Frontiers of Multimedia Research
暂无分享,去创建一个
[1] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[2] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[3] Kai Li,et al. Efficient k-nearest neighbor graph construction for generic similarity measures , 2011, WWW.
[4] Amr M. Youssef,et al. Speaker recognition from encrypted VoIP communications , 2010, Digit. Investig..
[5] Masataka Goto. A predominant-F/sub 0/ estimation method for CD recordings: MAP estimation using EM algorithm for adaptive tone models , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[6] K. Wilson,et al. SPECTROGRAM DIMENSIONALITY REDUCTION WITH INDEPENDENCE CONSTRAINTS , 2010 .
[7] G. Kuhn,et al. You look where I look! Effect of gaze cues on overt and covert attention in misdirection , 2009 .
[8] Vincenzo Piuri,et al. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[9] Daniel P. W. Ellis,et al. Song-Level Features and Support Vector Machines for Music Classification , 2005, ISMIR.
[10] Thomas G. Dietterich,et al. Solving the Multiple Instance Problem with Axis-Parallel Rectangles , 1997, Artif. Intell..
[11] Andrew Chi-Chih Yao,et al. Should Tables Be Sorted? , 1981, JACM.
[12] Regunathan Radhakrishnan,et al. Generation of sports highlights using motion activity in combination with a common audio feature extraction framework , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[13] Shoji Kurakake,et al. Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[14] Yu Wang. An FSM model for situation-aware mobile application software systems , 2004, ACM-SE 42.
[15] Wenjun Zeng,et al. Efficient frequency domain video scrambling for content access control , 1999, MULTIMEDIA '99.
[16] Philip Ross,et al. Cloud Computing's Killer App: Gaming , 2009, IEEE Spectrum.
[17] Alan Hanjalic. Multimedia retrieval that matters , 2013, TOMCCAP.
[18] Andrew Zisserman,et al. Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[19] Alan Kingstone,et al. Recurrence quantification analysis of eye movements , 2013, Behavior Research Methods.
[20] Ian D. Reid,et al. Estimating Gaze Direction from Low-Resolution Faces in Video , 2006, ECCV.
[21] Stefan Katzenbeisser,et al. Signal Processing in the Encrypted Domain , 2007, EURASIP J. Inf. Secur..
[22] Trevor Darrell,et al. Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation , 2013, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[23] Cordelia Schmid,et al. Vector Quantizing Feature Space with a Regular Lattice , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[24] Junfeng He,et al. Optimal Parameters for Locality-Sensitive Hashing , 2012, Proceedings of the IEEE.
[25] Andrey Temko,et al. ACOUSTIC EVENT DETECTION AND CLASSIFICATION IN SMART-ROOM ENVIRONMENTS: EVALUATION OF CHIL PROJECT SYSTEMS , 2006 .
[26] R. Bayer,et al. Organization and maintenance of large ordered indices , 1970, SIGFIDET '70.
[27] James Anderson Moorer,et al. On the segmentation and analysis of continuous musical sound by digital computer , 1975 .
[28] Hamed Haddadi,et al. Personal Data: Thinking Inside the Box , 2015, Aarhus Conference on Critical Alternatives.
[29] Shuang Wu,et al. Compact Audio Representation for Event Detection in Consumer Media , 2012, INTERSPEECH.
[30] Hanan Samet,et al. Incremental distance join algorithms for spatial databases , 1998, SIGMOD '98.
[31] David Nistér,et al. Scalable Recognition with a Vocabulary Tree , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[32] Ramesh C. Jain,et al. From microblogs to social images: event analytics for situation assessment , 2010, MIR '10.
[33] Alex Pentland,et al. Summary abstract for the 1st ACM international workshop on personal data meets distributed multimedia , 2013, MM '13.
[34] Julien Bringer,et al. GSHADE: faster privacy-preserving distance computation and biometric identification , 2014, IH&MMSec '14.
[35] Laurent Amsaleg,et al. Indexing and searching 100M images with map-reduce , 2013, ICMR.
[36] Ramesh C. Jain,et al. Geospatial interpolation analytics for data streams in eventshop , 2015, 2015 IEEE International Conference on Multimedia and Expo (ICME).
[37] Yun Yang,et al. User interest and social influence based emotion prediction for individuals , 2013, ACM Multimedia.
[38] Sujit Dey,et al. Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications , 2013, IEEE Transactions on Multimedia.
[39] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[40] Raphael C.-W. Phan,et al. Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis , 2013, IEEE Transactions on Affective Computing.
[41] Jaeyoung Choi,et al. User verification: Matching the uploaders of videos across accounts , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[42] Christopher Joseph Pal,et al. Using Descriptive Video Services to Create a Large Data Source for Video Annotation Research , 2015, ArXiv.
[43] Daniel Gatica-Perez,et al. Modeling Flickr Communities Through Probabilistic Topic-Based Analysis , 2010, IEEE Transactions on Multimedia.
[44] Mubarak Shah,et al. UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild , 2012, ArXiv.
[45] Gene Tsudik,et al. QUEST Software and , 2022 .
[46] Martial Hebert,et al. Rapid object indexing using locality sensitive hashing and joint 3D-signature space estimation , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[47] Vivek K. Goyal,et al. Quantized Overcomplete Expansions in IRN: Analysis, Synthesis, and Algorithms , 1998, IEEE Trans. Inf. Theory.
[48] Ruslan Salakhutdinov,et al. Action Recognition using Visual Attention , 2015, NIPS 2015.
[49] Kai Hwang,et al. Game cloud design with virtualized CPU/GPU servers and initial performance results , 2012, ScienceCloud '12.
[50] Y. Kamarianakis,et al. Forecasting Traffic Flow Conditions in an Urban Network: Comparison of Multivariate and Univariate Approaches , 2003 .
[51] Zhe Wang,et al. Modeling LSH for performance tuning , 2008, CIKM '08.
[52] Philip S. Yu,et al. A Framework for Clustering Evolving Data Streams , 2003, VLDB.
[53] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[54] Xinlei Chen,et al. Microsoft COCO Captions: Data Collection and Evaluation Server , 2015, ArXiv.
[55] Brad A. Myers,et al. Past, Present and Future of User Interface Software Tools , 2000, TCHI.
[56] M. Koyuncu,et al. Evaluation of International Affective Picture System (IAPS) ratings in an athlete population and its relations to personality , 2010 .
[57] Weili Wu,et al. Spatial contextual classification and prediction models for mining geospatial data , 2002, IEEE Trans. Multim..
[58] Po-Sen Huang,et al. On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval , 2011, 2011 IEEE International Symposium on Multimedia.
[59] Victor I. Chang,et al. A Categorisation of Cloud Computing Business Models , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[60] Matthew J. Hausknecht,et al. Beyond short snippets: Deep networks for video classification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[61] Alejandro Jaimes,et al. Analyzing Favorite Behavior in Flickr , 2013, MMM.
[62] Subramanian Ramanathan,et al. SALSA: A Novel Dataset for Multimodal Group Behavior Analysis , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[63] Yihong Gong,et al. Linear spatial pyramid matching using sparse coding for image classification , 2009, CVPR.
[64] A. Hawkes,et al. A cluster process representation of a self-exciting process , 1974, Journal of Applied Probability.
[65] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[66] Victor S. Lempitsky,et al. Tree quantization for large-scale similarity search and classification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[67] A. Dassios,et al. Exact Simulation of Hawkes Process with Exponentially Decaying Intensity , 2013 .
[68] Bhiksha Raj,et al. Greedy sparsity-constrained optimization , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[69] Ying Luo,et al. Anonymous subject identification in privacy-aware video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[70] Alexandr Andoni,et al. Nearest neighbor search : the old, the new, and the impossible , 2009 .
[71] Xiaojin Zhu,et al. Introduction to Semi-Supervised Learning , 2009, Synthesis Lectures on Artificial Intelligence and Machine Learning.
[72] Radu Horaud,et al. A Variational EM Algorithm for the Separation of Time-Varying Convolutive Audio Mixtures , 2016, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[73] Matthias Scheutz,et al. Brainput: enhancing interactive systems with streaming fnirs brain input , 2012, CHI.
[74] Markus Koch,et al. Linking visual concept detection with viewer demographics , 2012, ICMR '12.
[75] Loong Fah Cheong,et al. Active Visual Segmentation , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[76] P. Ekman. An argument for basic emotions , 1992 .
[77] Eduardo Sontag,et al. Turing computability with neural nets , 1991 .
[78] Cheng-Hsin Hsu,et al. Using graphics rendering contexts to enhance the real-time video coding for mobile cloud gaming , 2011, ACM Multimedia.
[79] Lorenz T. Biegler,et al. On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..
[80] Hongyuan Zha,et al. Trailer Generation via a Point Process-Based Visual Attractiveness Model , 2015, IJCAI.
[81] Lifeng Sun,et al. Who should share what?: item-level social influence prediction for users and posts ranking , 2011, SIGIR.
[82] Subramanian Ramanathan,et al. Uncovering Interactions and Interactors: Joint Estimation of Head, Body Orientation and F-Formations from Surveillance Videos , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[83] Trevor Darrell,et al. YouTube2Text: Recognizing and Describing Arbitrary Activities Using Semantic Hierarchies and Zero-Shot Recognition , 2013, 2013 IEEE International Conference on Computer Vision.
[84] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[85] Christopher Joseph Pal,et al. Delving Deeper into Convolutional Networks for Learning Video Representations , 2015, ICLR.
[86] Thomas Schneider,et al. Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" , 2014, IH&MMSec '14.
[87] Suman Banerjee,et al. ParaDrop: a multi-tenant platform to dynamically install third party services on wireless gateways , 2014, MobiArch '14.
[88] Soo-Chang Pei,et al. Secure and robust SIFT , 2009, ACM Multimedia.
[89] Ronald Fagin,et al. Efficient similarity search and classification via rank aggregation , 2003, SIGMOD '03.
[90] Ben J. A. Kröse,et al. Detecting F-formations as dominant sets , 2011, ICMI '11.
[91] Susanne Boll,et al. Tangible Apps Bracelet: Designing Modular Wrist-Worn Digital Jewellery for Multiple Purposes , 2016, Conference on Designing Interactive Systems.
