : T S (j) T S (i) T S (i) : T S (j) T S (i) T S (i) T S (j) 2. 2 [5] (1) C 0 = S O S = S O (2) S S c (j)(j = 1,... J) C 0 S c (j) S c (j) C 0 = S c (j) (3) S 2 (4) 2. 3 Web [10] SNS Web Web SNS Web Web CC Web (1) (2) (3) (4) 2. 4 CC SNS (1) CC (2) tf-idf (3) CC W CC Web W article Web SNS N i j W story (i, j) { W story (i, j) = W CC (i, j) N (if W article (i, j) = 0) (1) W story (i, j) = W CC (i, j) (otherwise) W CC (i, j) i j tf-idf W article (i, j) i Web j k j W cluster (k, j) W cluster (k, j) = W story (i, j) (2) i c k c k k
4 2013/12/05#6 2013/12/06#2 2013/12/09#8 2013/12/10#6 2013/12/18#8 2013/12/31#3 2014/01/09#8 2014/01/06#6 yyyy/mm/dd#n 2014/01/07# /01/08# /01/09# ,080 3 CC SNS SNS NHK 7 Web NHK NEWSWEB SNS Facebook SNS (1) N = SNS a SNS b SNS , , , , , , , , , , a SNS b SNS , , ,
5 4 3 a SNS b SNS , , , , , , , , , , ,296 36,960 34,750 31,448 23,843 22,547 19,238 16,342 15,922 15,393 13,029 11,700 11,537 11,072 9,484 9,072 8,935 8,255 8,136 7, a 1 b 2 c 3 46,296 2,472 7,550 36,960 1,552 5,917 34,750 1,342 5,234 31, ,775 23, ,328 20, ,078 18, ,352 16, ,343 15, ,309 15, ,272 12, ,222 11, ,140 11, ,130 11, ,098 9, ,095 9, ,041 8, , , , t t =
6 7 2013/12/05#6 16, /12/05#6 24, /12/05#6 13, /12/06#2 12, /12/06#2 14, /12/06#2 18, /12/06#2 18, /12/06#2 11, /12/06#2 12, /12/18#8 12, /12/18#8 13, SNS Web SNS tf-idf SNS [6] Ichiro Ide, Tomoyoshi Kinoshita, Tomokazu Takahashi, Shin ichi Satoh, and Hiroshi Murase, mediawalker: A video archive explorer based on time-series semantic structure, Proc. 15th ACM Int. Conf. on Multimedia, pp , Sept [7] 23 h23/html/nc html [2014/8/3 ] [8] Takashi Kobayashi, Tomokazu Takahashi, Daisuke Deguchi, Ichiro Ide, and Hiroshi Murase, Detection of biased broadcast sports video highlights by attribute-based tweets analysis, Proc. 19th Int. Conf. on Multimedia Modeling, Lecture Note in Computer Science, Vol.7733, pp , Jan [9] Keisuke Doman, Taishi Tomita, Ichiro Ide, Daisuke Deguchi, and Hiroshi Murase, Event detection based on Twitter Enthusiasm Degree for generating a sports highlight video, 22nd ACM Int. Multimedia Conf. (ACM MM2014), Nov (To appear). [10],,,, SNS Web MVE , Mar [1] Vol.64 No.3 pp Mar 2010 [2] Pinar Duygulu, Jia-Yu Pan, and David A. Forsyth, Towards auto-documentary: Tracking the evolution of news stories, Proc. 12th ACM Int. Conf. on Multimedia, pp , Oct [3] Jonathan G. Fiscus and George R. Doddington, Topic detection and tracking evaluation overview, In James Allan, ed Topic detection and tracking: Event-based information organization, Kluwer Academic Publishers, pp.17 32, [4] Xiao Wu, Chong-Wah Ngo, and Qing Li, Threading and auto documenting news videos, IEEE Signal Processing Mag., Vol.23, No.2, pp.59 68, Mar [5] Vol.23 No.5 pp Sept
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
More informationShogo Kumagai, Keisuke Doman, Tomokazu Takahashi, Daisuke Deguchi, Ichiro Ide, and Hiroshi Murase
Detection of Inconsistency between Subject and Speaker based on the Co-occurrence of Lip Motion and Voice Towards Speech Scene Extraction from News Videos Shogo Kumagai, Keisuke Doman, Tomokazu Takahashi,
More informationAutomatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior
Automatic Calibration of an In-vehicle Gaze Tracking System Using Driver s Typical Gaze Behavior Kenji Yamashiro, Daisuke Deguchi, Tomokazu Takahashi,2, Ichiro Ide, Hiroshi Murase, Kazunori Higuchi 3,
More informationAnalysis and Visualization with Large Scale Temporal Web Archives
1 st Int. Alexandria Workshop (15th. Sep. 2014) Multiple Media Analysis and Visualization with Large Scale Temporal Web Archives Masashi Toyoda Center for Socio Global Informatics, Institute t of Industrial
More informationLAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)
LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY 1st TERM (14 SEPT - 27 NOV) Week 1 9.30-10.30 10.30-11.30 11.30-12.30 12.30-13.30 13.30-14.30 14.30-15.30 15.30-16.30
More informationAn Online Automated Scoring System for Java Programming Assignments
An Online Automated Scoring System for Java Programming Assignments Hiroki Kitaya and Ushio Inoue Abstract This paper proposes a web-based system that automatically scores programming assignments for students.
