Frontiers of Multimedia Research

The field of multimedia is unique in offering a rich and dynamic forum for researchers from "traditional" fields to collaborate and develop new solutions and knowledge that transcend the boundaries of individual disciplines. Despite the prolific research activities and outcomes, however, few efforts have been made to develop books that serve as an introduction to the rich spectrum of topics covered by this broad field. A few books are available that either focus on specific subfields or basic background in multimedia. Tutorial-style materials covering the active topics being pursued by the leading researchers at frontiers of the field are currently lacking. In 2015, ACM SIGMM, the special interest group on multimedia, launched a new initiative to address this void by selecting and inviting 12 rising-star speakers from different subfields of multimedia research to deliver plenary tutorial-style talks at the ACM Multimedia conference for 2015. Each speaker discussed the challenges and state-of-the-art developments of their prospective research areas in a general manner to the broad community. The covered topics were comprehensive, including multimedia content understanding, multimodal human-human and human-computer interaction, multimedia social media, and multimedia system architecture and deployment. Following the very positive responses to these talks, the speakers were invited to expand the content covered in their talks into chapters that can be used as reference material for researchers, students, and practitioners. Each chapter discusses the problems, technical challenges, state-of-the-art approaches and performances, open issues, and promising direction for future work. Collectively, the chapters provide an excellent sampling of major topics addressed by the community as a whole. This book, capturing some of the outcomes of such efforts, is well positioned to fill the aforementioned needs in providing tutorial-style reference materials for frontier topics in multimedia.

[1]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[2]  Charles V. Wright,et al.  Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[3]  Kai Li,et al.  Efficient k-nearest neighbor graph construction for generic similarity measures , 2011, WWW.

[4]  Amr M. Youssef,et al.  Speaker recognition from encrypted VoIP communications , 2010, Digit. Investig..

[5]  Masataka Goto A predominant-F/sub 0/ estimation method for CD recordings: MAP estimation using EM algorithm for adaptive tone models , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[6]  K. Wilson,et al.  SPECTROGRAM DIMENSIONALITY REDUCTION WITH INDEPENDENCE CONSTRAINTS , 2010 .

[7]  G. Kuhn,et al.  You look where I look! Effect of gaze cues on overt and covert attention in misdirection , 2009 .

[8]  Vincenzo Piuri,et al.  A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[9]  Daniel P. W. Ellis,et al.  Song-Level Features and Support Vector Machines for Music Classification , 2005, ISMIR.

[10]  Thomas G. Dietterich,et al.  Solving the Multiple Instance Problem with Axis-Parallel Rectangles , 1997, Artif. Intell..

[11]  Andrew Chi-Chih Yao,et al.  Should Tables Be Sorted? , 1981, JACM.

[12]  Regunathan Radhakrishnan,et al.  Generation of sports highlights using motion activity in combination with a common audio feature extraction framework , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[13]  Shoji Kurakake,et al.  Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[14]  Yu Wang An FSM model for situation-aware mobile application software systems , 2004, ACM-SE 42.

[15]  Wenjun Zeng,et al.  Efficient frequency domain video scrambling for content access control , 1999, MULTIMEDIA '99.

[16]  Philip Ross,et al.  Cloud Computing's Killer App: Gaming , 2009, IEEE Spectrum.

[17]  Alan Hanjalic Multimedia retrieval that matters , 2013, TOMCCAP.

[18]  Andrew Zisserman,et al.  Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[19]  Alan Kingstone,et al.  Recurrence quantification analysis of eye movements , 2013, Behavior Research Methods.

[20]  Ian D. Reid,et al.  Estimating Gaze Direction from Low-Resolution Faces in Video , 2006, ECCV.

[21]  Stefan Katzenbeisser,et al.  Signal Processing in the Encrypted Domain , 2007, EURASIP J. Inf. Secur..

[22]  Trevor Darrell,et al.  Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation , 2013, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[23]  Cordelia Schmid,et al.  Vector Quantizing Feature Space with a Regular Lattice , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[24]  Junfeng He,et al.  Optimal Parameters for Locality-Sensitive Hashing , 2012, Proceedings of the IEEE.

[25]  Andrey Temko,et al.  ACOUSTIC EVENT DETECTION AND CLASSIFICATION IN SMART-ROOM ENVIRONMENTS: EVALUATION OF CHIL PROJECT SYSTEMS , 2006 .

[26]  R. Bayer,et al.  Organization and maintenance of large ordered indices , 1970, SIGFIDET '70.

[27]  James Anderson Moorer,et al.  On the segmentation and analysis of continuous musical sound by digital computer , 1975 .

[28]  Hamed Haddadi,et al.  Personal Data: Thinking Inside the Box , 2015, Aarhus Conference on Critical Alternatives.

[29]  Shuang Wu,et al.  Compact Audio Representation for Event Detection in Consumer Media , 2012, INTERSPEECH.

[30]  Hanan Samet,et al.  Incremental distance join algorithms for spatial databases , 1998, SIGMOD '98.

[31]  David Nistér,et al.  Scalable Recognition with a Vocabulary Tree , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[32]  Ramesh C. Jain,et al.  From microblogs to social images: event analytics for situation assessment , 2010, MIR '10.

[33]  Alex Pentland,et al.  Summary abstract for the 1st ACM international workshop on personal data meets distributed multimedia , 2013, MM '13.

[34]  Julien Bringer,et al.  GSHADE: faster privacy-preserving distance computation and biometric identification , 2014, IH&MMSec '14.

[35]  Laurent Amsaleg,et al.  Indexing and searching 100M images with map-reduce , 2013, ICMR.

[36]  Ramesh C. Jain,et al.  Geospatial interpolation analytics for data streams in eventshop , 2015, 2015 IEEE International Conference on Multimedia and Expo (ICME).

[37]  Yun Yang,et al.  User interest and social influence based emotion prediction for individuals , 2013, ACM Multimedia.

[38]  Sujit Dey,et al.  Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications , 2013, IEEE Transactions on Multimedia.

[39]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[40]  Raphael C.-W. Phan,et al.  Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis , 2013, IEEE Transactions on Affective Computing.

[41]  Jaeyoung Choi,et al.  User verification: Matching the uploaders of videos across accounts , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[42]  Christopher Joseph Pal,et al.  Using Descriptive Video Services to Create a Large Data Source for Video Annotation Research , 2015, ArXiv.

[43]  Daniel Gatica-Perez,et al.  Modeling Flickr Communities Through Probabilistic Topic-Based Analysis , 2010, IEEE Transactions on Multimedia.

[44]  Mubarak Shah,et al.  UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild , 2012, ArXiv.

[45]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[46]  Martial Hebert,et al.  Rapid object indexing using locality sensitive hashing and joint 3D-signature space estimation , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[47]  Vivek K. Goyal,et al.  Quantized Overcomplete Expansions in IRN: Analysis, Synthesis, and Algorithms , 1998, IEEE Trans. Inf. Theory.

[48]  Ruslan Salakhutdinov,et al.  Action Recognition using Visual Attention , 2015, NIPS 2015.

[49]  Kai Hwang,et al.  Game cloud design with virtualized CPU/GPU servers and initial performance results , 2012, ScienceCloud '12.

[50]  Y. Kamarianakis,et al.  Forecasting Traffic Flow Conditions in an Urban Network: Comparison of Multivariate and Univariate Approaches , 2003 .

[51]  Zhe Wang,et al.  Modeling LSH for performance tuning , 2008, CIKM '08.

[52]  Philip S. Yu,et al.  A Framework for Clustering Evolving Data Streams , 2003, VLDB.

[53]  Yoshua Bengio,et al.  Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.

[54]  Xinlei Chen,et al.  Microsoft COCO Captions: Data Collection and Evaluation Server , 2015, ArXiv.

[55]  Brad A. Myers,et al.  Past, Present and Future of User Interface Software Tools , 2000, TCHI.

[56]  M. Koyuncu,et al.  Evaluation of International Affective Picture System (IAPS) ratings in an athlete population and its relations to personality , 2010 .

[57]  Weili Wu,et al.  Spatial contextual classification and prediction models for mining geospatial data , 2002, IEEE Trans. Multim..

[58]  Po-Sen Huang,et al.  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval , 2011, 2011 IEEE International Symposium on Multimedia.