[92] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[93] Matthew O Jackson,et al. Using selection bias to explain the observed structure of Internet diffusions , 2010, Proceedings of the National Academy of Sciences.
[94] John R. Smith,et al. Using MPEG-7 and MPEG-21 for personalizing video , 2004, IEEE MultiMedia.
[95] Opher Etzion,et al. Amit - the situation manager , 2003, The VLDB Journal.
[96] Shih-Fu Chang,et al. Semi-Supervised Hashing for Large-Scale Search , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[97] Lawrence G. Roberts,et al. Machine Perception of Three-Dimensional Solids , 1963, Outstanding Dissertations in the Computer Sciences.
[98] Patrick Pérez,et al. Approximate Search with Quantized Sparse Representations , 2016, ECCV.
[99] Y. de Montjoye,et al. Unique in the shopping mall: On the reidentifiability of credit card metadata , 2015, Science.
[100] Soo-Chang Pei,et al. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction , 2011, Electronic Imaging.
[101] Barbara Caputo,et al. Recognizing human actions: a local SVM approach , 2004, ICPR 2004.
[102] Zhou Su,et al. What Videos Are Similar with You?: Learning a Common Attributed Representation for Video Recommendation , 2014, ACM Multimedia.
[103] Stefan Winkler,et al. ASCERTAIN: Emotion and Personality Recognition Using Commercial Sensors , 2018, IEEE Transactions on Affective Computing.
[104] Ian D. Reid,et al. Unsupervised learning of a scene-specific coarse gaze estimator , 2011, 2011 International Conference on Computer Vision.
[105] Cong Wang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[106] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[107] Shai Avidan,et al. Blind Vision , 2006, ECCV.
[108] Xuemin Lin,et al. Approximate Nearest Neighbor Search on High Dimensional Data — Experiments, Analyses, and Improvement , 2016, IEEE Transactions on Knowledge and Data Engineering.
[109] Ramesh C. Jain,et al. Situation Recognition Using EventShop , 2016, Springer International Publishing.
[110] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[111] Albrecht Schmidt,et al. Multi-Sensor Context-Awareness in Mobile Devices and Smart Artifacts , 2002, Mob. Networks Appl..
[112] Raymond Reiter,et al. Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems , 2001 .
[113] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[114] Bhiksha Raj,et al. Privacy-preserving speaker verification as password matching , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[115] Bhiksha Raj,et al. Non-negative Hidden Markov Modeling of Audio with Application to Source Separation , 2010, LVA/ICA.
[116] Sari Järvinen,et al. QoS-Aware real-time video encoding How to Improve the User Experience of a Gaming-on-Demand Service , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[117] Luc Van Gool,et al. The Pascal Visual Object Classes Challenge: A Retrospective , 2014, International Journal of Computer Vision.
[118] Daniel P. W. Ellis,et al. Quantitative Analysis of a Common Audio Similarity Measure , 2009, IEEE Transactions on Audio, Speech, and Language Processing.
[119] Qi Tian,et al. Social Visual Image Ranking for Web Image Search , 2013, MMM.
[120] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[121] Cordelia Schmid,et al. Accurate Image Search Using the Contextual Dissimilarity Measure , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[122] Leandros Tassiulas,et al. Resource Allocation and Cross-Layer Control in Wireless Networks , 2006, Found. Trends Netw..
[123] Pradeep K. Atrey,et al. Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[124] Jack J. Dongarra,et al. A set of level 3 basic linear algebra subprograms , 1990, TOMS.
[125] Lynsey Dubbeld,et al. Protecting Personal Data in Camera Surveillance Practices , 2002 .
[126] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[127] Hua-Jun Hong,et al. Placing Virtual Machines to Optimize Cloud Gaming Experience , 2015, IEEE Transactions on Cloud Computing.
[128] Oswald Lanz,et al. Approximate Bayesian multibody tracking , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[129] Zhenhuan Gong,et al. PRESS: PRedictive Elastic ReSource Scaling for cloud systems , 2010, 2010 International Conference on Network and Service Management.
[130] Tao Mei,et al. Jointly Modeling Embedding and Translation to Bridge Video and Language , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[131] Arto Ojala,et al. Developing Cloud Business Models: A Case Study on Cloud Gaming , 2011, IEEE Software.
[132] Jaeyoung Choi,et al. Multimodal city-verification on flickr videos using acoustic and textual features , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[133] Stefan Katzenbeisser,et al. Secure Computations on Real-Valued Signals , 2010 .
[134] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[135] Susan T. Dumais,et al. To personalize or not to personalize: modeling queries with variation in user intent , 2008, SIGIR '08.
[136] Daniel P. W. Ellis,et al. Identifying `Cover Songs' with Chroma Features and Dynamic Programming Beat Tracking , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[137] Gerald Friedland,et al. The 2010 ICSI Video Location Estimation System , 2010 .
[138] Subramanian Ramanathan,et al. An Adaptation Framework for Head-Pose Classification in Dynamic Multi-view Scenarios , 2012, ACCV.
[139] Jian Sun,et al. Identity Mappings in Deep Residual Networks , 2016, ECCV.
[140] Cordelia Schmid,et al. Actions in context , 2009, CVPR.
[141] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[142] Mohan S. Kankanhalli,et al. Concept Based Hybrid Fusion of Multimodal Event Signals , 2016, 2016 IEEE International Symposium on Multimedia (ISM).
[143] Masaaki Fujiyoshi,et al. Signal and Image Processing in the Encrypted Domain , 1970 .
[144] Jian Sun,et al. K-Means Hashing: An Affinity-Preserving Quantization Method for Learning Binary Compact Codes , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[145] George Tzanetakis,et al. Musical genre classification of audio signals , 2002, IEEE Trans. Speech Audio Process..
[146] Stephen Blott,et al. An Approximation- Based Data Structure for Similarity Search , 2006 .
[147] Hans-Jörg Schek,et al. A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces , 1998, VLDB.
[148] Bhiksha Raj,et al. Missing Data Imputation for Time-Frequency Representations of Audio Signals , 2011, J. Signal Process. Syst..
[149] Alexandros Nanopoulos,et al. Hubs in Space: Popular Nearest Neighbors in High-Dimensional Data , 2010, J. Mach. Learn. Res..
[150] Susan T. Dumais,et al. Personalizing Search via Automated Analysis of Interests and Activities , 2005, SIGIR.
[151] Takuya Fujishima,et al. Realtime Chord Recognition of Musical Sound: a System Using Common Lisp Music , 1999, ICMC.
[152] Po-Chyi Su,et al. A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance Videos , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[153] Rama Chellappa,et al. Machine Recognition of Human Activities: A Survey , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[154] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[155] Antonio Torralba,et al. Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.
[156] Cheng-Hsin Hsu,et al. Screencast dissected: performance measurements and design considerations , 2015, MMSys.
[157] Frank Keller,et al. Training Object Class Detectors from Eye Tracking Data , 2014, ECCV.
[158] Ioannis Patras,et al. Fusion of facial expressions and EEG for implicit affective tagging , 2013, Image Vis. Comput..
[159] Mark Sanderson,et al. Automatic video tagging using content redundancy , 2009, SIGIR.
[160] William Curran,et al. An Event Driven Fusion Approach for Enjoyment Recognition in Real-time , 2014, ACM Multimedia.
[161] Ramesh Jain,et al. Situation based control for cyber-physical environments , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[162] Chong-Wah Ngo,et al. Predicting domain adaptivity: redo or recycle? , 2012, ACM Multimedia.
[163] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[164] Philip S. Yu,et al. CSR: Speaker Recognition from Compressed VoIP Packet Stream , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[165] Alan C. Bovik,et al. GAFFE: A Gaze-Attentive Fixation Finding Engine , 2008, IEEE Transactions on Image Processing.
[166] Nikolay Borissov,et al. Cloud Computing – A Classification, Business Models, and Research Directions , 2009, Bus. Inf. Syst. Eng..
[167] Alessio Del Bue,et al. Social interaction discovery by statistical analysis of F-formations , 2011, BMVC.
[168] Alex Pentland,et al. Situation fencing: making geo-fencing personal and dynamic , 2013, PDM '13.
[169] Jianhua Ma,et al. Lifelog Image Analysis Based on Activity Situation Models Using Contexts from Wearable Multi Sensors , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[170] Mohan S. Kankanhalli,et al. Motivating contributors in social media networks , 2009, WSM@MM.
[171] Doina Precup,et al. Probabilistic Temporal Head Pose Estimation Using a Hierarchical Graphical Model , 2014, ECCV.
[172] Piotr Indyk,et al. Approximate nearest neighbor algorithms for Frechet distance via product metrics , 2002, SCG '02.
[173] David K. Mellinger,et al. Event formation and separation in musical sound , 1992 .
[174] C.-C. Jay Kuo,et al. Audio content analysis for online audiovisual data segmentation and classification , 2001, IEEE Trans. Speech Audio Process..
[175] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[176] Xin Geng,et al. Head Pose Estimation Based on Multivariate Label Distribution , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[177] Derrick J. Parkhurst,et al. Scene content selected by active vision. , 2003, Spatial vision.
[178] A. Veen,et al. Estimation of Space–Time Branching Process Models in Seismology Using an EM–Type Algorithm , 2006 .
[179] Matthijs Douze,et al. Searching in one billion vectors: Re-rank with source coding , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[180] Stefan Katzenbeisser,et al. Privacy preserving error resilient dna searching through oblivious automata , 2007, CCS '07.
[181] Sujit Dey,et al. Addressing Response Time and Video Quality in Remote Server Based Internet Mobile Gaming , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[182] Emiliano Miluzzo,et al. People-centric urban sensing , 2006, WICON '06.
[183] Xuelong Li,et al. Complementary Projection Hashing , 2013, 2013 IEEE International Conference on Computer Vision.
[184] Shih-Fu Chang,et al. Exploiting Feature and Class Relationships in Video Categorization with Regularized Deep Neural Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[185] Jinhui Tang,et al. Sparse composite quantization , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[186] Mohammad Soleymani,et al. A Multimodal Database for Affect Recognition and Implicit Tagging , 2012, IEEE Transactions on Affective Computing.