More informationImage Resolution Enhancement Methods for Different Applications
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1733-1738 International Research Publications House http://www. irphouse.com Image Resolution
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationText Localization & Segmentation in Images, Web Pages and Videos Media Mining I
Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Multimedia Computing, Universität Augsburg Rainer.Lienhart@informatik.uni-augsburg.de www.multimedia-computing.{de,org} PSNR_Y
More informationText Analytics The three-minute guide
Text Analytics The three-minute guide Text Analytics The three-minute guide 1 What is text analytics? Detecting hidden signals There s a good chance that your organization is awash in unstructured, text-rich
More informationConTag: Conceptual Tag Clouds Video Browsing in e-learning
ConTag: Conceptual Tag Clouds Video Browsing in e-learning 1 Ahmad Nurzid Rosli, 2 Kee-Sung Lee, 3 Ivan A. Supandi, 4 Geun-Sik Jo 1, First Author Department of Information Technology, Inha University,
More informationVisualization and Analytical Support of Questionnaire Free-Texts Data based on HK Graph with Concepts of Words
Visualization and Analytical Support of Questionnaire Free-Texts Data based on HK Graph with Concepts of Words Daisuke Kobayashi, Tomohiro Yoshikawa and Takashi Furuhashi Nagoya University, Japan Furo-cho,
More informationA Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow
More informationDESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
More informationSocial-Sensed Multimedia Computing
Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors
More informationSecurity and Trust in social media networks
!1 Security and Trust in social media networks Prof. Touradj Ebrahimi touradj.ebrahimi@epfl.ch! DMP meeting San Jose, CA, USA 11 January 2014 Social media landscape!2 http://www.fredcavazza.net/2012/02/22/social-media-landscape-2012/
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationMobile cloud computing for building user centric mobile multimedia recommended system
ISSN: 2347-3215 Volume 3 Number 5 (May-2015) pp. 134-144 www.ijcrar.com Mobile cloud computing for building user centric mobile multimedia recommended system N. Rajashekarareddy and C.N. Navya* Department
More informationEfficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
More informationInternational Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: editor@ijermt.org November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
More informationSocial media has recently played a critical
C Y B E R - P H Y S I C A L - S O C I A L S Y S T E M S Editor: Daniel Zeng, University of Arizona, zeng@email.arizona.edu Harnessing the Crowdsourcing Power of Social Media for Disaster Relief Huiji Gao
More informationMobile video streaming and sharing in social network using cloud by the utilization of wireless link capacity
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7247-7252 Mobile video streaming and sharing in social network using cloud by
More informationThe Development of School Websites Management System and Its Trials during School Field Work in a Distant Place
152 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.11, November 2006 The Development of School Websites Management System and Its Trials during School Field Work in a Distant
More informationAn Incomplete Cryptography based Digital Rights Management with DCFF
An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp
More informationRate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094
Title Rate control algorithms for video coding Author(s) Ng, Cheuk-yan; 吳 卓 恩 Citation Issued Date 2000 URL http://hdl.handle.net/10722/31094 Rights The author retains all proprietary rights, (such as
More informationSyllabus Subject: Relational, Direct and Interactive Marketing (II) Degree: Titulación Superior en Dirección de Marketing y Gestión Comercial
Syllabus Subject: Relational, Direct and Interactive Marketing (II) Degree: Titulación Superior en Dirección de Marketing y Gestión Comercial Academic year 2012/2013 Teachers: Oscar VEGA Period of classes
More informationUnprecedented Exposure January 2014
Unprecedented Exposure January 2014 * * Mobile News App Page Views:10,802,154 * ipad App Page Views:1,940,225 Page Views: 4,099,363 * Page Views 34,318,508 Visits 9,946,681 Unique Visitors 7,629,425 Video