[59]  Victor I. Chang,et al.  A Categorisation of Cloud Computing Business Models , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[60]  Matthew J. Hausknecht,et al.  Beyond short snippets: Deep networks for video classification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[61]  Alejandro Jaimes,et al.  Analyzing Favorite Behavior in Flickr , 2013, MMM.

[62]  Subramanian Ramanathan,et al.  SALSA: A Novel Dataset for Multimodal Group Behavior Analysis , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[63]  Yihong Gong,et al.  Linear spatial pyramid matching using sparse coding for image classification , 2009, CVPR.

[64]  A. Hawkes,et al.  A cluster process representation of a self-exciting process , 1974, Journal of Applied Probability.

[65]  Alexandr Andoni,et al.  Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[66]  Victor S. Lempitsky,et al.  Tree quantization for large-scale similarity search and classification , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[67]  A. Dassios,et al.  Exact Simulation of Hawkes Process with Exponentially Decaying Intensity , 2013 .

[68]  Bhiksha Raj,et al.  Greedy sparsity-constrained optimization , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[69]  Ying Luo,et al.  Anonymous subject identification in privacy-aware video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[70]  Alexandr Andoni,et al.  Nearest neighbor search : the old, the new, and the impossible , 2009 .

[71]  Xiaojin Zhu,et al.  Introduction to Semi-Supervised Learning , 2009, Synthesis Lectures on Artificial Intelligence and Machine Learning.

[72]  Radu Horaud,et al.  A Variational EM Algorithm for the Separation of Time-Varying Convolutive Audio Mixtures , 2016, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[73]  Matthias Scheutz,et al.  Brainput: enhancing interactive systems with streaming fnirs brain input , 2012, CHI.

[74]  Markus Koch,et al.  Linking visual concept detection with viewer demographics , 2012, ICMR '12.

[75]  Loong Fah Cheong,et al.  Active Visual Segmentation , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[76]  P. Ekman An argument for basic emotions , 1992 .

[77]  Eduardo Sontag,et al.  Turing computability with neural nets , 1991 .

[78]  Cheng-Hsin Hsu,et al.  Using graphics rendering contexts to enhance the real-time video coding for mobile cloud gaming , 2011, ACM Multimedia.

[79]  Lorenz T. Biegler,et al.  On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..

[80]  Hongyuan Zha,et al.  Trailer Generation via a Point Process-Based Visual Attractiveness Model , 2015, IJCAI.

[81]  Lifeng Sun,et al.  Who should share what?: item-level social influence prediction for users and posts ranking , 2011, SIGIR.

[82]  Subramanian Ramanathan,et al.  Uncovering Interactions and Interactors: Joint Estimation of Head, Body Orientation and F-Formations from Surveillance Videos , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[83]  Trevor Darrell,et al.  YouTube2Text: Recognizing and Describing Arbitrary Activities Using Semantic Hierarchies and Zero-Shot Recognition , 2013, 2013 IEEE International Conference on Computer Vision.

[84]  Ahmad-Reza Sadeghi,et al.  Efficient Privacy-Preserving Face Recognition , 2009, ICISC.

[85]  Christopher Joseph Pal,et al.  Delving Deeper into Convolutional Networks for Learning Video Representations , 2015, ICLR.

[86]  Thomas Schneider,et al.  Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" , 2014, IH&MMSec '14.

[87]  Suman Banerjee,et al.  ParaDrop: a multi-tenant platform to dynamically install third party services on wireless gateways , 2014, MobiArch '14.

[88]  Soo-Chang Pei,et al.  Secure and robust SIFT , 2009, ACM Multimedia.

[89]  Ronald Fagin,et al.  Efficient similarity search and classification via rank aggregation , 2003, SIGMOD '03.

[90]  Ben J. A. Kröse,et al.  Detecting F-formations as dominant sets , 2011, ICMI '11.

[91]  Susanne Boll,et al.  Tangible Apps Bracelet: Designing Modular Wrist-Worn Digital Jewellery for Multiple Purposes , 2016, Conference on Designing Interactive Systems.

[92]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[93]  Matthew O Jackson,et al.  Using selection bias to explain the observed structure of Internet diffusions , 2010, Proceedings of the National Academy of Sciences.

[94]  John R. Smith,et al.  Using MPEG-7 and MPEG-21 for personalizing video , 2004, IEEE MultiMedia.

[95]  Opher Etzion,et al.  Amit - the situation manager , 2003, The VLDB Journal.

[96]  Shih-Fu Chang,et al.  Semi-Supervised Hashing for Large-Scale Search , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[97]  Lawrence G. Roberts,et al.  Machine Perception of Three-Dimensional Solids , 1963, Outstanding Dissertations in the Computer Sciences.

[98]  Patrick Pérez,et al.  Approximate Search with Quantized Sparse Representations , 2016, ECCV.

[99]  Y. de Montjoye,et al.  Unique in the shopping mall: On the reidentifiability of credit card metadata , 2015, Science.

[100]  Soo-Chang Pei,et al.  Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction , 2011, Electronic Imaging.

[101]  Barbara Caputo,et al.  Recognizing human actions: a local SVM approach , 2004, ICPR 2004.

[102]  Zhou Su,et al.  What Videos Are Similar with You?: Learning a Common Attributed Representation for Video Recommendation , 2014, ACM Multimedia.

[103]  Stefan Winkler,et al.  ASCERTAIN: Emotion and Personality Recognition Using Commercial Sensors , 2018, IEEE Transactions on Affective Computing.

[104]  Ian D. Reid,et al.  Unsupervised learning of a scene-specific coarse gaze estimator , 2011, 2011 International Conference on Computer Vision.

[105]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[106]  Charles V. Wright,et al.  Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.

[107]  Shai Avidan,et al.  Blind Vision , 2006, ECCV.

[108]  Xuemin Lin,et al.  Approximate Nearest Neighbor Search on High Dimensional Data — Experiments, Analyses, and Improvement , 2016, IEEE Transactions on Knowledge and Data Engineering.

[109]  Ramesh C. Jain,et al.  Situation Recognition Using EventShop , 2016, Springer International Publishing.

[110]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[111]  Albrecht Schmidt,et al.  Multi-Sensor Context-Awareness in Mobile Devices and Smart Artifacts , 2002, Mob. Networks Appl..

[112]  Raymond Reiter,et al.  Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems , 2001 .

[113]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[114]  Bhiksha Raj,et al.  Privacy-preserving speaker verification as password matching , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[115]  Bhiksha Raj,et al.  Non-negative Hidden Markov Modeling of Audio with Application to Source Separation , 2010, LVA/ICA.

[116]  Sari Järvinen,et al.  QoS-Aware real-time video encoding How to Improve the User Experience of a Gaming-on-Demand Service , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[117]  Luc Van Gool,et al.  The Pascal Visual Object Classes Challenge: A Retrospective , 2014, International Journal of Computer Vision.

[118]  Daniel P. W. Ellis,et al.  Quantitative Analysis of a Common Audio Similarity Measure , 2009, IEEE Transactions on Audio, Speech, and Language Processing.

[119]  Qi Tian,et al.  Social Visual Image Ranking for Web Image Search , 2013, MMM.

[120]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[121]  Cordelia Schmid,et al.  Accurate Image Search Using the Contextual Dissimilarity Measure , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[122]  Leandros Tassiulas,et al.  Resource Allocation and Cross-Layer Control in Wireless Networks , 2006, Found. Trends Netw..

[123]  Pradeep K. Atrey,et al.  Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[124]  Jack J. Dongarra,et al.  A set of level 3 basic linear algebra subprograms , 1990, TOMS.

[125]  Lynsey Dubbeld,et al.  Protecting Personal Data in Camera Surveillance Practices , 2002 .

[126]  Geoffrey E. Hinton,et al.  Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[127]  Hua-Jun Hong,et al.  Placing Virtual Machines to Optimize Cloud Gaming Experience , 2015, IEEE Transactions on Cloud Computing.

[128]  Oswald Lanz,et al.  Approximate Bayesian multibody tracking , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[129]  Zhenhuan Gong,et al.  PRESS: PRedictive Elastic ReSource Scaling for cloud systems , 2010, 2010 International Conference on Network and Service Management.

[130]  Tao Mei,et al.  Jointly Modeling Embedding and Translation to Bridge Video and Language , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[131]  Arto Ojala,et al.  Developing Cloud Business Models: A Case Study on Cloud Gaming , 2011, IEEE Software.