[187] Armen Aghasaryan,et al. On the Use of LSH for Privacy Preserving Personalization , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[188] Stefan Winkler,et al. Implicit User-centric Personality Recognition Based on Physiological Responses to Emotional Videos , 2015, ICMI.
[189] Jia Xu,et al. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.
[190] Ton Kalker,et al. A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.
[191] Stefan Carlsson,et al. CNN Features Off-the-Shelf: An Astounding Baseline for Recognition , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.
[192] Thierry Pun,et al. DEAP: A Database for Emotion Analysis ;Using Physiological Signals , 2012, IEEE Transactions on Affective Computing.
[193] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[194] Janne Heikkilä,et al. Predicting the Valence of a Scene from Observers’ Eye Movements , 2015, PloS one.
[195] Nicu Sebe,et al. Analyzing Free-standing Conversational Groups: A Multimodal Approach , 2015, ACM Multimedia.
[196] Desney S. Tan,et al. Combining brain computer interfaces with vision for object categorization , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[197] Piotr Indyk,et al. Similarity Search in High Dimensions via Hashing , 1999, VLDB.
[198] Laurent Amsaleg,et al. Fast and secure similarity search in high dimensional space , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).
[199] Tarek Elgamal,et al. sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms , 2015, SIGMOD Conference.
[200] Bao-Liang Lu,et al. Transfer Components Between Subjects for EEG-based Driving Fatigue Detection , 2015, ICONIP.
[201] Kwong-Sak Leung,et al. A Survey of Crowdsourcing Systems , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[202] Huan Liu,et al. Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose , 2013, ICWSM.
[203] Pradeep K. Atrey,et al. Homomorphic Low Pass Filtering on Encrypted Multimedia over Cloud , 2013, 2013 IEEE Seventh International Conference on Semantic Computing.
[204] Andrew Zisserman,et al. Convolutional Two-Stream Network Fusion for Video Action Recognition , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[205] Hector J. Levesque,et al. GOLOG: A Logic Programming Language for Dynamic Domains , 1997, J. Log. Program..
[206] Guizhong Liu,et al. Buffer status and content aware scheduling scheme for cloud gaming based on video streaming , 2014, 2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW).
[207] Yan Ke,et al. An efficient parts-based near-duplicate and sub-image retrieval system , 2004, MULTIMEDIA '04.
[208] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[209] Bhiksha Raj,et al. Probabilistic Latent Variable Models as Nonnegative Factorizations , 2008, Comput. Intell. Neurosci..
[210] Yale Song,et al. Multimodal human behavior analysis: learning correlation and interaction across modalities , 2012, ICMI '12.
[211] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[212] Cordelia Schmid,et al. P-CNN: Pose-Based CNN Features for Action Recognition , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[213] Ronen Basri,et al. Actions as space-time shapes , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[214] Paris Smaragdis,et al. Secure Sound Classification: Gaussian Mixture Models , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[215] Guy J. Brown,et al. Computational Auditory Scene Analysis: Principles, Algorithms, and Applications , 2006 .
[216] Gerald Friedland,et al. Acoustic super models for large scale video event detection , 2011, J-MRE '11.
[217] Cheng-Hsin Hsu,et al. GamingAnywhere: an open-source cloud gaming testbed , 2013, ACM Multimedia.
[218] Chun-I Fan,et al. Encrypted Data Deduplication in Cloud Storage , 2015, 2015 10th Asia Joint Conference on Information Security.
[219] Jiebo Luo,et al. Kodak consumer video benchmark data set : concept definition and annotation * * , 2008 .
[220] Mauro Barni,et al. Processing in the encrypted domain using a composite signal representation: Pros and cons , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[221] Martha Larson,et al. Intent-Aware Video Search Result Optimization , 2014, IEEE Transactions on Multimedia.
[222] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[223] Gang Sun,et al. A Key Volume Mining Deep Framework for Action Recognition , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[224] Radu Horaud,et al. Vision-guided robot hearing , 2013, Int. J. Robotics Res..
[225] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[226] Ramesh Jain,et al. Event analytics on Microblogs , 2010 .
[227] Sergey Ioffe,et al. Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.
[228] Arun Ross,et al. Biometrics Security and Privacy Protection [From the Guest Editors] , 2015, IEEE Signal Process. Mag..
[229] Andrew W. Fitzgibbon,et al. Real-time human pose recognition in parts from single depth images , 2011, CVPR 2011.
[230] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[231] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[232] Bhiksha Raj,et al. Optimization of the DET curve in speaker verification under noisy conditions , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[233] Rainer Stiefelhagen,et al. 3D user-perspective, voxel-based estimation of visual focus of attention in dynamic meeting scenarios , 2010, ICMI-MLMI '10.
[234] Richard M. Stern,et al. Likelihood-maximizing beamforming for robust hands-free speech recognition , 2004, IEEE Transactions on Speech and Audio Processing.
[235] Nicu Sebe,et al. Image saliency by isocentric curvedness and color , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[236] Chin-Hui Lee,et al. Automatic recognition of keywords in unconstrained speech using hidden Markov models , 1990, IEEE Trans. Acoust. Speech Signal Process..
[237] Thierry Bertin-Mahieux,et al. Large-scale cover song recognition using hashed chroma landmarks , 2011, 2011 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA).
[238] Tharam S. Dillon,et al. SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[239] Ming-Ching Chang,et al. Gaze and body pose estimation from a distance , 2011, 2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[240] Wei Liu,et al. Learning to Hash for Indexing Big Data—A Survey , 2015, Proceedings of the IEEE.
[241] Richard Rose,et al. A hidden Markov model based keyword recognition system , 1990, International Conference on Acoustics, Speech, and Signal Processing.
[242] Bernard Ghanem,et al. ActivityNet: A large-scale video benchmark for human activity understanding , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[243] Patrick Pérez,et al. Explicit Embeddings for Nearest Neighbor Search with Mercer Kernels , 2015, Journal of Mathematical Imaging and Vision.
[244] Nalini Venkatasubramanian,et al. Clouds + Games: A Multifaceted Approach , 2014, IEEE Internet Computing.
[245] Pankesh Patel,et al. Service Level Agreement in Cloud Computing , 2009 .
[246] Lorenzo Torresani,et al. C3D: Generic Features for Video Analysis , 2014, ArXiv.
[247] Frank Kurth,et al. Detecting bird sounds in a complex acoustic environment and application to bioacoustic monitoring , 2010, Pattern Recognit. Lett..
[248] Rajkumar Buyya,et al. SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions , 2011, 2011 International Conference on Cloud and Service Computing.
[249] Xavier Bresson,et al. Matrix Completion on Graphs , 2014, NIPS 2014.
[250] Bhiksha Raj,et al. Detecting sound objects in audio recordings , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[251] Julien Rabin,et al. A contrario matching of SIFT-like descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[252] Sujit Dey,et al. Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[253] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[254] C. V. Jawahar,et al. The truth about cats and dogs , 2011, 2011 International Conference on Computer Vision.
[255] Martha Larson,et al. Intent and its discontents: the user at the wheel of the online video search engine , 2012, ACM Multimedia.
[256] Bhiksha Raj,et al. Audio event detection from acoustic unit occurrence patterns , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[257] Georges Quénot,et al. TRECVID 2015 - An Overview of the Goals, Tasks, Data, Evaluation Mechanisms and Metrics , 2011, TRECVID.
[258] Marcus Rohrbach,et al. A Multi-scale Multiple Instance Video Description Network , 2015, ArXiv.
[259] Bernt Schiele,et al. The Long-Short Story of Movie Description , 2015, GCPR.
[260] Victor S. Lempitsky,et al. Neural Codes for Image Retrieval , 2014, ECCV.
[261] Gerald J. Gorn,et al. The Effects of Music in Advertising on Choice Behavior: A Classical Conditioning Approach: , 1982 .
[262] Zhongchao Shi,et al. Boosting Video Description Generation by Explicitly Translating from Frame-Level Captions , 2016, ACM Multimedia.
[263] Xi Wang,et al. Multi-Stream Multi-Class Fusion of Deep Networks for Video Classification , 2016, ACM Multimedia.
[264] David P. Anderson,et al. BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.
[265] Cordelia Schmid,et al. Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.
[266] Daniel P. W. Ellis,et al. Signal Processing for Music Analysis , 2011, IEEE Journal of Selected Topics in Signal Processing.
[267] John R. Hershey,et al. Super-human multi-talker speech recognition: A graphical modeling approach , 2010, Comput. Speech Lang..
[268] J. Rasmussen,et al. Perfect simulation of Hawkes processes , 2005, Advances in Applied Probability.
[269] Martin Ester,et al. TrustWalker: a random walk model for combining trust-based and item-based recommendation , 2009, KDD.
[270] Gerald Friedland,et al. Two's a crowd: improving speaker diarization by automatically identifying and excluding overlapped speech , 2008, INTERSPEECH.
[271] Daniel P. W. Ellis,et al. Tandem acoustic modeling in large-vocabulary recognition , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[272] John R. Kender,et al. Visual memes in social media: tracking real-world news in YouTube videos , 2011, ACM Multimedia.
[273] Tao Mei,et al. Boosting Image Captioning with Attributes , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[274] Yoshua Bengio,et al. Maxout Networks , 2013, ICML.
[275] Juan Carlos Niebles,et al. Modeling Temporal Structure of Decomposable Motion Segments for Activity Classification , 2010, ECCV.
[276] Alexander Vardy,et al. Closest point search in lattices , 2002, IEEE Trans. Inf. Theory.
[277] Daniel P. W. Ellis,et al. A Large-Scale Evaluation of Acoustic and Subjective Music-Similarity Measures , 2004, Computer Music Journal.
[278] Lawrence D. Jackel,et al. Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.
[279] Benjamin Recht,et al. Random Features for Large-Scale Kernel Machines , 2007, NIPS.
[280] Olivier Buisson,et al. A posteriori multi-probe locality sensitive hashing , 2008, ACM Multimedia.
[281] Zekeriya Erkin,et al. Efficiently computing private recommendations , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[282] N. J. A. Sloane,et al. Fast quantizing and decoding and algorithms for lattice quantizers and codes , 1982, IEEE Trans. Inf. Theory.
[283] Nicu Sebe,et al. Affective multimodal human-computer interaction , 2005, ACM Multimedia.