More informationSpam Filtering in Online Social Networks Using Machine Learning Technique
Spam Filtering in Online Social Networks Using Machine Learning Technique T.Suganya 1, T.Hemalatha 2 ME (final year), Department of Computer Science and Engineering, Karpagam University, Coimbatore, India
More informationImmersive Audio Rendering Algorithms
1. Research Team Immersive Audio Rendering Algorithms Project Leader: Other Faculty: Graduate Students: Industrial Partner(s): Prof. Chris Kyriakakis, Electrical Engineering Prof. Tomlinson Holman, CNTV
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationA Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
More informationCourse Syllabus Content Strategy & Development 3357 Fall 2015
Course Syllabus Content Strategy & Development 3357 Fall 2015 Course: Branding and Social Media Class Time: Tuesday, August 26th 5:30-8:30 PM Room GB 307 TR LAB: 5:30-8:30, Room GB 218 Location: U of H
More informationA Review on Efficient File Sharing in Clustered P2P System
A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,
More informationStudy and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
More informationKAMEYAMA, Wataru Professor
31 Yingdi Xie and Jun Ohya, A Local Method for Ellipse Detection, D- - p.. 32 A- - p.. 33 D- - p.. 34 A- - p.. 35.. 36. KAMEYAMA, Wataru Professor 1 Supheakmungkol Sarin, Toshinori Nagahashi, Tadashi Miyosawa,
More informationDelay Time Analysis of Reconfigurable Firewall Unit
Delay Time Analysis of Reconfigurable Unit Tomoaki SATO C&C Systems Center, Hirosaki University Hirosaki 036-8561 Japan Phichet MOUNGNOUL Faculty of Engineering, King Mongkut's Institute of Technology
More information12 months 4 quarters 1 goal
12 months 4 quarters 1 goal You know you need to whip your digital marketing game into shape. But you also know budgets are tight. If you're ready to take your online marketing to the next level without
More informationApplication of Stop and Play Models to the Representation of Magnetic Characteristics of Silicon Steel Sheet
Title Application of stop and play models magnetic characteristics of silicon Author(s) Matsuo, T; Shimode, D; Terada, Y; S Citation IEEE TRANSACTIONS ON MAGNETICS (200 1361-1364 Issue Date 2003-05 URL
More informationVSSN 06 Algorithm Competition
VSSN 06 Algorithm Competition 27. Oct. 2006 Eva Hörster, Rainer Lienhart Multimedia Computing Lab University of Augsburg, Germany Goals Get a valuable resource for the research community Foster and accelerate
More informationISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
More informationA Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
More information2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System
2-7 The Mathematics Models and an Actual Proof Experiment for IP Traceback System SUZUKI Ayako, OHMORI Keisuke, MATSUSHIMA Ryu, KAWABATA Mariko, OHMURO Manabu, KAI Toshifumi, and NISHIYAMA Shigeru IP traceback
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationTransition from Analogue Television Broadcasting to DTV. Hiroshi Seno Reception Engineering Center. Contents
Transition from Analogue Television Broadcasting to DTV Hiroshi Seno Reception Engineering Center TV Service Overview and Schedule for DTV Household Penetration of Digital TV Digital TV Receiver Trend
More informationANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,
More informationSemantic Concept Based Retrieval of Software Bug Report with Feedback
Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationThe Japan Society of Mechanical Engineers C 2010
The Japan Society of Mechanical Engineers C 2010 The Japan Society of Mechanical Engineers 2010 C The Japan Society of Mechanical Engineers 2010 C The Japan Society of Mechanical Engineers C 2010 The Japan
More informationDynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
More informationUsing Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing
ISSN No: 2454-9614 Using Medical Big-Data Platforms to Creating Stochastic Preference for Adaptive Crowd sourcing L. Poornima Devi, N. Sathyabalaji * a) Department Of Computer Science and Engineering,
More informationModeling of Information Sharing on the Business Social Media
SICE Journal of Control, Measurement, and System Integration, Vol. 6, No. 2, pp. 083 087, March 2013 Modeling of Information Sharing on the Business Social Media Fujio TORIUMI, Takashi OKADA, Shuichiro