[132]  Jaeyoung Choi,et al.  Multimodal city-verification on flickr videos using acoustic and textual features , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[133]  Stefan Katzenbeisser,et al.  Secure Computations on Real-Valued Signals , 2010 .

[134]  Nicole Immorlica,et al.  Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.

[135]  Susan T. Dumais,et al.  To personalize or not to personalize: modeling queries with variation in user intent , 2008, SIGIR '08.

[136]  Daniel P. W. Ellis,et al.  Identifying `Cover Songs' with Chroma Features and Dynamic Programming Beat Tracking , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[137]  Gerald Friedland,et al.  The 2010 ICSI Video Location Estimation System , 2010 .

[138]  Subramanian Ramanathan,et al.  An Adaptation Framework for Head-Pose Classification in Dynamic Multi-view Scenarios , 2012, ACCV.

[139]  Jian Sun,et al.  Identity Mappings in Deep Residual Networks , 2016, ECCV.

[140]  Cordelia Schmid,et al.  Actions in context , 2009, CVPR.

[141]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[142]  Mohan S. Kankanhalli,et al.  Concept Based Hybrid Fusion of Multimodal Event Signals , 2016, 2016 IEEE International Symposium on Multimedia (ISM).

[143]  Masaaki Fujiyoshi,et al.  Signal and Image Processing in the Encrypted Domain , 1970 .

[144]  Jian Sun,et al.  K-Means Hashing: An Affinity-Preserving Quantization Method for Learning Binary Compact Codes , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[145]  George Tzanetakis,et al.  Musical genre classification of audio signals , 2002, IEEE Trans. Speech Audio Process..

[146]  Stephen Blott,et al.  An Approximation- Based Data Structure for Similarity Search , 2006 .

[147]  Hans-Jörg Schek,et al.  A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces , 1998, VLDB.

[148]  Bhiksha Raj,et al.  Missing Data Imputation for Time-Frequency Representations of Audio Signals , 2011, J. Signal Process. Syst..

[149]  Alexandros Nanopoulos,et al.  Hubs in Space: Popular Nearest Neighbors in High-Dimensional Data , 2010, J. Mach. Learn. Res..

[150]  Susan T. Dumais,et al.  Personalizing Search via Automated Analysis of Interests and Activities , 2005, SIGIR.

[151]  Takuya Fujishima,et al.  Realtime Chord Recognition of Musical Sound: a System Using Common Lisp Music , 1999, ICMC.

[152]  Po-Chyi Su,et al.  A Region of Interest Rate-Control Scheme for Encoding Traffic Surveillance Videos , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[153]  Rama Chellappa,et al.  Machine Recognition of Human Activities: A Survey , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[154]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[155]  Antonio Torralba,et al.  Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope , 2001, International Journal of Computer Vision.

[156]  Cheng-Hsin Hsu,et al.  Screencast dissected: performance measurements and design considerations , 2015, MMSys.

[157]  Frank Keller,et al.  Training Object Class Detectors from Eye Tracking Data , 2014, ECCV.

[158]  Ioannis Patras,et al.  Fusion of facial expressions and EEG for implicit affective tagging , 2013, Image Vis. Comput..

[159]  Mark Sanderson,et al.  Automatic video tagging using content redundancy , 2009, SIGIR.

[160]  William Curran,et al.  An Event Driven Fusion Approach for Enjoyment Recognition in Real-time , 2014, ACM Multimedia.

[161]  Ramesh Jain,et al.  Situation based control for cyber-physical environments , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[162]  Chong-Wah Ngo,et al.  Predicting domain adaptivity: redo or recycle? , 2012, ACM Multimedia.

[163]  Quoc V. Le,et al.  Sequence to Sequence Learning with Neural Networks , 2014, NIPS.

[164]  Philip S. Yu,et al.  CSR: Speaker Recognition from Compressed VoIP Packet Stream , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[165]  Alan C. Bovik,et al.  GAFFE: A Gaze-Attentive Fixation Finding Engine , 2008, IEEE Transactions on Image Processing.

[166]  Nikolay Borissov,et al.  Cloud Computing – A Classification, Business Models, and Research Directions , 2009, Bus. Inf. Syst. Eng..

[167]  Alessio Del Bue,et al.  Social interaction discovery by statistical analysis of F-formations , 2011, BMVC.

[168]  Alex Pentland,et al.  Situation fencing: making geo-fencing personal and dynamic , 2013, PDM '13.

[169]  Jianhua Ma,et al.  Lifelog Image Analysis Based on Activity Situation Models Using Contexts from Wearable Multi Sensors , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[170]  Mohan S. Kankanhalli,et al.  Motivating contributors in social media networks , 2009, WSM@MM.

[171]  Doina Precup,et al.  Probabilistic Temporal Head Pose Estimation Using a Hierarchical Graphical Model , 2014, ECCV.

[172]  Piotr Indyk,et al.  Approximate nearest neighbor algorithms for Frechet distance via product metrics , 2002, SCG '02.

[173]  David K. Mellinger,et al.  Event formation and separation in musical sound , 1992 .

[174]  C.-C. Jay Kuo,et al.  Audio content analysis for online audiovisual data segmentation and classification , 2001, IEEE Trans. Speech Audio Process..

[175]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[176]  Xin Geng,et al.  Head Pose Estimation Based on Multivariate Label Distribution , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[177]  Derrick J. Parkhurst,et al.  Scene content selected by active vision. , 2003, Spatial vision.

[178]  A. Veen,et al.  Estimation of Space–Time Branching Process Models in Seismology Using an EM–Type Algorithm , 2006 .

[179]  Matthijs Douze,et al.  Searching in one billion vectors: Re-rank with source coding , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[180]  Stefan Katzenbeisser,et al.  Privacy preserving error resilient dna searching through oblivious automata , 2007, CCS '07.

[181]  Sujit Dey,et al.  Addressing Response Time and Video Quality in Remote Server Based Internet Mobile Gaming , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[182]  Emiliano Miluzzo,et al.  People-centric urban sensing , 2006, WICON '06.

[183]  Xuelong Li,et al.  Complementary Projection Hashing , 2013, 2013 IEEE International Conference on Computer Vision.

[184]  Shih-Fu Chang,et al.  Exploiting Feature and Class Relationships in Video Categorization with Regularized Deep Neural Networks , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[185]  Jinhui Tang,et al.  Sparse composite quantization , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[186]  Mohammad Soleymani,et al.  A Multimodal Database for Affect Recognition and Implicit Tagging , 2012, IEEE Transactions on Affective Computing.

[187]  Armen Aghasaryan,et al.  On the Use of LSH for Privacy Preserving Personalization , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[188]  Stefan Winkler,et al.  Implicit User-centric Personality Recognition Based on Physiological Responses to Emotional Videos , 2015, ICMI.

[189]  Jia Xu,et al.  Weak leakage-resilient client-side deduplication of encrypted data in cloud storage , 2013, ASIA CCS '13.

[190]  Ton Kalker,et al.  A Cryptographic Method for Secure Watermark Detection , 2006, Information Hiding.

[191]  Stefan Carlsson,et al.  CNN Features Off-the-Shelf: An Astounding Baseline for Recognition , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops.

[192]  Thierry Pun,et al.  DEAP: A Database for Emotion Analysis ;Using Physiological Signals , 2012, IEEE Transactions on Affective Computing.

[193]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[194]  Janne Heikkilä,et al.  Predicting the Valence of a Scene from Observers’ Eye Movements , 2015, PloS one.

[195]  Nicu Sebe,et al.  Analyzing Free-standing Conversational Groups: A Multimodal Approach , 2015, ACM Multimedia.

[196]  Desney S. Tan,et al.  Combining brain computer interfaces with vision for object categorization , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[197]  Piotr Indyk,et al.  Similarity Search in High Dimensions via Hashing , 1999, VLDB.

[198]  Laurent Amsaleg,et al.  Fast and secure similarity search in high dimensional space , 2013, 2013 IEEE International Workshop on Information Forensics and Security (WIFS).

[199]  Tarek Elgamal,et al.  sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms , 2015, SIGMOD Conference.

[200]  Bao-Liang Lu,et al.  Transfer Components Between Subjects for EEG-based Driving Fatigue Detection , 2015, ICONIP.

[201]  Kwong-Sak Leung,et al.  A Survey of Crowdsourcing Systems , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[202]  Huan Liu,et al.  Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose , 2013, ICWSM.