[284] Jeff Johnson,et al. Billion-Scale Similarity Search with GPUs , 2017, IEEE Transactions on Big Data.
[285] David G. Lowe,et al. Scalable Nearest Neighbor Algorithms for High Dimensional Data , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[286] Andrew Zisserman,et al. Learning Local Feature Descriptors Using Convex Optimisation , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[287] Nitish Srivastava,et al. Unsupervised Learning of Video Representations using LSTMs , 2015, ICML.
[288] Yury A. Malkov,et al. Efficient and Robust Approximate Nearest Neighbor Search Using Hierarchical Navigable Small World Graphs , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[289] Songyang Lao,et al. Who produced this video, amateur or professional? , 2013, ICMR '13.
[290] Paris Smaragdis,et al. Missing data imputation for spectral audio signals , 2009, 2009 IEEE International Workshop on Machine Learning for Signal Processing.
[291] Piotr Indyk,et al. Nearest-neighbor-preserving embeddings , 2007, TALG.
[292] Patrick Gros,et al. Detecting repeats for video structuring , 2007, Multimedia Tools and Applications.
[293] Bhiksha Raj,et al. Exploiting Temporal Sequence Structure for Semantic Analysis of Multimedia , 2012, INTERSPEECH.
[294] Subramanian Ramanathan,et al. DECAF: MEG-Based Multimodal Database for Decoding Affective Physiological Responses , 2015, IEEE Transactions on Affective Computing.
[295] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[296] D. Hubel,et al. Receptive fields and functional architecture of monkey striate cortex , 1968, The Journal of physiology.
[297] Piotr Indyk,et al. Approximate nearest neighbor algorithms for Hausdorff metrics via embeddings , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[298] Jon Louis Bentley,et al. An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.
[299] Ali Asghar Nazari Shirehjini. Situation modelling: a domain analysis and user study , 2006 .
[300] Subramanian Ramanathan,et al. Exploring Transfer Learning Approaches for Head Pose Classification from Multi-view Surveillance Images , 2013, International Journal of Computer Vision.
[301] Paris Smaragdis,et al. Blind separation of convolved mixtures in the frequency domain , 1998, Neurocomputing.
[302] Alexander Vardy,et al. Maximum likelihood decoding of the Leech lattice , 1993, IEEE Trans. Inf. Theory.
[303] J. Beauchamp,et al. Fundamental frequency estimation of musical signals using a two‐way mismatch procedure , 1994 .
[304] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[305] Thomas Serre,et al. HMDB: A large video database for human motion recognition , 2011, 2011 International Conference on Computer Vision.
[306] Mohan S. Kankanhalli,et al. Privacy aware publication of surveillance video , 2013, Int. J. Trust. Manag. Comput. Commun..
[307] Nitish Srivastava,et al. Exploiting Image-trained CNN Architectures for Unconstrained Video Classification , 2015, BMVC.
[308] Thomas Mensink,et al. Image Classification with the Fisher Vector: Theory and Practice , 2013, International Journal of Computer Vision.
[309] J.K. Aggarwal,et al. Human activity analysis , 2011, ACM Comput. Surv..
[310] Jonathan Brandt,et al. Transform coding for fast approximate nearest neighbor search in high dimensions , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[311] Bernt Schiele,et al. A dataset for Movie Description , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[312] Subramanian Ramanathan,et al. Can computers learn from humans to see better?: inferring scene semantics from viewers' eye movements , 2011, ACM Multimedia.
[313] Richard M. Stern,et al. Optimization of the DET curve in speaker verification , 2012, 2012 IEEE Spoken Language Technology Workshop (SLT).
[314] Paul Messaris,et al. Visual Persuasion: The Role of Images in Advertising , 1996 .
[315] Andrew Zisserman,et al. Two-Stream Convolutional Networks for Action Recognition in Videos , 2014, NIPS.
[316] Erez Shmueli,et al. openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.
[317] Alex Pentland,et al. Sensing, Understanding, and Shaping Social Behavior , 2014, IEEE Transactions on Computational Social Systems.
[318] Andrew Zisserman,et al. Efficient Additive Kernels via Explicit Feature Maps , 2012, IEEE Trans. Pattern Anal. Mach. Intell..
[319] Peter Robinson,et al. OpenFace: An open source facial behavior analysis toolkit , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).
[320] Stephen S. Yau,et al. Hierarchical situation modeling and reasoning for pervasive computing , 2006, The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06).
[321] Yi Yang,et al. A discriminative CNN video representation for event detection , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[322] Elisa Ricci,et al. Space speaks: towards socially and personality aware visual surveillance , 2010, MPVA '10.
[323] Xianglong Liu,et al. Reciprocal Hash Tables for Nearest Neighbor Search , 2013, AAAI.
[324] Min Wu,et al. Secure video processing: Problems and challenges , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[325] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[326] Cordelia Schmid,et al. Improving Bag-of-Features for Large Scale Image Search , 2010, International Journal of Computer Vision.
[327] Francesco Setti,et al. F-Formation Detection: Individuating Free-Standing Conversational Groups in Images , 2015, PloS one.
[328] Tao Mei,et al. Video Captioning with Transferred Semantic Attributes , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[329] Desney S. Tan,et al. Human-aided computing: utilizing implicit human processing to classify images , 2008, CHI.
[330] Lea Skorin-Kapov,et al. Empirical QoE study of in-home streaming of online games , 2014, 2014 13th Annual Workshop on Network and Systems Support for Games.
[331] Ahmad-Reza Sadeghi,et al. Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.
[332] M S Magnusson,et al. Discovering hidden time patterns in behavior: T-patterns and their detection , 2000, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[333] Tao Mei,et al. Action Recognition by Learning Deep Multi-Granular Spatio-Temporal Video Representation , 2016, ICMR.
[334] Rongrong Ji,et al. Large-scale visual sentiment ontology and detectors using adjective noun pairs , 2013, ACM Multimedia.
[335] Terrence J. Sejnowski,et al. An Information-Maximization Approach to Blind Separation and Blind Deconvolution , 1995, Neural Computation.
[336] Kunihiko Fukushima,et al. Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position , 1980, Biological Cybernetics.
[337] Hervé Jégou,et al. Using extreme value theory for image detection , 2013 .
[338] Subramanian Ramanathan,et al. Connecting Meeting Behavior with Extraversion—A Systematic Study , 2012, IEEE Transactions on Affective Computing.
[339] L. Lewis,et al. A Framework of Cognitive Situation Modeling and Recognition , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[340] Ramesh C. Jain,et al. Towards Environment-to-Environment (E2E) multimedia communication systems , 2008, SAME '08.
[341] Chau Yuen,et al. Enabling Adaptive High-Frame-Rate Video Streaming in Mobile Cloud Gaming Applications , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[342] Alan N. Steinberg,et al. Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.
[343] Kai Li,et al. Image similarity search with compact data structures , 2004, CIKM '04.
[344] Francesco Setti,et al. Multi-scale f-formation discovery for group detection , 2013, 2013 IEEE International Conference on Image Processing.
[345] Frédéric Jurie,et al. Sampling Strategies for Bag-of-Features Image Classification , 2006, ECCV.
[346] Sergey Ioffe,et al. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.
[347] Susan T. Dumais,et al. Learning user interaction models for predicting web search result preferences , 2006, SIGIR.
[348] Christopher Joseph Pal,et al. Describing Videos by Exploiting Temporal Structure , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[349] Ali Farhadi,et al. Actions ~ Transformations , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[350] Ronald Poppe,et al. A survey on vision-based human action recognition , 2010, Image Vis. Comput..
[351] Anssi Klapuri,et al. Multiple fundamental frequency estimation based on harmonicity and spectral smoothness , 2003, IEEE Trans. Speech Audio Process..
[352] Nicu Sebe,et al. Looking at the viewer: analysing facial activity to detect personal highlights of multimedia contents , 2010, Multimedia Tools and Applications.
[353] Emmanuel J. Candès,et al. The Power of Convex Relaxation: Near-Optimal Matrix Completion , 2009, IEEE Transactions on Information Theory.
[354] Juan Carlos Niebles,et al. Unsupervised Learning of Human Action Categories Using Spatial-Temporal Words , 2008, International Journal of Computer Vision.
[355] Robert D. Nowak,et al. Transduction with Matrix Completion: Three Birds with One Stone , 2010, NIPS.
[356] Sharath Pankanti,et al. Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .
[357] Limin Wang,et al. Action recognition with trajectory-pooled deep-convolutional descriptors , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[358] Dong Liu,et al. EventNet: A Large Scale Structured Concept Library for Complex Event Detection in Video , 2015, ACM Multimedia.
[359] Alon Lavie,et al. METEOR: An Automatic Metric for MT Evaluation with Improved Correlation with Human Judgments , 2005, IEEvaluation@ACL.
[360] Nalini Venkatasubramanian,et al. Crowdsourced Mobile Data Transfer with Delay Bound , 2016, TOIT.
[361] Peter E. Hart,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[362] Alessandro Vinciarelli,et al. Canal9: A database of political debates for analysis of social interactions , 2009, 2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops.
[363] Sari Järvinen,et al. Experiments with QoS-Aware Gaming-on-Demand Service , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[364] Mubarak Shah,et al. High-level event recognition in unconstrained videos , 2013, International Journal of Multimedia Information Retrieval.
[365] Alex Pentland,et al. Social Persuasion in Online and Physical Networks , 2014, Proceedings of the IEEE.
[366] Murat Akbacak,et al. Bag-of-Audio-Words Approach for Multimedia Event Classification , 2012, INTERSPEECH.
[367] Trevor Darrell,et al. Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[368] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[369] SEONG-PING CHUAH,et al. Cloud gaming: a green solution to massive multiplayer online games , 2014, IEEE Wireless Communications.
[370] Victor Lempitsky,et al. Additive Quantization for Extreme Vector Compression , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[371] Trevor Darrell,et al. Learning to Hash with Binary Reconstructive Embeddings , 2009, NIPS.
[372] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[373] Jean-Marc Odobez,et al. We are not contortionists: Coupled adaptive learning for head and body orientation estimation in surveillance video , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.
[374] Ming Yang,et al. 3D Convolutional Neural Networks for Human Action Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[375] Qi Tian,et al. Super-Bit Locality-Sensitive Hashing , 2012, NIPS.