More informationAN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS
AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS PAULO VILLEGAS, STEPHAN HERRMANN, EBROUL IZQUIERDO, JONATHAN TEH AND LI-QUN XU IST BUSMAN Project, www.ist-basman.org We present a system designed
More informationRESEARCH PAPER International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009
An Algorithm for Dynamic Load Balancing in Distributed Systems with Multiple Supporting Nodes by Exploiting the Interrupt Service Parveen Jain 1, Daya Gupta 2 1,2 Delhi College of Engineering, New Delhi,
More informationCommunication Door: Real-Time Communication Middleware
Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society Communication Door: Real-Time Communication Middleware By Masahiro TABUCHI,* Kazuaki NAKAJIMA,* Akiko KAWAMOTO,* Takashi
More informationISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,
More informationBuilding Reusable Mobile Agents for Network Management
IEEE TRANSACTIONS SYSTEMS, MAN, AND CYBERNETICS PART C: APPLICATION AND REVIEWS, VOL. 33, NO. 3, AUGUST 2003 350 Building Reusable Mobile Agents for Network Management Ichiro Satoh Member, IEEE, Abstract
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More informationThe Digital Signage System Supporting Multi-Resources Schedule on an Elevator
, pp. 219-228 http://dx.doi.org/10.14257/ijsh.2015.9.8.23 The Digital Signage System Supporting Multi-Resources Schedule on an Elevator Woon-Yong Kim and SoonGohn Kim (Corresponding Author) Department
More informationNetwork Virtualization Server for Adaptive Network Control
Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,
More informationInteractive person re-identification in TV series
Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu
More informationLocation-Based Social Media Intelligence
Location-Based Social Media Intelligence ASIS Middle East Conference Dubai, UAE February 23, 2016 Don Zoufal CrowZnest Consulting, Inc. University of Chicago Presenter Donald R. Zoufal, C.P.P., ICAO AVSEC
More informationOutsourcing Tools for IT
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) 12-31-2001 Outsourcing Tools for IT Wai-Ho Au Hareton Leung
More informationEFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: reshmamaryabraham@gmail.com
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationProject Proposal: Compact Log Management and File Integrity Solution for Small Businesses. Brittany Wilbert Sam Houston State University 10/22/2012
Project Proposal: Compact Log Management and File Integrity Solution for Small Businesses Brittany Wilbert Sam Houston State University 10/22/2012 Background From 2005-2012 over 560,000,000 data breaches
More informationWhat Makes a Message Stick? - The Role of Content and Context in Social Media Epidemics
ANU College of Engineering and Computer Science Building 108, North Road ANU, Canberra 0200, Australia Final Report for AOARD Grant 124041 What Makes a Message Stick? - The Role of Content and Context
More informationSEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.
More informationDetection of Collusion Behaviors in Online Reputation Systems
Detection of Collusion Behaviors in Online Reputation Systems Yuhong Liu, Yafei Yang, and Yan Lindsay Sun University of Rhode Island, Kingston, RI Email: {yuhong, yansun}@ele.uri.edu Qualcomm Incorporated,
More informationReport for September 2015
Report for tember 2015 Issued tember 30, 2015 National Association of Credit Management Combined Sectors So much for that hoped for pattern of one bad month followed by a good one. This month s CMI is
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More informationCLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION
Bulgarian Journal of Science and Education Policy (BJSEP), Volume 7, Number 1, 2013 CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION Khayrazad Kari JABBOUR Lebanese University, LEBANON Abstract. The
More informationOrchestration and detection of stealthy DoS/DDoS Attacks
Orchestration and detection of stealthy DoS/DDoS Attacks Mohammedshahzan A Mulla 1, Asst prof Shivraj V B 2 Mtech - Dept. of CSE CMRIT Bangalore. Abstract The accomplishment of the cloud computing model
More informationA!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!
