4-th Multimedia Communications, Services and Security Kraków 2011



Similar documents
How To Develop A Computer Security System

THE POLISH PLATFORM FOR HOMELAND SECURITY IDEA, HISTORY AND RESEARCH PROJECTS

The Polish Teletraffic Symposium - A Review

URBAN. Security Solution. Urban Security Solution Military Security Solution SOC Security Solution

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE JAVA Project 2012

Master s Program in Information Systems

Software Development Training Camp 1 (0-3) Prerequisite : Program development skill enhancement camp, at least 48 person-hours.

Doctor of Philosophy in Computer Science

Design and Implementation of Smart Camera Network for Efficient Wide Area Surveillance

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Course DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Master of Science in Computer Science

The International Center of Hearing and Speech is equipped with modern devices for distance learning of specialists. There is 3D teletransmission

Pragmatic Web 4.0. Towards an active and interactive Semantic Media Web. Fachtagung Semantische Technologien September 2013 HU Berlin

D0.5 INDECT Ethical Issues 2009

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

IEEE JAVA TITLES

M3039 MPEG 97/ January 1998

Single Sign-On Secure Authentication Password Mechanism

Faculty of Electrical Engineering, Automatics, Computer Science and Electronics

Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

INDECT Security Architecture

Human behavior analysis from videos using optical flow

MOBILE VIDEO WITH MOBILE IPv6

Meeting the challenges of today s oil and gas exploration and production industry.

Page 1 of 5. (Modules, Subjects) SENG DSYS PSYS KMS ADB INS IAT

The Future of Business Analytics is Now! 2013 IBM Corporation

BIG PUBLIC INVESTMENTS IN THE CITIES OF AGGLOMERATIONS

BSc in Information Technology Degree Programme. Syllabus

The Big Data methodology in computer vision systems

NATIONAL SUN YAT-SEN UNIVERSITY

WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

Masters in Human Computer Interaction

Masters in Advanced Computer Science

Cloud computing based big data ecosystem and requirements

Masters in Artificial Intelligence

Artificial Intelligence and Politecnico di Milano. Presented by Matteo Matteucci

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

An Efficient Knowledge Base Management Scheme for Context Aware Surveillance

MEng, BSc Applied Computer Science

Telecommunication (120 ЕCTS)

Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi Department of Computer Sciences and Informatics Amman Arab University Amman, Jordan

LIST OF FIGURES. Figure No. Caption Page No.

Digital Video Broadcasting Conditional Access Architecture

Preservation for a Safer World

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Role of ICT in Emergency and Disaster Management

The Internet of the future: What could it be and what are the challenges

Security for Computer Networks

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

School of Computer Science

Lectures for the course: Electronic Commerce Technology (IT 60104)

How To Make A Secure Storage On A Mobile Device Secure

1) Explain the following evolutionary process models: a) The spiral model. b) The concurrent development model.

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

Sanjeev Kumar. contribute

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Chapter 5. Warehousing, Data Acquisition, Data. Visualization

MARITIME SURVEILLANCE SYSTEM

About the Authors Preface Acknowledgements List of Acronyms

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Masters in Networks and Distributed Systems

Masters in Computing and Information Technology

ICTTEN4215A Install and configure internet protocol TV in a service provider network

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

A Study on Integrated Security Service Control Solution Development about CRETA Security

An Intelligent Framework for Vehicular Ad-hoc Networks using SDN Architecture

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

Intelligent Camera Networks SECURING PUBLIC SPACES

National Security and Cyber Defense with Big Data

The Human Element in Cyber Security and Critical Infrastructure Protection: Lessons Learned

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Leveraging Big Data Technologies to Support Research in Unstructured Data Analytics

DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER

Chapter-1 : Introduction 1 CHAPTER - 1. Introduction

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

MEng, BSc Computer Science with Artificial Intelligence

Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Search and Data Mining: Techniques. Applications Anya Yarygina Boris Novikov

A Novel Pathway for Portability of Networks and Handing-on between Networks

The 12th International Conference on Research in Telecommunication Technologies RTT 2010

Scalable Video Streaming in Wireless Mesh Networks for Education

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

Security and Safety Program. Professor Kathy Horadam Platform Technologies Research Institute