[376] A. Hawkes. Spectra of some self-exciting and mutually exciting point processes , 1971 .
[377] Radu Horaud,et al. An EM algorithm for joint source separation and diarisation of multichannel convolutive speech mixtures , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[378] Salim Roukos,et al. Bleu: a Method for Automatic Evaluation of Machine Translation , 2002, ACL.
[379] Bernard J. Jansen,et al. Search log analysis: What it is, what's been done, how to do it , 2006 .
[380] William B. Dolan,et al. Collecting Highly Parallel Data for Paraphrase Evaluation , 2011, ACL.
[381] Bhiksha Raj,et al. Latent-variable decomposition based dereverberation of monaural and multi-channel signals , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[382] R. Barthes. Camera Lucida: Reflections on Photography , 1980 .
[383] Pradeep K. Atrey,et al. Secure cloud-based medical data visualization , 2012, ACM Multimedia.
[384] Fei-Fei Li,et al. Large-Scale Video Classification with Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[385] Matthijs Douze,et al. How should we evaluate supervised hashing? , 2016, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[386] Fernando De la Torre,et al. Supervised Descent Method and Its Applications to Face Alignment , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[387] Jian Sun,et al. Optimized Product Quantization , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[388] David A. Shamma,et al. YFCC100M , 2015, Commun. ACM.
[389] Wei Xu,et al. Video Paragraph Captioning Using Hierarchical Recurrent Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[390] Sujit Dey,et al. Cloud Mobile Media: Opportunities, challenges, and directions , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[391] Stefan Winkler,et al. PET: An eye-tracking dataset for animal-centric Pascal object classes , 2015, 2015 IEEE International Conference on Multimedia and Expo (ICME).
[392] Antonio Torralba,et al. Small codes and large image databases for recognition , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[393] Malik Ghallab,et al. Situation Recognition: Representation and Algorithms , 1993, IJCAI.
[394] Subramanian Ramanathan,et al. On the relationship between head pose, social attention and personality prediction for unstructured and dynamic group interactions , 2013, ICMI '13.
[395] Yosihiko Ogata,et al. Statistical Models for Earthquake Occurrences and Residual Analysis for Point Processes , 1988 .
[396] Ting Liu,et al. Recent advances in convolutional neural networks , 2015, Pattern Recognit..
[397] Stefan Katzenbeisser,et al. Processing encrypted floating point signals , 2011, MM&Sec '11.
[398] Merriam-Webster. Merriam-Webster's Collegiate Dictionary , 1998 .
[399] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..
[400] Nathan Srebro,et al. On Symmetric and Asymmetric LSHs for Inner Product Search , 2014, ICML.
[401] Kunio Fukunaga,et al. Natural Language Description of Human Activities from Video Images Based on Concept Hierarchy of Actions , 2002, International Journal of Computer Vision.
[402] Augusto Sarti,et al. Scream and gunshot detection and localization for audio-surveillance systems , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.
[403] Christian F. Tschudin,et al. On Software Protection via Function Hiding , 1998, Information Hiding.
[404] Thomas S. Huang,et al. Relevance feedback: a power tool for interactive content-based image retrieval , 1998, IEEE Trans. Circuits Syst. Video Technol..
[405] Jing Wang,et al. Clickage: towards bridging semantic and intent gaps via mining click logs of search engines , 2013, ACM Multimedia.
[406] Rajkumar Buyya,et al. Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing , 2012, Future Gener. Comput. Syst..
[407] Ali Shokoufandeh,et al. Secure brightness/contrast filter using fully homomorphic encryption , 2015, IPSN '15.
[408] Gerald Friedland,et al. Overlapped speech detection for improved speaker diarization in multiparty meetings , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[409] Chin-Laung Lei,et al. Understanding the performance of thin-client gaming , 2011, 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).
[410] David J. Fleet,et al. Cartesian K-Means , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[411] Alex Pentland,et al. The Strength of the Strongest Ties in Collaborative Problem Solving , 2014, Scientific Reports.
[412] Li Lin,et al. LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming , 2014, IEEE/ACM Transactions on Networking.
[413] Bhiksha Raj,et al. Learning contextual relevance of audio segments using discriminative models over AUD sequences , 2011, 2011 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA).
[414] Daniel Gatica-Perez,et al. Human interaction discovery in smartphone proximity networks , 2013, Personal and Ubiquitous Computing.
[415] Andrea L. Bertozzi,et al. Point-process models of social network interactions: Parameter estimation and missing data recovery , 2015, European Journal of Applied Mathematics.
[416] Aly A. Farag,et al. CSIFT: A SIFT Descriptor with Color Invariant Characteristics , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).
[417] Kai Li,et al. Asymmetric distance estimation with sketches for similarity search in high-dimensional spaces , 2008, SIGIR '08.
[418] Kate Saenko,et al. Integrating Language and Vision to Generate Natural Language Descriptions of Videos in the Wild , 2014, COLING.
[419] Mohan M. Trivedi,et al. Head Pose Estimation in Computer Vision: A Survey , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[420] Bhiksha Raj,et al. Compositional Models for Audio Processing: Uncovering the structure of sound mixtures , 2015, IEEE Signal Processing Magazine.
[421] Zhe Wang,et al. Multi-Probe LSH: Efficient Indexing for High-Dimensional Similarity Search , 2007, VLDB.
[422] Angelos D. Keromytis,et al. A Survey of Voice over IP Security Research , 2009, ICISS.
[423] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[424] Jingdong Wang,et al. Composite Quantization for Approximate Nearest Neighbor Search , 2014, ICML.
[425] C. Koch,et al. A saliency-based search mechanism for overt and covert shifts of visual attention , 2000, Vision Research.
[426] Niv Ahituv,et al. Processing encrypted data , 1987, CACM.
[427] Mauro Barni,et al. Efficient pointwise and blockwise encrypted operations , 2008, MM&Sec '08.
[428] Bhiksha Raj,et al. Learning Model-Based Sparsity via Projected Gradient Descent , 2012, IEEE Transactions on Information Theory.
[429] J. Stephen Downie,et al. The music information retrieval evaluation exchange (2005-2007): A window into music information retrieval research , 2008 .
[430] Marcus Rohrbach,et al. Translating Videos to Natural Language Using Deep Recurrent Neural Networks , 2014, NAACL.
[431] Daniel P. W. Ellis,et al. Chord segmentation and recognition using EM-trained hidden markov models , 2003, ISMIR.
[432] Hua-Jun Hong,et al. Dynamic module deployment in a fog computing platform , 2016, 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS).
[433] Andrii Matviienko,et al. VapeTracker: Tracking Vapor Consumption to Help E-cigarette Users Quit , 2016, CHI Extended Abstracts.
[434] Richard G. Baraniuk,et al. 1-Bit compressive sensing , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[435] Mohan S. Kankanhalli,et al. W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video , 2012, Multimedia Tools and Applications.
[436] Hendrik P. A. Lensch,et al. Efficient Large-Scale Approximate Nearest Neighbor Search on the GPU , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[437] Laura A. Dabbish,et al. Labeling images with a computer game , 2004, AAAI Spring Symposium: Knowledge Collection from Volunteer Contributors.
[438] Wei-Ta Chu,et al. A Privacy-Preserving Bipartite Graph Matching Framework for Multimedia Analysis and Retrieval , 2015, ICMR.
[439] Tomás Lozano-Pérez,et al. A Framework for Multiple-Instance Learning , 1997, NIPS.
[440] James J. Little,et al. Stacked Quantizers for Compositional Vector Compression , 2014, ArXiv.
[441] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[442] Daniel P. W. Ellis,et al. Multiple-Instance Learning for Music Information Retrieval , 2008, ISMIR.
[443] Julien Rabin,et al. A Statistical Approach to the Matching of Local Features , 2009, SIAM J. Imaging Sci..
[444] Cordelia Schmid,et al. A contextual dissimilarity measure for accurate and efficient image search , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[445] T. Foulsham,et al. Comparing scanpaths during scene encoding and recognition : A multi-dimensional approach , 2012 .
[446] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[447] Doug Szajda,et al. Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm , 2006, NDSS.
[448] William Puech,et al. Emerging cryptographic challenges in image and video processing , 2012, 2012 19th IEEE International Conference on Image Processing.
[449] Lei Wu,et al. Tag Completion for Image Retrieval , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[450] Trevor Darrell,et al. Sequence to Sequence -- Video to Text , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[451] Radu Horaud,et al. RAVEL: an annotated corpus for training robots with audiovisual abilities , 2013, Journal on Multimodal User Interfaces.
[452] Claudio E. Palazzi,et al. Vegas Over Access Point: Making Room for Thin Client Game Systems in a Wireless Home , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[453] William Puech,et al. A Homomorphic Method for Sharing Secret Images , 2009, IWDW.
[454] Michael A. Casey,et al. Fast Recognition of Remixed Music Audio , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[455] Marius Preda,et al. Mobile Cloud Convergence in GaaS: A Business Model Proposition , 2012, 2012 45th Hawaii International Conference on System Sciences.
[456] Samy Bengio,et al. Show and tell: A neural image caption generator , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[457] Takeo Kanade,et al. The Extended Cohn-Kanade Dataset (CK+): A complete dataset for action unit and emotion-specified expression , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.
[458] Thorsten Joachims,et al. Transductive Inference for Text Classification using Support Vector Machines , 1999, ICML.
[459] Pradeep K. Atrey,et al. Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).
[460] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[461] Luc Van Gool,et al. Hello neighbor: Accurate object retrieval with k-reciprocal nearest neighbors , 2011, CVPR 2011.
[462] Alex Graves,et al. Supervised Sequence Labelling with Recurrent Neural Networks , 2012, Studies in Computational Intelligence.
[463] Andrea Vedaldi,et al. Dynamic Image Networks for Action Recognition , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[464] Carmen Peláez-Moreno,et al. Recognizing voice over IP: a robust front-end for speech recognition on the world wide web , 2001, IEEE Trans. Multim..
[465] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[466] Jean-Jacques Fuchs,et al. Spread representations , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[467] Vivek K. Singh,et al. Predicting Privacy Attitudes Using Phone Metadata , 2016, SBP-BRiMS.