ATeamCymruEISReport:GrowingExploitationofSmall OfCiceRoutersCreatingSeriousRisks PoweredbyTeamCymru sthreatintelligencegroup Page 1of 14www.team-cymru.com www.team-cymru.com Threat'Intelligence'Group EXECUTIVE
More informationData Deduplication Scheme for Cloud Storage
26 Data Deduplication Scheme for Cloud Storage 1 Iuon-Chang Lin and 2 Po-Ching Chien Abstract Nowadays, the utilization of storage capacity becomes an important issue in cloud storage. In this paper, we
More informationA comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
More informationHabilitation. Bonn University. Information Retrieval. Dec. 2007. PhD students. General Goals. Music Synchronization: Audio-Audio
Perspektivenvorlesung Information Retrieval Music and Motion Bonn University Prof. Dr. Michael Clausen PD Dr. Frank Kurth Dipl.-Inform. Christian Fremerey Dipl.-Inform. David Damm Dipl.-Inform. Sebastian
More informationPROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS
PROJECT RISK MANAGEMENT MODEL BASED ON PRINCE2 AND SCRUM FRAMEWORKS Martin Tomanek and Jan Juricek Department of Systems Analysis, University of Economics, Prague, Czech Republic ABSTRACT There is a lack
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationRole Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
More informationADAPTIVE MOBILE VIDEO STREAMING AND SHARING USING CLOUD COMPUTING
ADAPTIVE MOBILE VIDEO STREAMING AND SHARING USING CLOUD COMPUTING 1 ASHALA VIJAY KUMAR, 2 D. PHANI KUMAR 1 Department of CSE, Sreenidhi Institute of Science and Technology, India. phani123d@gmail.com 2
More informationFirst Semester Arabic Fall 2009. Course Syllabus. Eliot: 103
First Semester Arabic Fall 2009 Course Syllabus Scholar : Mohamed Fakhreddine Ben Slama Phone Number : 503.805.4924 E-mail : benslamm@reed.edu Meeting Time and Place: Mondays: 6:00-7:00 pm and Fridays:
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationPolicies-in-force exceeded 200,000 on February 12, 2014. Integrity, Comprehensiveness, Cost-Competitiveness, Convenience
February 14, 2014 Daisuke Iwase, President & COO LIFENET INSURANCE COMPANY (Securities Code: 7157, TSE Mothers) Policies-in-force exceeded 200,000 on February 12, 2014 Integrity, Comprehensiveness, Cost-Competitiveness,
More informationConsecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationGeneral Meeting of Shareholders - Reference Documents and Procedure
Securities Code: 8793 June 5, 2008 To Our Shareholders: Notice of the Convocation of the 38 th Ordinary General Meeting of Shareholders Please be advised that the 38th Ordinary General Meeting of Shareholders
More informationConcordia University Social Science Department
1 Concordia University Social Science Department PSY/HPE 422 Psychology of Sport and Physical Activity Fall Semester 2005 Room: L300 TTH 9 to 1030am Instructor: Kevin Simpson, Ph.D. Office: L116 Phone:
More informationSocial Listening & Analytics:
Social Listening & Analytics: A focus on TV broadcasters/producers Listening What is happening around a TV broadcast in social/online media? Analytics How is a TV broadcast performing/benchmarking? Benchmarking
More informationParallelization of video compressing with FFmpeg and OpenMP in supercomputing environment
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 231 237 doi: 10.14794/ICAI.9.2014.1.231 Parallelization of video compressing
More informationComplex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
More informationEfficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
More informationEfficient Interconnect Design with Novel Repeater Insertion for Low Power Applications
Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications TRIPTI SHARMA, K. G. SHARMA, B. P. SINGH, NEHA ARORA Electronics & Communication Department MITS Deemed University,
More informationChange Pattern-Driven Traceability of Business Processes
Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I,, March 12-14, 2014, Hong Kong Change Pattern-Driven Traceability of Business Processes Watcharin Uronkarn
More informationSpace-filling Techniques in Visualizing Output from Computer Based Economic Models
Space-filling Techniques in Visualizing Output from Computer Based Economic Models Richard Webber a, Ric D. Herbert b and Wei Jiang bc a National ICT Australia Limited, Locked Bag 9013, Alexandria, NSW
More informationCan Twitter Predict Royal Baby's Name?
Summary Can Twitter Predict Royal Baby's Name? Bohdan Pavlyshenko Ivan Franko Lviv National University,Ukraine, b.pavlyshenko@gmail.com In this paper, we analyze the existence of possible correlation between
More informationA Policy-Based Admission Control Scheme for Voice over IP Networks
Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department
More informationIdea Lab. Social Media Is a Science
Name: Phone: Idea Lab Social Media Is a Science David Searns CEO Haley Marketing Group Inc. haleymarketing.com Brad Smith Director of Search Engine Optimization and Social Media Marketing Haley Marketing
More informationSouth East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected
At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At
More informationSecure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network
Secure Cluster Formation and Certificate Revocation Of Adversary Nodes In Mobile Adhoc Network Ambarish.A 1, Gowthamani.R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore 1,
More information