[203]  Pradeep K. Atrey,et al.  Homomorphic Low Pass Filtering on Encrypted Multimedia over Cloud , 2013, 2013 IEEE Seventh International Conference on Semantic Computing.

[204]  Andrew Zisserman,et al.  Convolutional Two-Stream Network Fusion for Video Action Recognition , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[205]  Hector J. Levesque,et al.  GOLOG: A Logic Programming Language for Dynamic Domains , 1997, J. Log. Program..

[206]  Guizhong Liu,et al.  Buffer status and content aware scheduling scheme for cloud gaming based on video streaming , 2014, 2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW).

[207]  Yan Ke,et al.  An efficient parts-based near-duplicate and sub-image retrieval system , 2004, MULTIMEDIA '04.

[208]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[209]  Bhiksha Raj,et al.  Probabilistic Latent Variable Models as Nonnegative Factorizations , 2008, Comput. Intell. Neurosci..

[210]  Yale Song,et al.  Multimodal human behavior analysis: learning correlation and interaction across modalities , 2012, ICMI '12.

[211]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[212]  Cordelia Schmid,et al.  P-CNN: Pose-Based CNN Features for Action Recognition , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[213]  Ronen Basri,et al.  Actions as space-time shapes , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[214]  Paris Smaragdis,et al.  Secure Sound Classification: Gaussian Mixture Models , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[215]  Guy J. Brown,et al.  Computational Auditory Scene Analysis: Principles, Algorithms, and Applications , 2006 .

[216]  Gerald Friedland,et al.  Acoustic super models for large scale video event detection , 2011, J-MRE '11.

[217]  Cheng-Hsin Hsu,et al.  GamingAnywhere: an open-source cloud gaming testbed , 2013, ACM Multimedia.

[218]  Chun-I Fan,et al.  Encrypted Data Deduplication in Cloud Storage , 2015, 2015 10th Asia Joint Conference on Information Security.

[219]  Jiebo Luo,et al.  Kodak consumer video benchmark data set : concept definition and annotation * * , 2008 .

[220]  Mauro Barni,et al.  Processing in the encrypted domain using a composite signal representation: Pros and cons , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).

[221]  Martha Larson,et al.  Intent-Aware Video Search Result Optimization , 2014, IEEE Transactions on Multimedia.

[222]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[223]  Gang Sun,et al.  A Key Volume Mining Deep Framework for Action Recognition , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[224]  Radu Horaud,et al.  Vision-guided robot hearing , 2013, Int. J. Robotics Res..

[225]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[226]  Ramesh Jain,et al.  Event analytics on Microblogs , 2010 .

[227]  Sergey Ioffe,et al.  Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning , 2016, AAAI.

[228]  Arun Ross,et al.  Biometrics Security and Privacy Protection [From the Guest Editors] , 2015, IEEE Signal Process. Mag..

[229]  Andrew W. Fitzgibbon,et al.  Real-time human pose recognition in parts from single depth images , 2011, CVPR 2011.

[230]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[231]  Benny Pinkas,et al.  SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.

[232]  Bhiksha Raj,et al.  Optimization of the DET curve in speaker verification under noisy conditions , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[233]  Rainer Stiefelhagen,et al.  3D user-perspective, voxel-based estimation of visual focus of attention in dynamic meeting scenarios , 2010, ICMI-MLMI '10.

[234]  Richard M. Stern,et al.  Likelihood-maximizing beamforming for robust hands-free speech recognition , 2004, IEEE Transactions on Speech and Audio Processing.

[235]  Nicu Sebe,et al.  Image saliency by isocentric curvedness and color , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[236]  Chin-Hui Lee,et al.  Automatic recognition of keywords in unconstrained speech using hidden Markov models , 1990, IEEE Trans. Acoust. Speech Signal Process..

[237]  Thierry Bertin-Mahieux,et al.  Large-scale cover song recognition using hashed chroma landmarks , 2011, 2011 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA).

[238]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[239]  Ming-Ching Chang,et al.  Gaze and body pose estimation from a distance , 2011, 2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[240]  Wei Liu,et al.  Learning to Hash for Indexing Big Data—A Survey , 2015, Proceedings of the IEEE.

[241]  Richard Rose,et al.  A hidden Markov model based keyword recognition system , 1990, International Conference on Acoustics, Speech, and Signal Processing.

[242]  Bernard Ghanem,et al.  ActivityNet: A large-scale video benchmark for human activity understanding , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[243]  Patrick Pérez,et al.  Explicit Embeddings for Nearest Neighbor Search with Mercer Kernels , 2015, Journal of Mathematical Imaging and Vision.

[244]  Nalini Venkatasubramanian,et al.  Clouds + Games: A Multifaceted Approach , 2014, IEEE Internet Computing.

[245]  Pankesh Patel,et al.  Service Level Agreement in Cloud Computing , 2009 .

[246]  Lorenzo Torresani,et al.  C3D: Generic Features for Video Analysis , 2014, ArXiv.

[247]  Frank Kurth,et al.  Detecting bird sounds in a complex acoustic environment and application to bioacoustic monitoring , 2010, Pattern Recognit. Lett..

[248]  Rajkumar Buyya,et al.  SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions , 2011, 2011 International Conference on Cloud and Service Computing.

[249]  Xavier Bresson,et al.  Matrix Completion on Graphs , 2014, NIPS 2014.

[250]  Bhiksha Raj,et al.  Detecting sound objects in audio recordings , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[251]  Julien Rabin,et al.  A contrario matching of SIFT-like descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[252]  Sujit Dey,et al.  Modeling and Characterizing User Experience in a Cloud Server Based Mobile Gaming Approach , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[253]  Moses Charikar,et al.  Similarity estimation techniques from rounding algorithms , 2002, STOC '02.

[254]  C. V. Jawahar,et al.  The truth about cats and dogs , 2011, 2011 International Conference on Computer Vision.

[255]  Martha Larson,et al.  Intent and its discontents: the user at the wheel of the online video search engine , 2012, ACM Multimedia.

[256]  Bhiksha Raj,et al.  Audio event detection from acoustic unit occurrence patterns , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[257]  Georges Quénot,et al.  TRECVID 2015 - An Overview of the Goals, Tasks, Data, Evaluation Mechanisms and Metrics , 2011, TRECVID.

[258]  Marcus Rohrbach,et al.  A Multi-scale Multiple Instance Video Description Network , 2015, ArXiv.

[259]  Bernt Schiele,et al.  The Long-Short Story of Movie Description , 2015, GCPR.

[260]  Victor S. Lempitsky,et al.  Neural Codes for Image Retrieval , 2014, ECCV.

[261]  Gerald J. Gorn,et al.  The Effects of Music in Advertising on Choice Behavior: A Classical Conditioning Approach: , 1982 .

[262]  Zhongchao Shi,et al.  Boosting Video Description Generation by Explicitly Translating from Frame-Level Captions , 2016, ACM Multimedia.

[263]  Xi Wang,et al.  Multi-Stream Multi-Class Fusion of Deep Networks for Video Classification , 2016, ACM Multimedia.

[264]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[265]  Cordelia Schmid,et al.  Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search , 2008, ECCV.

[266]  Daniel P. W. Ellis,et al.  Signal Processing for Music Analysis , 2011, IEEE Journal of Selected Topics in Signal Processing.

[267]  John R. Hershey,et al.  Super-human multi-talker speech recognition: A graphical modeling approach , 2010, Comput. Speech Lang..

[268]  J. Rasmussen,et al.  Perfect simulation of Hawkes processes , 2005, Advances in Applied Probability.

[269]  Martin Ester,et al.  TrustWalker: a random walk model for combining trust-based and item-based recommendation , 2009, KDD.

[270]  Gerald Friedland,et al.  Two's a crowd: improving speaker diarization by automatically identifying and excluding overlapped speech , 2008, INTERSPEECH.

[271]  Daniel P. W. Ellis,et al.  Tandem acoustic modeling in large-vocabulary recognition , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[272]  John R. Kender,et al.  Visual memes in social media: tracking real-world news in YouTube videos , 2011, ACM Multimedia.

[273]  Tao Mei,et al.  Boosting Image Captioning with Attributes , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).

[274]  Yoshua Bengio,et al.  Maxout Networks , 2013, ICML.

[275]  Juan Carlos Niebles,et al.  Modeling Temporal Structure of Decomposable Motion Segments for Activity Classification , 2010, ECCV.