[468] Mauro Barni,et al. Comparison of different FFT implementations in the encrypted domain , 2008, 2008 16th European Signal Processing Conference.
[469] Svetlana Lazebnik,et al. Iterative quantization: A procrustean approach to learning binary codes , 2011, CVPR 2011.
[470] David G. Lowe,et al. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.
[471] Cordelia Schmid,et al. Action Recognition with Improved Trajectories , 2013, 2013 IEEE International Conference on Computer Vision.
[472] Nicu Sebe,et al. A Prototype Learning Framework Using EMD: Application to Complex Scenes Analysis , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[473] Mohan S. Kankanhalli,et al. Tweeting Cameras for Event Detection , 2015, WWW.
[474] Fang Wu,et al. Novelty and collective attention , 2007, Proceedings of the National Academy of Sciences.
[475] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[476] Lifeng Sun,et al. Propagation-based social-aware replication for social video contents , 2012, ACM Multimedia.
[477] Guy Gogniat,et al. Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain , 2013, IEEE Signal Processing Magazine.
[478] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[479] Ramesh C. Jain,et al. Situation detection and control using spatio-temporal analysis of microblogs , 2010, WWW '10.
[480] Hervé Jégou,et al. Beyond “project and sign” for cosine estimation with binary codes , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[481] C.-C. Jay Kuo,et al. Environmental sound recognition: a survey , 2014 .
[482] Frédo Durand,et al. Learning to predict where humans look , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[483] Cordelia Schmid,et al. Evaluation of GIST descriptors for web-scale image search , 2009, CIVR '09.
[484] Kevin Walby,et al. Open-Street Camera Surveillance and Governance in Canada , 2005 .
[485] Shervin Shirmohammadi,et al. Game as video: bit rate reduction through adaptive object encoding , 2013, NOSSDAV '13.
[486] A. Kendon. Conducting Interaction: Patterns of Behavior in Focused Encounters , 1990 .
[487] Frederic Dufaux,et al. Video surveillance using JPEG 2000 , 2004, SPIE Optics + Photonics.
[488] Wenjun Zeng,et al. A format-compliant configurable encryption framework for access control of multimedia , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[489] Swapnil Mishra,et al. Feature Driven and Point Process Approaches for Popularity Prediction , 2016, CIKM.
[490] Marcel Worring,et al. Content-Based Image Retrieval at the End of the Early Years , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[491] Mohan S. Kankanhalli,et al. Creating audio keywords for event detection in soccer video , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[492] Nalini Venkatasubramanian,et al. Architecture for an Automatic Customized Warning System , 2007, 2007 IEEE Intelligence and Security Informatics.
[493] Bhiksha Raj,et al. NELS - Never-Ending Learner of Sounds , 2018, ArXiv.
[494] Laurent Amsaleg,et al. Image retrieval with reciprocal and shared nearest neighbors , 2014, 2014 International Conference on Computer Vision Theory and Applications (VISAPP).
[495] Touradj Ebrahimi,et al. Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[496] Qiang Ji,et al. Multi-label learning with missing labels for image annotation and facial action unit recognition , 2015, Pattern Recognit..
[497] C. Lawrence Zitnick,et al. CIDEr: Consensus-based image description evaluation , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[498] N. Cocchiarella,et al. Situations and Attitudes. , 1986 .
[499] Ronald Fagin,et al. Fuzzy queries in multimedia database systems , 1998, PODS '98.
[500] Xing Xie,et al. Learning user interest for image browsing on small-form-factor devices , 2005, CHI.
[501] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[502] Olivier Buisson,et al. Random maximum margin hashing , 2011, CVPR 2011.
[503] Koji Yatani,et al. BodyScope: a wearable acoustic sensor for activity recognition , 2012, UbiComp.
[504] R.M. Stern,et al. Missing-feature approaches in speech recognition , 2005, IEEE Signal Processing Magazine.
[505] Tat-Jun Chin,et al. Efficient Point Process Inference for Large-Scale Object Detection , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[506] Bhiksha Raj,et al. Non-negative matrix factorization based compensation of music for automatic speech recognition , 2010, INTERSPEECH.
[507] Brendon M Lapham,et al. Hawkes processes and some financial applications , 2014 .
[508] Paul Roe,et al. A survey of tagging techniques for music, speech and environmental sound , 2012, Artificial Intelligence Review.
[509] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[510] Bala Srinivasan,et al. Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric Data , 2014, iiWAS.
[511] Radu Horaud,et al. An on-line variational Bayesian model for multi-person tracking from cluttered scenes , 2016, Comput. Vis. Image Underst..
[512] Chong-Wah Ngo,et al. Learning Query and Image Similarities with Ranking Canonical Correlation Analysis , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[513] Cheng Wang,et al. Approximate Nearest Neighbor Search by Residual Vector Quantization , 2010, Sensors.
[514] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[515] Michael Isard,et al. Lost in quantization: Improving particular object retrieval in large scale image databases , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[516] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[517] Mor Naaman,et al. Social multimedia: highlighting opportunities for search and mining of multimedia data in social media applications , 2010, Multimedia Tools and Applications.
[518] T. Ozaki. Maximum likelihood estimation of Hawkes' self-exciting point processes , 1979 .
[519] Hervé Jégou,et al. Anti-sparse coding for approximate nearest neighbor search , 2011, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[520] N. J. A. Sloane,et al. Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.
[521] Chin-Laung Lei,et al. Inferring Speech Activity from Encrypted Skype Traffic , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[522] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[523] Kajal T. Claypool,et al. Latency and player actions in online games , 2006, CACM.
[524] Elizabeth G. Kehoe,et al. Personality modulates the effects of emotional arousal and valence on brain activation. , 2012, Social cognitive and affective neuroscience.
[525] Chong-Wah Ngo,et al. Semi-supervised Domain Adaptation with Subspace Learning for visual recognition , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[526] Sergio Escalera,et al. ChaLearn Looking at People Challenge 2014: Dataset and Results , 2014, ECCV Workshops.
[527] Liu Yang,et al. Crowdsourcing Fraud Detection Algorithm Based on Ebbinghaus Forgetting Curve , 2014 .
[528] DeLiang Wang,et al. Monaural Speech Separation , 2002, NIPS.
[529] Fan Ye,et al. Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.
[530] Bhiksha Raj,et al. A unifying analysis of projected gradient descent for ℓp-constrained least squares , 2011, 1107.4623.
[531] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[532] Desney S. Tan,et al. Designing Novel Image Search Interfaces by Understanding Unique Characteristics and Usage , 2009, INTERACT.
[533] Hanan Samet,et al. Foundations of multidimensional and metric data structures , 2006, Morgan Kaufmann series in data management systems.
[534] Dumitru Erhan,et al. Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[535] Michael Backes,et al. Speaker Recognition in Encrypted Voice Streams , 2010, ESORICS.
[536] Bhiksha Raj,et al. A Sparse Non-Parametric Approach for Single Channel Separation of Known Sounds , 2009, NIPS.
[537] Shih-Fu Chang. How far we've come: Impact of 20 years of multimedia information retrieval , 2013, TOMCCAP.
[538] Vincenzo Piuri,et al. Implementing FingerCode-based identity matching in the encrypted domain , 2010, 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications.
[539] Bhiksha Raj,et al. Unsupervised Learning of Acoustic Unit Descriptors for Audio Content Representation and Classification , 2011, INTERSPEECH.
[540] Svetlana Lazebnik,et al. Locality-sensitive binary codes from shift-invariant kernels , 2009, NIPS.
[541] Bhiksha Raj,et al. Ensemble approach in speaker verification , 2013, INTERSPEECH.
[542] Bhiksha Raj,et al. Unsupervised Structure Discovery for Semantic Analysis of Audio , 2012, NIPS.
[543] Nicu Sebe,et al. Content-based multimedia information retrieval: State of the art and challenges , 2006, TOMCCAP.
[544] Philip S. Yu,et al. Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering , 2006, Sixth International Conference on Data Mining (ICDM'06).
[545] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[546] K. Srinathan,et al. Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[547] Jiebo Luo,et al. The wisdom of social multimedia: using flickr for prediction and forecast , 2010, ACM Multimedia.
[548] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[549] Jorge Nocedal,et al. Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization , 1997, TOMS.
[550] Beth Logan,et al. Mel Frequency Cepstral Coefficients for Music Modeling , 2000, ISMIR.
[551] Andrei Z. Broder,et al. On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).
[552] J. Russell. A circumplex model of affect. , 1980 .
[553] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[554] Lu Fang,et al. A low latency cloud gaming system using edge preserved image homography , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).
[555] Mitchel Weintraub,et al. A theory and computational model of auditory monaural sound separation , 1985 .
[556] Ramesh Jain,et al. Event Detection And Correspondence , 1986 .
[557] Sujit Dey,et al. Rendering Adaptation to Address Communication and Computation Constraints in Cloud Mobile Gaming , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[558] Wenjun Zeng,et al. A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..
[559] Oscar Mayora-Ibarra,et al. Multi-modal mobile sensing of social interactions , 2012, 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.
[560] Klaus Riede,et al. Automatic bird sound detection in long real-field recordings: Applications and tools , 2014 .
[561] Elisabeth André,et al. Emotion recognition based on physiological changes in music listening , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[562] Mica R. Endsley,et al. Situation awareness global assessment technique (SAGAT) , 1988, Proceedings of the IEEE 1988 National Aerospace and Electronics Conference.
[563] Gary R. Bradski,et al. Learning OpenCV 3: Computer Vision in C++ with the OpenCV Library , 2016 .
[564] W. R. Bennett,et al. Spectra of quantized signals , 1948, Bell Syst. Tech. J..
[565] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[566] Hua-Jun Hong,et al. Animation Rendering on Multimedia Fog Computing Platforms , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
[567] Guy J. Brown,et al. Computational auditory scene analysis , 1994, Comput. Speech Lang..
[568] Cordelia Schmid,et al. Aggregating local descriptors into a compact image representation , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[569] Barry Smyth,et al. A Community-Based Approach to Personalizing Web Search , 2007, Computer.