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran

couleurs Pantone réf : 126 C réf : 126 C réf : 414 C logo seul Signature sur le devant de la carte de vœux

Content Distribution over IP: Developments and Challenges

Weighted Total Mark. Weighted Exam Mark

Media - Video Coding: Motivation & Scenarios

Indepth Voice over IP and SIP Networking Course

BIG. Big Data Analysis John Domingue (STI International and The Open University) Big Data Public Private Forum

GUJARAT TECHNOLOGICAL UNIVERSITY Computer Engineering (07) BE 1st To 8th Semester Exam Scheme & Subject Code

Transport Data Integration and Fusion. Shaleen Srivastava Mike Jones Joel Marcuson 2008/2009

Transcription:

4-th Multimedia Communications, Services and Security Kraków 2011 Thu Jun 2, 2011 Registration 8:30a Opening 9:30a Session I ("Watermarking Technology, Cryptography and Data Protection in Applications Audio and Video Processing"), 4 Technical Papers * 19 min each 9:45a Chairman: Prof. Anton Kummert (University of Wuppertal) 1. A High-Capacity Annotation Watermarking Scheme, Pawel Korus (AGH University of Science and 2. M-JPEG RobustVideo Watermarking Based on DPCM and Transform Coding, Jakob Wassermann (FHTW Wien; AT) 3. Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream, Grzegorz Szwoch (Gdansk University of 4. Software implementation of new symmetric block cipher, Marcin Niemiec (AGH University of Science and 11:00a Session II ("Ethical Issues and Procedures in Security Research on Video Surveillance and Internet Monitoring"), 3 Presentations * 20 min each 11:15a Chairman: Tom Sorell (University of Birmingham; UK) 1. Ethics of video surveillance and internet monitoring, Tom Sorell (University of Birmingham; UK) 2. The borders of privacy. Philosophical aspects, Dobrosław Kot (Krakow University of Economics; PL) 3. INDECT approach to privacy and data protection, Jan Derkacz (AGH University of Science and

Lunch 12:15p Session III ("Intelligent Analysis of Multimedia Content"), 7 Technical Papers * 17 min each 1:45p 1. INACT INDECT Advanced Image Cataloguing Tool, Michał Grega (AGH University of Science and 2. Hierarchical estimation of human upper body based on 2D observation utilizing evolutionary programming and genetic memory, Piotr Szczuko (Gdansk University of 3. INCR INDECT Multimedia Crawler, Michał Grega (AGH University of Science and 4. Automated Optimization of Object Detection Classifier using Genetic Algorithm, Andrzej Matiolański (AGH University of Science and 5. Extensible Web Crawler Towards Multimedia Material Analysis, Wojciech Turek (AGH University of Science and 6. Multi-criteria metadata mechanisms for fast and reliable searching of people using databases with unreliable records, Julian Balcerek (Poznan University of 7. Fast face location using Ada-Boost algorithm and identification with matrix decomposition methods, Adam Dabrowski (Poznan University of, Expo and Session IV, 14 Posters 3:45p 1. One Approach of Using Key-dependent S-BOXes in AES, Nikolai Stoianov (Technical University of Sofia; BG) 2. Overview of the Security Components of INDECT Project, Nikolai Stoianov (Technical University of Sofia; BG) 3. Positioning in Multi-camera Visual System, Piotr Marcinkowski (Gdansk University of 4. A Multithreaded Architecture on Android to Efficiently Cater Integral Projections Based Face Tracking Algorithm to Handheld Devices, Suman Kumar Sanjeev Prasanna (Aricent Technologies Limited; IN) 5. Implementation of the new integration model of security and QoS for MANET to the OPNET, Ján Papaj (Technical University of Košice; SK) 6. Prototypes of a Web System for Citizen Provided Information, Automatic Knowledge Extraction, Knowledge Management and GIS Integration, Antoni Ligęza (AGH University of Science and Technology, PL) 7. Face occurrence verification using Haar cascades - comparison of two approaches, Piotr Boryło (AGH University of Science and Technology, PL) 8. Scalability Study of Wireless Mesh Networks with Dynamic Stream Merging Capability, Kien Hua (University of Central Florida, US) 9. Biometric Template Protection, Hossein Malekinezhad (Islamic Azad University, IR) 10. Human Re-identification System On Highly Parallel GPU and CPU Architectures, Slawomir Bak (INRIA; FR) 11. Building domain-specific Architecture Framework for Critical Information Infrastructure, Grzegorz Sowa (Comarch S.A.; PL) 12. Quantum Cryptography Protocol Simulator, Marcin Niemiec (AGH University of Science and Technology, PL) 13. Interactive Voice-XML Module into SIP-based Warning Distribution System, Karel Tomala (VSB Technical University of Ostrava; CZ) 14. A solution for IPTV services using P2P, Thuy Le (Waseda University; JP)