[276]  Alexander Vardy,et al.  Closest point search in lattices , 2002, IEEE Trans. Inf. Theory.

[277]  Daniel P. W. Ellis,et al.  A Large-Scale Evaluation of Acoustic and Subjective Music-Similarity Measures , 2004, Computer Music Journal.

[278]  Lawrence D. Jackel,et al.  Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.

[279]  Benjamin Recht,et al.  Random Features for Large-Scale Kernel Machines , 2007, NIPS.

[280]  Olivier Buisson,et al.  A posteriori multi-probe locality sensitive hashing , 2008, ACM Multimedia.

[281]  Zekeriya Erkin,et al.  Efficiently computing private recommendations , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[282]  N. J. A. Sloane,et al.  Fast quantizing and decoding and algorithms for lattice quantizers and codes , 1982, IEEE Trans. Inf. Theory.

[283]  Nicu Sebe,et al.  Affective multimodal human-computer interaction , 2005, ACM Multimedia.

[284]  Jeff Johnson,et al.  Billion-Scale Similarity Search with GPUs , 2017, IEEE Transactions on Big Data.

[285]  David G. Lowe,et al.  Scalable Nearest Neighbor Algorithms for High Dimensional Data , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[286]  Andrew Zisserman,et al.  Learning Local Feature Descriptors Using Convex Optimisation , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[287]  Nitish Srivastava,et al.  Unsupervised Learning of Video Representations using LSTMs , 2015, ICML.

[288]  Yury A. Malkov,et al.  Efficient and Robust Approximate Nearest Neighbor Search Using Hierarchical Navigable Small World Graphs , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[289]  Songyang Lao,et al.  Who produced this video, amateur or professional? , 2013, ICMR '13.

[290]  Paris Smaragdis,et al.  Missing data imputation for spectral audio signals , 2009, 2009 IEEE International Workshop on Machine Learning for Signal Processing.

[291]  Piotr Indyk,et al.  Nearest-neighbor-preserving embeddings , 2007, TALG.

[292]  Patrick Gros,et al.  Detecting repeats for video structuring , 2007, Multimedia Tools and Applications.

[293]  Bhiksha Raj,et al.  Exploiting Temporal Sequence Structure for Semantic Analysis of Multimedia , 2012, INTERSPEECH.

[294]  Subramanian Ramanathan,et al.  DECAF: MEG-Based Multimodal Database for Decoding Affective Physiological Responses , 2015, IEEE Transactions on Affective Computing.

[295]  Josh Benaloh,et al.  Dense Probabilistic Encryption , 1999 .

[296]  D. Hubel,et al.  Receptive fields and functional architecture of monkey striate cortex , 1968, The Journal of physiology.

[297]  Piotr Indyk,et al.  Approximate nearest neighbor algorithms for Hausdorff metrics via embeddings , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[298]  Jon Louis Bentley,et al.  An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.

[299]  Ali Asghar Nazari Shirehjini Situation modelling: a domain analysis and user study , 2006 .

[300]  Subramanian Ramanathan,et al.  Exploring Transfer Learning Approaches for Head Pose Classification from Multi-view Surveillance Images , 2013, International Journal of Computer Vision.

[301]  Paris Smaragdis,et al.  Blind separation of convolved mixtures in the frequency domain , 1998, Neurocomputing.

[302]  Alexander Vardy,et al.  Maximum likelihood decoding of the Leech lattice , 1993, IEEE Trans. Inf. Theory.

[303]  J. Beauchamp,et al.  Fundamental frequency estimation of musical signals using a two‐way mismatch procedure , 1994 .

[304]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[305]  Thomas Serre,et al.  HMDB: A large video database for human motion recognition , 2011, 2011 International Conference on Computer Vision.

[306]  Mohan S. Kankanhalli,et al.  Privacy aware publication of surveillance video , 2013, Int. J. Trust. Manag. Comput. Commun..

[307]  Nitish Srivastava,et al.  Exploiting Image-trained CNN Architectures for Unconstrained Video Classification , 2015, BMVC.

[308]  Thomas Mensink,et al.  Image Classification with the Fisher Vector: Theory and Practice , 2013, International Journal of Computer Vision.

[309]  J.K. Aggarwal,et al.  Human activity analysis , 2011, ACM Comput. Surv..

[310]  Jonathan Brandt,et al.  Transform coding for fast approximate nearest neighbor search in high dimensions , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[311]  Bernt Schiele,et al.  A dataset for Movie Description , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[312]  Subramanian Ramanathan,et al.  Can computers learn from humans to see better?: inferring scene semantics from viewers' eye movements , 2011, ACM Multimedia.

[313]  Richard M. Stern,et al.  Optimization of the DET curve in speaker verification , 2012, 2012 IEEE Spoken Language Technology Workshop (SLT).

[314]  Paul Messaris,et al.  Visual Persuasion: The Role of Images in Advertising , 1996 .

[315]  Andrew Zisserman,et al.  Two-Stream Convolutional Networks for Action Recognition in Videos , 2014, NIPS.

[316]  Erez Shmueli,et al.  openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.

[317]  Alex Pentland,et al.  Sensing, Understanding, and Shaping Social Behavior , 2014, IEEE Transactions on Computational Social Systems.

[318]  Andrew Zisserman,et al.  Efficient Additive Kernels via Explicit Feature Maps , 2012, IEEE Trans. Pattern Anal. Mach. Intell..

[319]  Peter Robinson,et al.  OpenFace: An open source facial behavior analysis toolkit , 2016, 2016 IEEE Winter Conference on Applications of Computer Vision (WACV).

[320]  Stephen S. Yau,et al.  Hierarchical situation modeling and reasoning for pervasive computing , 2006, The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06).

[321]  Yi Yang,et al.  A discriminative CNN video representation for event detection , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[322]  Elisa Ricci,et al.  Space speaks: towards socially and personality aware visual surveillance , 2010, MPVA '10.

[323]  Xianglong Liu,et al.  Reciprocal Hash Tables for Nearest Neighbor Search , 2013, AAAI.

[324]  Min Wu,et al.  Secure video processing: Problems and challenges , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[325]  Min Wu,et al.  Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[326]  Cordelia Schmid,et al.  Improving Bag-of-Features for Large Scale Image Search , 2010, International Journal of Computer Vision.

[327]  Francesco Setti,et al.  F-Formation Detection: Individuating Free-Standing Conversational Groups in Images , 2015, PloS one.

[328]  Tao Mei,et al.  Video Captioning with Transferred Semantic Attributes , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[329]  Desney S. Tan,et al.  Human-aided computing: utilizing implicit human processing to classify images , 2008, CHI.

[330]  Lea Skorin-Kapov,et al.  Empirical QoE study of in-home streaming of online games , 2014, 2014 13th Annual Workshop on Network and Systems Support for Games.

[331]  Ahmad-Reza Sadeghi,et al.  Zero-Knowledge Watermark Detection and Proof of Ownership , 2001, Information Hiding.

[332]  M S Magnusson,et al.  Discovering hidden time patterns in behavior: T-patterns and their detection , 2000, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[333]  Tao Mei,et al.  Action Recognition by Learning Deep Multi-Granular Spatio-Temporal Video Representation , 2016, ICMR.

[334]  Rongrong Ji,et al.  Large-scale visual sentiment ontology and detectors using adjective noun pairs , 2013, ACM Multimedia.

[335]  Terrence J. Sejnowski,et al.  An Information-Maximization Approach to Blind Separation and Blind Deconvolution , 1995, Neural Computation.

[336]  Kunihiko Fukushima,et al.  Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position , 1980, Biological Cybernetics.

[337]  Hervé Jégou,et al.  Using extreme value theory for image detection , 2013 .

[338]  Subramanian Ramanathan,et al.  Connecting Meeting Behavior with Extraversion—A Systematic Study , 2012, IEEE Transactions on Affective Computing.

[339]  L. Lewis,et al.  A Framework of Cognitive Situation Modeling and Recognition , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[340]  Ramesh C. Jain,et al.  Towards Environment-to-Environment (E2E) multimedia communication systems , 2008, SAME '08.

[341]  Chau Yuen,et al.  Enabling Adaptive High-Frame-Rate Video Streaming in Mobile Cloud Gaming Applications , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[342]  Alan N. Steinberg,et al.  Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.

[343]  Kai Li,et al.  Image similarity search with compact data structures , 2004, CIKM '04.