[570] Bowen Zhang,et al. Real-Time Action Recognition with Enhanced Motion Vector CNNs , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[571] Hervé Jégou,et al. Searching with expectations , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[572] D. Ellis. Beat Tracking by Dynamic Programming , 2007 .
[573] K. Selçuk Candan,et al. How Does the Data Sampling Strategy Impact the Discovery of Information Diffusion in Social Media? , 2010, ICWSM.
[574] Lennart E. Nacke,et al. From game design elements to gamefulness: defining "gamification" , 2011, MindTrek.
[575] Chun-Ying Huang,et al. Measuring the latency of cloud gaming systems , 2011, ACM Multimedia.
[576] Pascal Fua,et al. LDAHash: Improved Matching with Smaller Descriptors , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[577] Ralf Steinmetz,et al. Towards a P2P Cloud: Reliable Resource Reservations in Unreliable P2P Systems , 2010, 2010 IEEE 16th International Conference on Parallel and Distributed Systems.
[578] Shree K. Nayar,et al. Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.
[579] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[580] Ping Li,et al. Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS) , 2014, NIPS.
[581] Wei Liu,et al. Semi-supervised distance metric learning for Collaborative Image Retrieval , 2008, CVPR.
[582] Ramesh C. Jain,et al. Eventshop: from heterogeneous web streams to personalized situation detection and control , 2012, WebSci '12.
[583] Bernt Schiele,et al. Coherent Multi-sentence Video Description with Variable Level of Detail , 2014, GCPR.
[584] Gerald Friedland,et al. Speaker Recognition and Diarization , 2010 .
[585] Yann LeCun,et al. Convolutional Learning of Spatio-temporal Features , 2010, ECCV.
[586] Matthieu Cord,et al. Locality-Sensitive Hashing for Chi2 Distance , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[587] David Woods,et al. Situation Awareness: A Critical But Ill-Defined Phenomenon , 1991 .
[588] Rajkumar Buyya,et al. SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[589] Jessica K. Hodgins,et al. Guide to the Carnegie Mellon University Multimodal Activity (CMU-MMAC) Database , 2008 .
[590] Mark Bebbington,et al. On the statistics of the linked stress release model , 2001, Journal of Applied Probability.
[591] Li Fei-Fei,et al. ImageNet: A large-scale hierarchical image database , 2009, CVPR.
[592] Yang Wang,et al. Human Action Recognition by Semilatent Topic Models , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[593] Quoc V. Le,et al. Learning hierarchical invariant spatio-temporal features for action recognition with independent subspace analysis , 2011, CVPR 2011.
[594] Daniel P. W. Ellis,et al. A Discriminative Model for Polyphonic Piano Transcription , 2007, EURASIP J. Adv. Signal Process..
[595] E. C. Adam,et al. Fighter cockpits of the future , 1993, [1993 Proceedings] AIAA/IEEE Digital Avionics Systems Conference.
[596] Olivier Buisson,et al. Logo retrieval with a contrario visual query expansion , 2009, ACM Multimedia.
[597] Trevor Darrell,et al. Nearest-Neighbor Methods in Learning and Vision: Theory and Practice (Neural Information Processing) , 2006 .
[598] M. Perugini,et al. The Big Five Marker Scales (BFMS) and the Italian AB5C taxonomy: Analyses from an emic-etic perspective , 2002 .
[599] Jure Leskovec,et al. Patterns of Influence in a Recommendation Network , 2006, PAKDD.
[600] Kilian Q. Weinberger,et al. Distance Metric Learning for Large Margin Nearest Neighbor Classification , 2005, NIPS.
[601] Antonio Torralba,et al. LabelMe: A Database and Web-Based Tool for Image Annotation , 2008, International Journal of Computer Vision.
[602] Robert J. K. Jacob,et al. Using fNIRS brain sensing to evaluate information visualization interfaces , 2013, CHI.
[603] Xi Wang,et al. Modeling Spatial-Temporal Clues in a Hybrid Deep Learning Framework for Video Classification , 2015, ACM Multimedia.
[604] Weiting Ng,et al. Clarifying the relation between neuroticism and positive emotions , 2009 .
[605] Heng Tao Shen,et al. Hashing for Similarity Search: A Survey , 2014, ArXiv.
[606] E. Jeannot,et al. The Development of Situation Awareness Measures in ATM Systems , 2003 .
[607] Ryan Shea,et al. Cloud gaming: architecture and performance , 2013, IEEE Network.
[608] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[609] Kate Saenko,et al. Improving LSTM-based Video Description with Linguistic Knowledge Mined from Text , 2016, EMNLP.
[610] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[611] W. Pitts,et al. A Logical Calculus of the Ideas Immanent in Nervous Activity (1943) , 2021, Ideas That Created the Future.
[612] Alan Hanjalic,et al. Affective video content representation and modeling , 2005, IEEE Transactions on Multimedia.
[613] Jeffrey D. Ullman,et al. Principles of Database Systems , 1980 .
[614] Yan Liu,et al. Latent feature learning in social media network , 2013, ACM Multimedia.
[615] Ankur Chattopadhyay,et al. PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[616] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[617] Chong-Wah Ngo,et al. Click-through-based cross-view learning for image search , 2014, SIGIR.
[618] Antonio Torralba,et al. Spectral Hashing , 2008, NIPS.
[619] Junqing Yu,et al. Optimized residual vector quantization for efficient approximate nearest neighbor search , 2017, Multimedia Systems.
[620] Shrikanth S. Narayanan,et al. Toward detecting emotions in spoken dialogs , 2005, IEEE Transactions on Speech and Audio Processing.
[621] Nicu Sebe,et al. UX_Mate: from facial expressions to UX evaluation , 2012, DIS '12.
[622] Guo-Jun Qi,et al. Differential Recurrent Neural Networks for Action Recognition , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[623] John McCarthy,et al. SOME PHILOSOPHICAL PROBLEMS FROM THE STANDPOINT OF ARTI CIAL INTELLIGENCE , 1987 .
[624] Douglas DeCarlo,et al. Robust clustering of eye movement recordings for quantification of visual interest , 2004, ETRA.
[625] Murat Kantarcioglu,et al. A Cryptographic Approach to Securely Share and Query Genomic Sequences , 2008, IEEE Transactions on Information Technology in Biomedicine.
[626] Tim Verbelen,et al. Cloudlets: bringing the cloud to the mobile user , 2012, MCS '12.
[627] Haroon Idrees,et al. The THUMOS challenge on action recognition for videos "in the wild" , 2016, Comput. Vis. Image Underst..
[628] Victor Lempitsky,et al. The inverted multi-index , 2012, CVPR.
[629] Chung-Ta King,et al. Context-aware decision engine for mobile cloud offloading , 2013, 2013 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[630] Jiebo Luo,et al. Aesthetics and Emotions in Images , 2011, IEEE Signal Processing Magazine.
[631] Takeo Kanade,et al. Neural Network-Based Face Detection , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[632] Cordelia Schmid,et al. Learning realistic human actions from movies , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[633] Qiang Yang,et al. User demographics prediction based on mobile data , 2013, Pervasive Mob. Comput..
[634] Mauro Barni,et al. Implementing the discrete Fourier transform in the encrypted domain , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[635] Richard M. Stern,et al. A vector Taylor series approach for environment-independent speech recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[636] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[637] Antonin Guttman,et al. R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.
[638] Scott Sanner,et al. Expecting to be HIP: Hawkes Intensity Processes for Social Media Popularity , 2016, WWW.
[639] Guan-Ming Su,et al. Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.
[640] Laurent Amsaleg,et al. Locality sensitive hashing: A comparison of hash function types and querying mechanisms , 2010, Pattern Recognit. Lett..
[641] O. Kallenberg. Foundations of Modern Probability , 2021, Probability Theory and Stochastic Modelling.
[642] Bhiksha Raj,et al. The Markov selection model for concurrent speech recognition , 2010, 2010 IEEE International Workshop on Machine Learning for Signal Processing.
[643] Subramanian Ramanathan,et al. Multitask Linear Discriminant Analysis for View Invariant Action Recognition , 2014, IEEE Transactions on Image Processing.
[644] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[645] Li Lin,et al. Bringing mobile online games to clouds , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[646] Jon Barker,et al. An audio-visual corpus for speech perception and automatic speech recognition. , 2006, The Journal of the Acoustical Society of America.
[647] Yifan Peng,et al. Studying Relationships between Human Gaze, Description, and Computer Vision , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[648] Kristen Grauman,et al. Kernelized locality-sensitive hashing for scalable image search , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[649] Bhiksha Raj,et al. Unsupervised Word Discovery from Phonetic Input Using Nested Pitman-Yor Language Modeling , 2013, ICRA 2013.
[650] Wei Xie,et al. Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.
[651] Ramesh C. Jain,et al. Situation Recognition from Multimodal Data , 2016, ICMR.
[652] Shuicheng Yan,et al. Inferring semantic concepts from community-contributed images and noisy tags , 2009, ACM Multimedia.
[653] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[654] Peter Bro Miltersen,et al. On Data Structures and Asymmetric Communication Complexity , 1998, J. Comput. Syst. Sci..
[655] Chong-Wah Ngo,et al. Annotation for free: video tagging by mining user search behavior , 2013, ACM Multimedia.
[656] Vivek K. Singh,et al. Cooperative phoneotypes: exploring phone-based behavioral markers of cooperation , 2016, UbiComp.
[657] James Ze Wang,et al. Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.
[658] Nalini Venkatasubramanian,et al. CrowdMAC: A Crowdsourcing System for Mobile Access , 2012, Middleware.
[659] P. Costa,et al. Influence of extraversion and neuroticism on subjective well-being: happy and unhappy people. , 1980, Journal of personality and social psychology.
[660] P. Embrechts,et al. Multivariate Hawkes processes: an application to financial data , 2011, Journal of Applied Probability.
[661] Min Wu,et al. Security analysis for privacy preserving search of multimedia , 2010, 2010 IEEE International Conference on Image Processing.
[662] Asha Iyer,et al. Components of bottom-up gaze allocation in natural images , 2005, Vision Research.
[663] Nicu Sebe,et al. Self-Adaptive Matrix Completion for Heart Rate Estimation from Face Videos under Realistic Conditions , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[664] Sergey Ioffe,et al. Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[665] N. Sebe,et al. Emotion modulates eye movement patterns and subsequent memory for the gist and details of movie scenes. , 2014, Journal of vision.