Social Event (Dinner) 7:00p Krakus Fri Jun 3, 2011

Session V ("Acquisition of Multimedia Content and Quality of Experience Management in Content Distribution Networks"), 6 Technical Papers * 18 min each 10:00a Chairman: Prof. Andrzej Czyżewski (Gdansk University of Technology) 1. Quality Assessment for a License Plate Recognition Task Based on a Video Streamed in Limited Networking Conditions, Lucjan Janowski (University of Geneva; CH) 2. Semantic Structure Matching Recommendation Algorithm, Andrzej Szwabe (Poznan University of 3. Assessing Task-Based Video Quality A Journey from Subjective Psycho-Physical Experiments to Objective Quality Models, Mikolaj Leszczuk (AGH University of Science and 4. Assessing Quality of Experience for High Definition Video Streaming under Diverse Packet Loss Patterns, Piotr Romaniak (AGH University of Science and 5. An Informatics-based Approach to Object Tracking for Distributed Live Video Computing, Alexander Aved (University of Central Florida; US) 6. Performance measurements of real time video transmission from car patrol, Andrzej Ciarkowski (Gdansk University of 11:45a Session VI ("Intelligent Monitoring and Threat Detection in Urban Environment Observation Systems Including Safety Monitoring and Evacuation), 4 Technical Papers * 19 min each 12:00p Chairman: Jakob Wassermann (FHTW Wien; AT) 1. Brightness correction and stereovision impression based methods for perceived quality improvement of CCTV video sequences, Julian Balcerek (Poznan University of 2. On Occlusion-Handling for People Detection Fusion in Multi-Camera Networks, Anselm Haselhoff (University of Wuppertal; DE) 3. A Multicriteria Model for Dynamic Route Planning, Andrzej Glowacz (AGH University of Science and 4. WSN-Based Fire Detection and Escape System with Multi-modal Feedback, Zahra Nauman (COMSATS Institute of Information Technology; PK) Lunch 1:15p Session VII ("Experiments and Lessons from Recent Deployments"), 5 Technical Papers * 18 min each

2:45p Chairman: Prof. Andrzej Duda (INP Grenoble - ENSIMAG, LIG Lab) 1. Integrating Applications Developed for Heterogeneous Platforms: Building an Environment for Criminal Analysts, Arkadiusz Świerczek (AGH University of Science and 2. LDA for Face Profile Detection, Tomasz Orzechowski (AGH University of Science and 3. Traffic Danger Ontology for Citizen Safety Web System, Weronika Adrian (AGH University of Science and 4. Acoustic Events Detection using MFCC and MPEG-7 Descriptors, Eva Vozarikova (Technical University of Kosice; SK) 5. Analysis of Malware Network Activity, Gilles Berger-Sabbatel (Grenoble Informatics laboratory; FR) 4:15p Session VIII ("Communications, Services and Security Applications"), 4 Technical Papers * 19 min each 4:30p Chairman: Dr. Ioannis Klapaftis (University of York) 1. Distributed Framework for Visual Event Detection in Parking Lot Area, Piotr Dalka (Gdansk University of 2. Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications, Jozef Kotus (Gdansk University of 3. Graph-based Relation Mining, Ioannis Klapaftis (University of York; UK) 4. Analysis of particular iris recognition stages, Tomasz Marciniak (PUT; PL) Best Paper Awards and Closing 5:45p