[344]  Francesco Setti,et al.  Multi-scale f-formation discovery for group detection , 2013, 2013 IEEE International Conference on Image Processing.

[345]  Frédéric Jurie,et al.  Sampling Strategies for Bag-of-Features Image Classification , 2006, ECCV.

[346]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[347]  Susan T. Dumais,et al.  Learning user interaction models for predicting web search result preferences , 2006, SIGIR.

[348]  Christopher Joseph Pal,et al.  Describing Videos by Exploiting Temporal Structure , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[349]  Ali Farhadi,et al.  Actions ~ Transformations , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[350]  Ronald Poppe,et al.  A survey on vision-based human action recognition , 2010, Image Vis. Comput..

[351]  Anssi Klapuri,et al.  Multiple fundamental frequency estimation based on harmonicity and spectral smoothness , 2003, IEEE Trans. Speech Audio Process..

[352]  Nicu Sebe,et al.  Looking at the viewer: analysing facial activity to detect personal highlights of multimedia contents , 2010, Multimedia Tools and Applications.

[353]  Emmanuel J. Candès,et al.  The Power of Convex Relaxation: Near-Optimal Matrix Completion , 2009, IEEE Transactions on Information Theory.

[354]  Juan Carlos Niebles,et al.  Unsupervised Learning of Human Action Categories Using Spatial-Temporal Words , 2008, International Journal of Computer Vision.

[355]  Robert D. Nowak,et al.  Transduction with Matrix Completion: Three Birds with One Stone , 2010, NIPS.

[356]  Sharath Pankanti,et al.  Blinkering Surveillance: Enabling Video Privacy through Computer Vision , 2004 .

[357]  Limin Wang,et al.  Action recognition with trajectory-pooled deep-convolutional descriptors , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[358]  Dong Liu,et al.  EventNet: A Large Scale Structured Concept Library for Complex Event Detection in Video , 2015, ACM Multimedia.

[359]  Alon Lavie,et al.  METEOR: An Automatic Metric for MT Evaluation with Improved Correlation with Human Judgments , 2005, IEEvaluation@ACL.

[360]  Nalini Venkatasubramanian,et al.  Crowdsourced Mobile Data Transfer with Delay Bound , 2016, TOIT.

[361]  Peter E. Hart,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[362]  Alessandro Vinciarelli,et al.  Canal9: A database of political debates for analysis of social interactions , 2009, 2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops.

[363]  Sari Järvinen,et al.  Experiments with QoS-Aware Gaming-on-Demand Service , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[364]  Mubarak Shah,et al.  High-level event recognition in unconstrained videos , 2013, International Journal of Multimedia Information Retrieval.

[365]  Alex Pentland,et al.  Social Persuasion in Online and Physical Networks , 2014, Proceedings of the IEEE.

[366]  Murat Akbacak,et al.  Bag-of-Audio-Words Approach for Multimedia Event Classification , 2012, INTERSPEECH.

[367]  Trevor Darrell,et al.  Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[368]  Ying Luo,et al.  Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.

[369]  SEONG-PING CHUAH,et al.  Cloud gaming: a green solution to massive multiplayer online games , 2014, IEEE Wireless Communications.

[370]  Victor Lempitsky,et al.  Additive Quantization for Extreme Vector Compression , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[371]  Trevor Darrell,et al.  Learning to Hash with Binary Reconstructive Embeddings , 2009, NIPS.

[372]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[373]  Jean-Marc Odobez,et al.  We are not contortionists: Coupled adaptive learning for head and body orientation estimation in surveillance video , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[374]  Ming Yang,et al.  3D Convolutional Neural Networks for Human Action Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[375]  Qi Tian,et al.  Super-Bit Locality-Sensitive Hashing , 2012, NIPS.

[376]  A. Hawkes Spectra of some self-exciting and mutually exciting point processes , 1971 .

[377]  Radu Horaud,et al.  An EM algorithm for joint source separation and diarisation of multichannel convolutive speech mixtures , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[378]  Salim Roukos,et al.  Bleu: a Method for Automatic Evaluation of Machine Translation , 2002, ACL.

[379]  Bernard J. Jansen,et al.  Search log analysis: What it is, what's been done, how to do it , 2006 .

[380]  William B. Dolan,et al.  Collecting Highly Parallel Data for Paraphrase Evaluation , 2011, ACL.

[381]  Bhiksha Raj,et al.  Latent-variable decomposition based dereverberation of monaural and multi-channel signals , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[382]  R. Barthes Camera Lucida: Reflections on Photography , 1980 .

[383]  Pradeep K. Atrey,et al.  Secure cloud-based medical data visualization , 2012, ACM Multimedia.

[384]  Fei-Fei Li,et al.  Large-Scale Video Classification with Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[385]  Matthijs Douze,et al.  How should we evaluate supervised hashing? , 2016, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[386]  Fernando De la Torre,et al.  Supervised Descent Method and Its Applications to Face Alignment , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[387]  Jian Sun,et al.  Optimized Product Quantization , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[388]  David A. Shamma,et al.  YFCC100M , 2015, Commun. ACM.

[389]  Wei Xu,et al.  Video Paragraph Captioning Using Hierarchical Recurrent Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[390]  Sujit Dey,et al.  Cloud Mobile Media: Opportunities, challenges, and directions , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[391]  Stefan Winkler,et al.  PET: An eye-tracking dataset for animal-centric Pascal object classes , 2015, 2015 IEEE International Conference on Multimedia and Expo (ICME).

[392]  Antonio Torralba,et al.  Small codes and large image databases for recognition , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[393]  Malik Ghallab,et al.  Situation Recognition: Representation and Algorithms , 1993, IJCAI.

[394]  Subramanian Ramanathan,et al.  On the relationship between head pose, social attention and personality prediction for unstructured and dynamic group interactions , 2013, ICMI '13.

[395]  Yosihiko Ogata,et al.  Statistical Models for Earthquake Occurrences and Residual Analysis for Point Processes , 1988 .

[396]  Ting Liu,et al.  Recent advances in convolutional neural networks , 2015, Pattern Recognit..

[397]  Stefan Katzenbeisser,et al.  Processing encrypted floating point signals , 2011, MM&Sec '11.

[398]  Merriam-Webster Merriam-Webster's Collegiate Dictionary , 1998 .

[399]  Philippe Flajolet,et al.  Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..

[400]  Nathan Srebro,et al.  On Symmetric and Asymmetric LSHs for Inner Product Search , 2014, ICML.

[401]  Kunio Fukunaga,et al.  Natural Language Description of Human Activities from Video Images Based on Concept Hierarchy of Actions , 2002, International Journal of Computer Vision.

[402]  Augusto Sarti,et al.  Scream and gunshot detection and localization for audio-surveillance systems , 2007, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance.

[403]  Christian F. Tschudin,et al.  On Software Protection via Function Hiding , 1998, Information Hiding.

[404]  Thomas S. Huang,et al.  Relevance feedback: a power tool for interactive content-based image retrieval , 1998, IEEE Trans. Circuits Syst. Video Technol..

[405]  Jing Wang,et al.  Clickage: towards bridging semantic and intent gaps via mining click logs of search engines , 2013, ACM Multimedia.

[406]  Rajkumar Buyya,et al.  Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing , 2012, Future Gener. Comput. Syst..

[407]  Ali Shokoufandeh,et al.  Secure brightness/contrast filter using fully homomorphic encryption , 2015, IPSN '15.

[408]  Gerald Friedland,et al.  Overlapped speech detection for improved speaker diarization in multiparty meetings , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[409]  Chin-Laung Lei,et al.  Understanding the performance of thin-client gaming , 2011, 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR).

[410]  David J. Fleet,et al.  Cartesian K-Means , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[411]  Alex Pentland,et al.  The Strength of the Strongest Ties in Collaborative Problem Solving , 2014, Scientific Reports.

[412]  Li Lin,et al.  LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming , 2014, IEEE/ACM Transactions on Networking.

[413]  Bhiksha Raj,et al.  Learning contextual relevance of audio segments using discriminative models over AUD sequences , 2011, 2011 IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA).

[414]  Daniel Gatica-Perez,et al.  Human interaction discovery in smartphone proximity networks , 2013, Personal and Ubiquitous Computing.

[415]  Andrea L. Bertozzi,et al.  Point-process models of social network interactions: Parameter estimation and missing data recovery , 2015, European Journal of Applied Mathematics.