[666] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[667] N. J. A. Sloane,et al. Voronoi regions of lattices, second moments of polytopes, and quantization , 1982, IEEE Trans. Inf. Theory.
[668] Chenliang Xu,et al. A Thousand Frames in Just a Few Words: Lingual Description of Videos through Latent Topics and Sparse Object Stitching , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.
[669] Alexandre Bernardino,et al. Matrix Completion for Multi-label Image Classification , 2011, NIPS.
[670] Yosihiko Ogata,et al. On Lewis' simulation method for point processes , 1981, IEEE Trans. Inf. Theory.
[671] Sung-Soo Kim,et al. Multi-view Rendering Approach for Cloud-based Gaming Services , 2011 .
[672] Gerald Friedland,et al. Tuning-Robust Initialization Methods for Speaker Diarization , 2010, IEEE Transactions on Audio, Speech, and Language Processing.
[673] George Kollios,et al. BoostMap: An Embedding Method for Efficient Nearest Neighbor Retrieval , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[674] P. Brémaud,et al. STABILITY OF NONLINEAR HAWKES PROCESSES , 1996 .
[675] Harish Katti,et al. CAVVA: Computational Affective Video-in-Video Advertising , 2014, IEEE Transactions on Multimedia.
[676] Bernt Schiele,et al. Translating Video Content to Natural Language Descriptions , 2013, 2013 IEEE International Conference on Computer Vision.
[677] Cong Wang,et al. Enabling Encrypted Cloud Media Center with Secure Deduplication , 2015, AsiaCCS.
[678] Wei Chen,et al. Jointly Modeling Deep Video and Compositional Text to Bridge Vision and Language in a Unified Framework , 2015, AAAI.
[679] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[680] Luc Van Gool,et al. Temporal Segment Networks: Towards Good Practices for Deep Action Recognition , 2016, ECCV.
[681] Xi Wang,et al. Evaluating Two-Stream CNN for Video Classification , 2015, ICMR.
[682] Tao Mei,et al. Deep Quantization: Encoding Convolutional Activations with Deep Generative Model , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[683] J. Rasmussen. Bayesian Inference for Hawkes Processes , 2013 .
[684] Wei Cai,et al. Toward Gaming as a Service , 2014, IEEE Internet Computing.
[685] A. Dassios,et al. A dynamic contagion process , 2011, Advances in Applied Probability.
[686] Cordelia Schmid,et al. Product Quantization for Nearest Neighbor Search , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[687] Yang Guo,et al. A survey on peer-to-peer video streaming systems , 2008, Peer-to-Peer Netw. Appl..
[688] Christof Koch,et al. A Model of Saliency-Based Visual Attention for Rapid Scene Analysis , 2009 .
[689] Ryan Shea,et al. Cloud Gaming: Understanding the Support From Advanced Virtualization and Hardware , 2015, IEEE Transactions on Circuits and Systems for Video Technology.
[690] Alex Pentland,et al. Sensing and modeling human networks using the sociometer , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..
[691] Wei Cai,et al. A Survey on Cloud Gaming: Future of Computer Games , 2016, IEEE Access.
[692] Radu Horaud,et al. EM Algorithms for Weighted-Data Clustering with Application to Audio-Visual Scene Analysis , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[693] Vladimir Krylov,et al. Approximate nearest neighbor algorithm based on navigable small world graphs , 2014, Inf. Syst..
[694] Yong Man Ro,et al. Privacy-Preserving Watch List Screening in Video Surveillance System , 2010, PCM.
[695] Tao Mei,et al. MSR-VTT: A Large Video Description Dataset for Bridging Video and Language , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[696] Daniel Gatica-Perez,et al. Automatic nonverbal analysis of social interaction in small groups: A review , 2009, Image Vis. Comput..
[697] Bhiksha Raj,et al. Phoneme-Dependent NMF for Speech Enhancement in Monaural Mixtures , 2011, INTERSPEECH.
[698] Fei Wang,et al. Scalable Recommendation with Social Contextual Information , 2014, IEEE Transactions on Knowledge and Data Engineering.
[699] Nicu Sebe,et al. Recognizing Emotions from Abstract Paintings Using Non-Linear Matrix Completion , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[700] Bhiksha Raj,et al. Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.
[701] Sergios Theodoridis,et al. Gunshot detection in audio streams from movies by means of dynamic programming and Bayesian networks , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[702] Cheng-Hsin Hsu,et al. Measuring the client performance and energy consumption in mobile cloud gaming , 2014, 2014 13th Annual Workshop on Network and Systems Support for Games.
[703] Mauro Barni,et al. Efficient linear filtering of encrypted signals via composite representation , 2009, 2009 16th International Conference on Digital Signal Processing.
[704] Filip De Fruyt,et al. Linking openness and intellect in childhood and adulthood , 1998 .
[705] G. Hauske,et al. Object and scene analysis by saccadic eye-movements: an investigation with higher-order statistics. , 2000, Spatial vision.
[706] Jean-Marc Menaud,et al. SLA-Aware Virtual Resource Management for Cloud Infrastructures , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.
[707] Cheng-Hsin Hsu,et al. Quantifying User Satisfaction in Mobile Cloud Games , 2014, MoVid@MMSys.
[708] G. Stenberg,et al. Personality and the EEG: Arousal and emotional arousability , 1992 .
[709] Marcel Worring,et al. Learning Social Tag Relevance by Neighbor Voting , 2009, IEEE Transactions on Multimedia.
[710] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.
[711] Maja Pantic,et al. The MAHNOB Laughter database , 2013, Image Vis. Comput..
[712] Bhiksha Raj,et al. Speech denoising using nonnegative matrix factorization with priors , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[713] Andrii Matviienko,et al. NaviLight: investigating ambient light displays for turn-by-turn navigation in cars , 2016, MobileHCI.
[714] Cheng-Hsin Hsu,et al. Cloud gaming onward: research opportunities and outlook , 2014, 2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW).
[715] Petros Boufounos,et al. Universal Rate-Efficient Scalar Quantization , 2010, IEEE Transactions on Information Theory.
[716] Meina Song,et al. A Cloud Computing Platform Based on P2P , 2009, 2009 IEEE International Symposium on IT in Medicine & Education.
[717] Ramesh C. Jain,et al. Situation recognition: an evolving problem for heterogeneous dynamic big multimedia data , 2012, ACM Multimedia.
[718] Harish Katti,et al. An Eye Fixation Database for Saliency Detection in Images , 2010, ECCV.
[719] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[720] Ales Leonardis,et al. High-Dimensional Feature Matching: Employing the Concept of Meaningful Nearest Neighbors , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[721] Min Wu,et al. A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.
[722] W. Kastner,et al. Situation modeling , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..
[723] Yoichi Sato,et al. Graph-based joint clustering of fixations and visual entities , 2013, TAP.
[724] Anssi Klapuri,et al. Query by humming of midi and audio using locality sensitive hashing , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[725] Kip Smith,et al. Situation Awareness Is Adaptive, Externally Directed Consciousness , 1995, Hum. Factors.
[726] T. Taimre,et al. Hawkes Processes , 2015, 1507.02822.
[727] Özalp Babaoglu,et al. Design and implementation of a P2P Cloud system , 2012, SAC '12.
[728] Christopher Slobogin,et al. Public Privacy: Camera Surveillance of Public Places AndThe Right to Anonymity , 2003 .
[729] Cordelia Schmid,et al. Query adaptative locality sensitive hashing , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[730] Bernt Schiele,et al. 2D Human Pose Estimation: New Benchmark and State of the Art Analysis , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[731] David G. Lowe,et al. Shape indexing using approximate nearest-neighbour search in high-dimensional spaces , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[732] Tao Mei,et al. Learning Deep Intrinsic Video Representation by Exploring Temporal Coherence and Graph Structure , 2016, IJCAI.
[733] Y. Ogata,et al. Fast likelihood computation of epidemic type aftershock‐sequence model , 1993 .
[734] Stefano Chessa,et al. SAIL: A Sensor Abstraction and Integration Layer for Context Awareness , 2008, 2008 34th Euromicro Conference Software Engineering and Advanced Applications.
[735] Ramesh C. Jain,et al. Social pixels: genesis and evaluation , 2010, ACM Multimedia.
[736] Pong C. Yuen,et al. Automatic Acquisition of Context Models and its Application to Video Surveillance , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[737] Laurent Amsaleg,et al. NV-Tree: An Efficient Disk-Based Index for Approximate Search in Very Large High-Dimensional Collections , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[738] Yann LeCun,et al. Regularization of Neural Networks using DropConnect , 2013, ICML.
[739] Lin Sun,et al. Human Action Recognition Using Factorized Spatio-Temporal Convolutional Networks , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[740] Jaideep Srivastava,et al. Social Multimedia Computing , 2010, Computer.
[741] Luc Van Gool,et al. Privacy in video surveilled spaces , 2008, J. Comput. Secur..
[742] A. Baddeley,et al. Practical Maximum Pseudolikelihood for Spatial Point Patterns , 1998, Advances in Applied Probability.
[743] Subramanian Ramanathan,et al. No Matter Where You Are: Flexible Graph-Guided Multi-task Learning for Multi-view Head Pose Classification under Target Motion , 2013, 2013 IEEE International Conference on Computer Vision.
[744] Luis F. G. Sarmenta,et al. Volunteer Computing , 1996 .
[745] David G. Lowe,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.
[746] Winston H. Hsu,et al. Real-time privacy-preserving moving object detection in the cloud , 2013, ACM Multimedia.
[747] D. Harville. Matrix Algebra From a Statistician's Perspective , 1998 .
[748] Shih-Fu Chang,et al. Consumer video understanding: a benchmark database and an evaluation of human and machine performance , 2011, ICMR.
[749] Feng Qiu,et al. Automatic identification of user interest for personalized search , 2006, WWW '06.
[750] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[751] Arjen P. de Vries,et al. Obtaining High-Quality Relevance Judgments Using Crowdsourcing , 2012, IEEE Internet Computing.
[752] Chong-Wah Ngo,et al. Towards textually describing complex video contents with audio-visual concept classifiers , 2011, ACM Multimedia.