[416]  Aly A. Farag,et al.  CSIFT: A SIFT Descriptor with Color Invariant Characteristics , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[417]  Kai Li,et al.  Asymmetric distance estimation with sketches for similarity search in high-dimensional spaces , 2008, SIGIR '08.

[418]  Kate Saenko,et al.  Integrating Language and Vision to Generate Natural Language Descriptions of Videos in the Wild , 2014, COLING.

[419]  Mohan M. Trivedi,et al.  Head Pose Estimation in Computer Vision: A Survey , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[420]  Bhiksha Raj,et al.  Compositional Models for Audio Processing: Uncovering the structure of sound mixtures , 2015, IEEE Signal Processing Magazine.

[421]  Zhe Wang,et al.  Multi-Probe LSH: Efficient Indexing for High-Dimensional Similarity Search , 2007, VLDB.

[422]  Angelos D. Keromytis,et al.  A Survey of Voice over IP Security Research , 2009, ICISS.

[423]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[424]  Jingdong Wang,et al.  Composite Quantization for Approximate Nearest Neighbor Search , 2014, ICML.

[425]  C. Koch,et al.  A saliency-based search mechanism for overt and covert shifts of visual attention , 2000, Vision Research.

[426]  Niv Ahituv,et al.  Processing encrypted data , 1987, CACM.

[427]  Mauro Barni,et al.  Efficient pointwise and blockwise encrypted operations , 2008, MM&Sec '08.

[428]  Bhiksha Raj,et al.  Learning Model-Based Sparsity via Projected Gradient Descent , 2012, IEEE Transactions on Information Theory.

[429]  J. Stephen Downie,et al.  The music information retrieval evaluation exchange (2005-2007): A window into music information retrieval research , 2008 .

[430]  Marcus Rohrbach,et al.  Translating Videos to Natural Language Using Deep Recurrent Neural Networks , 2014, NAACL.

[431]  Daniel P. W. Ellis,et al.  Chord segmentation and recognition using EM-trained hidden markov models , 2003, ISMIR.

[432]  Hua-Jun Hong,et al.  Dynamic module deployment in a fog computing platform , 2016, 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[433]  Andrii Matviienko,et al.  VapeTracker: Tracking Vapor Consumption to Help E-cigarette Users Quit , 2016, CHI Extended Abstracts.

[434]  Richard G. Baraniuk,et al.  1-Bit compressive sensing , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[435]  Mohan S. Kankanhalli,et al.  W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video , 2012, Multimedia Tools and Applications.

[436]  Hendrik P. A. Lensch,et al.  Efficient Large-Scale Approximate Nearest Neighbor Search on the GPU , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[437]  Laura A. Dabbish,et al.  Labeling images with a computer game , 2004, AAAI Spring Symposium: Knowledge Collection from Volunteer Contributors.

[438]  Wei-Ta Chu,et al.  A Privacy-Preserving Bipartite Graph Matching Framework for Multimedia Analysis and Retrieval , 2015, ICMR.

[439]  Tomás Lozano-Pérez,et al.  A Framework for Multiple-Instance Learning , 1997, NIPS.

[440]  James J. Little,et al.  Stacked Quantizers for Compositional Vector Compression , 2014, ArXiv.

[441]  Piotr Indyk,et al.  Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.

[442]  Daniel P. W. Ellis,et al.  Multiple-Instance Learning for Music Information Retrieval , 2008, ISMIR.

[443]  Julien Rabin,et al.  A Statistical Approach to the Matching of Local Features , 2009, SIAM J. Imaging Sci..

[444]  Cordelia Schmid,et al.  A contextual dissimilarity measure for accurate and efficient image search , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[445]  T. Foulsham,et al.  Comparing scanpaths during scene encoding and recognition : A multi-dimensional approach , 2012 .

[446]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[447]  Doug Szajda,et al.  Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm , 2006, NDSS.

[448]  William Puech,et al.  Emerging cryptographic challenges in image and video processing , 2012, 2012 19th IEEE International Conference on Image Processing.

[449]  Lei Wu,et al.  Tag Completion for Image Retrieval , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[450]  Trevor Darrell,et al.  Sequence to Sequence -- Video to Text , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[451]  Radu Horaud,et al.  RAVEL: an annotated corpus for training robots with audiovisual abilities , 2013, Journal on Multimodal User Interfaces.

[452]  Claudio E. Palazzi,et al.  Vegas Over Access Point: Making Room for Thin Client Game Systems in a Wireless Home , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[453]  William Puech,et al.  A Homomorphic Method for Sharing Secret Images , 2009, IWDW.

[454]  Michael A. Casey,et al.  Fast Recognition of Remixed Music Audio , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[455]  Marius Preda,et al.  Mobile Cloud Convergence in GaaS: A Business Model Proposition , 2012, 2012 45th Hawaii International Conference on System Sciences.

[456]  Samy Bengio,et al.  Show and tell: A neural image caption generator , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[457]  Takeo Kanade,et al.  The Extended Cohn-Kanade Dataset (CK+): A complete dataset for action unit and emotion-specified expression , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[458]  Thorsten Joachims,et al.  Transductive Inference for Text Classification using Support Vector Machines , 1999, ICML.

[459]  Pradeep K. Atrey,et al.  Scale me, crop me, knowme not: Supporting scaling and cropping in secret image sharing , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[460]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[461]  Luc Van Gool,et al.  Hello neighbor: Accurate object retrieval with k-reciprocal nearest neighbors , 2011, CVPR 2011.

[462]  Alex Graves,et al.  Supervised Sequence Labelling with Recurrent Neural Networks , 2012, Studies in Computational Intelligence.

[463]  Andrea Vedaldi,et al.  Dynamic Image Networks for Action Recognition , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[464]  Carmen Peláez-Moreno,et al.  Recognizing voice over IP: a robust front-end for speech recognition on the world wide web , 2001, IEEE Trans. Multim..

[465]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[466]  Jean-Jacques Fuchs,et al.  Spread representations , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[467]  Vivek K. Singh,et al.  Predicting Privacy Attitudes Using Phone Metadata , 2016, SBP-BRiMS.

[468]  Mauro Barni,et al.  Comparison of different FFT implementations in the encrypted domain , 2008, 2008 16th European Signal Processing Conference.

[469]  Svetlana Lazebnik,et al.  Iterative quantization: A procrustean approach to learning binary codes , 2011, CVPR 2011.

[470]  David G. Lowe,et al.  Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration , 2009, VISAPP.

[471]  Cordelia Schmid,et al.  Action Recognition with Improved Trajectories , 2013, 2013 IEEE International Conference on Computer Vision.

[472]  Nicu Sebe,et al.  A Prototype Learning Framework Using EMD: Application to Complex Scenes Analysis , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[473]  Mohan S. Kankanhalli,et al.  Tweeting Cameras for Event Detection , 2015, WWW.

[474]  Fang Wu,et al.  Novelty and collective attention , 2007, Proceedings of the National Academy of Sciences.

[475]  Min Wu,et al.  Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.

[476]  Lifeng Sun,et al.  Propagation-based social-aware replication for social video contents , 2012, ACM Multimedia.

[477]  Guy Gogniat,et al.  Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain , 2013, IEEE Signal Processing Magazine.

[478]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[479]  Ramesh C. Jain,et al.  Situation detection and control using spatio-temporal analysis of microblogs , 2010, WWW '10.

[480]  Hervé Jégou,et al.  Beyond “project and sign” for cosine estimation with binary codes , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[481]  C.-C. Jay Kuo,et al.  Environmental sound recognition: a survey , 2014 .

[482]  Frédo Durand,et al.  Learning to predict where humans look , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[483]  Cordelia Schmid,et al.  Evaluation of GIST descriptors for web-scale image search , 2009, CIVR '09.

[484]  Kevin Walby,et al.  Open-Street Camera Surveillance and Governance in Canada , 2005 .

[485]  Shervin Shirmohammadi,et al.  Game as video: bit rate reduction through adaptive object encoding , 2013, NOSSDAV '13.

[486]  A. Kendon Conducting Interaction: Patterns of Behavior in Focused Encounters , 1990 .

[487]  Frederic Dufaux,et al.  Video surveillance using JPEG 2000 , 2004, SPIE Optics + Photonics.

[488]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of multimedia , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[489]  Swapnil Mishra,et al.  Feature Driven and Point Process Approaches for Popularity Prediction , 2016, CIKM.

[490]  Marcel Worring,et al.  Content-Based Image Retrieval at the End of the Early Years , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[491]  Mohan S. Kankanhalli,et al.  Creating audio keywords for event detection in soccer video , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[492]  Nalini Venkatasubramanian,et al.  Architecture for an Automatic Customized Warning System , 2007, 2007 IEEE Intelligence and Security Informatics.

[493]  Bhiksha Raj,et al.  NELS - Never-Ending Learner of Sounds , 2018, ArXiv.

[494]  Laurent Amsaleg,et al.  Image retrieval with reciprocal and shared nearest neighbors , 2014, 2014 International Conference on Computer Vision Theory and Applications (VISAPP).

[495]  Touradj Ebrahimi,et al.  Scrambling for Privacy Protection in Video Surveillance Systems , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[496]  Qiang Ji,et al.  Multi-label learning with missing labels for image annotation and facial action unit recognition , 2015, Pattern Recognit..

[497]  C. Lawrence Zitnick,et al.  CIDEr: Consensus-based image description evaluation , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[498]  N. Cocchiarella,et al.  Situations and Attitudes. , 1986 .

[499]  Ronald Fagin,et al.  Fuzzy queries in multimedia database systems , 1998, PODS '98.

[500]  Xing Xie,et al.  Learning user interest for image browsing on small-form-factor devices , 2005, CHI.

[501]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[502]  Olivier Buisson,et al.  Random maximum margin hashing , 2011, CVPR 2011.

[503]  Koji Yatani,et al.  BodyScope: a wearable acoustic sensor for activity recognition , 2012, UbiComp.

[504]  R.M. Stern,et al.  Missing-feature approaches in speech recognition , 2005, IEEE Signal Processing Magazine.

[505]  Tat-Jun Chin,et al.  Efficient Point Process Inference for Large-Scale Object Detection , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[506]  Bhiksha Raj,et al.  Non-negative matrix factorization based compensation of music for automatic speech recognition , 2010, INTERSPEECH.

[507]  Brendon M Lapham,et al.  Hawkes processes and some financial applications , 2014 .

[508]  Paul Roe,et al.  A survey of tagging techniques for music, speech and environmental sound , 2012, Artificial Intelligence Review.

[509]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[510]  Bala Srinivasan,et al.  Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric Data , 2014, iiWAS.

[511]  Radu Horaud,et al.  An on-line variational Bayesian model for multi-person tracking from cluttered scenes , 2016, Comput. Vis. Image Underst..

[512]  Chong-Wah Ngo,et al.  Learning Query and Image Similarities with Ranking Canonical Correlation Analysis , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[513]  Cheng Wang,et al.  Approximate Nearest Neighbor Search by Residual Vector Quantization , 2010, Sensors.

[514]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[515]  Michael Isard,et al.  Lost in quantization: Improving particular object retrieval in large scale image databases , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[516]  Bradley Malin,et al.  Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.

[517]  Mor Naaman,et al.  Social multimedia: highlighting opportunities for search and mining of multimedia data in social media applications , 2010, Multimedia Tools and Applications.

[518]  T. Ozaki Maximum likelihood estimation of Hawkes' self-exciting point processes , 1979 .

[519]  Hervé Jégou,et al.  Anti-sparse coding for approximate nearest neighbor search , 2011, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[520]  N. J. A. Sloane,et al.  Sphere Packings, Lattices and Groups , 1987, Grundlehren der mathematischen Wissenschaften.

[521]  Chin-Laung Lei,et al.  Inferring Speech Activity from Encrypted Skype Traffic , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[522]  Albert-László Barabási,et al.  Understanding individual human mobility patterns , 2008, Nature.

[523]  Kajal T. Claypool,et al.  Latency and player actions in online games , 2006, CACM.

[524]  Elizabeth G. Kehoe,et al.  Personality modulates the effects of emotional arousal and valence on brain activation. , 2012, Social cognitive and affective neuroscience.

[525]  Chong-Wah Ngo,et al.  Semi-supervised Domain Adaptation with Subspace Learning for visual recognition , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[526]  Sergio Escalera,et al.  ChaLearn Looking at People Challenge 2014: Dataset and Results , 2014, ECCV Workshops.

[527]  Liu Yang,et al.  Crowdsourcing Fraud Detection Algorithm Based on Ebbinghaus Forgetting Curve , 2014 .

[528]  DeLiang Wang,et al.  Monaural Speech Separation , 2002, NIPS.

[529]  Fan Ye,et al.  Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.

[530]  Bhiksha Raj,et al.  A unifying analysis of projected gradient descent for ℓp-constrained least squares , 2011, 1107.4623.

[531]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[532]  Desney S. Tan,et al.  Designing Novel Image Search Interfaces by Understanding Unique Characteristics and Usage , 2009, INTERACT.

[533]  Hanan Samet,et al.  Foundations of multidimensional and metric data structures , 2006, Morgan Kaufmann series in data management systems.

[534]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[535]  Michael Backes,et al.  Speaker Recognition in Encrypted Voice Streams , 2010, ESORICS.

[536]  Bhiksha Raj,et al.  A Sparse Non-Parametric Approach for Single Channel Separation of Known Sounds , 2009, NIPS.

[537]  Shih-Fu Chang How far we've come: Impact of 20 years of multimedia information retrieval , 2013, TOMCCAP.

[538]  Vincenzo Piuri,et al.  Implementing FingerCode-based identity matching in the encrypted domain , 2010, 2010 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications.

[539]  Bhiksha Raj,et al.  Unsupervised Learning of Acoustic Unit Descriptors for Audio Content Representation and Classification , 2011, INTERSPEECH.

[540]  Svetlana Lazebnik,et al.  Locality-sensitive binary codes from shift-invariant kernels , 2009, NIPS.

[541]  Bhiksha Raj,et al.  Ensemble approach in speaker verification , 2013, INTERSPEECH.

[542]  Bhiksha Raj,et al.  Unsupervised Structure Discovery for Semantic Analysis of Audio , 2012, NIPS.

[543]  Nicu Sebe,et al.  Content-based multimedia information retrieval: State of the art and challenges , 2006, TOMCCAP.

[544]  Philip S. Yu,et al.  Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering , 2006, Sixth International Conference on Data Mining (ICDM'06).

[545]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[546]  K. Srinathan,et al.  Private Content Based Image Retrieval , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[547]  Jiebo Luo,et al.  The wisdom of social multimedia: using flickr for prediction and forecast , 2010, ACM Multimedia.

[548]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[549]  Jorge Nocedal,et al.  Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization , 1997, TOMS.

[550]  Beth Logan,et al.  Mel Frequency Cepstral Coefficients for Music Modeling , 2000, ISMIR.

[551]  Andrei Z. Broder,et al.  On the resemblance and containment of documents , 1997, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171).

[552]  J. Russell A circumplex model of affect. , 1980 .

[553]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[554]  Lu Fang,et al.  A low latency cloud gaming system using edge preserved image homography , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[555]  Mitchel Weintraub,et al.  A theory and computational model of auditory monaural sound separation , 1985 .

[556]  Ramesh Jain,et al.  Event Detection And Correspondence , 1986 .

[557]  Sujit Dey,et al.  Rendering Adaptation to Address Communication and Computation Constraints in Cloud Mobile Gaming , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[558]  Wenjun Zeng,et al.  A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..

[559]  Oscar Mayora-Ibarra,et al.  Multi-modal mobile sensing of social interactions , 2012, 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[560]  Klaus Riede,et al.  Automatic bird sound detection in long real-field recordings: Applications and tools , 2014 .

[561]  Elisabeth André,et al.  Emotion recognition based on physiological changes in music listening , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[562]  Mica R. Endsley,et al.  Situation awareness global assessment technique (SAGAT) , 1988, Proceedings of the IEEE 1988 National Aerospace and Electronics Conference.

[563]  Gary R. Bradski,et al.  Learning OpenCV 3: Computer Vision in C++ with the OpenCV Library , 2016 .

[564]  W. R. Bennett,et al.  Spectra of quantized signals , 1948, Bell Syst. Tech. J..

[565]  Ronald Cramer,et al.  A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .

[566]  Hua-Jun Hong,et al.  Animation Rendering on Multimedia Fog Computing Platforms , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).

[567]  Guy J. Brown,et al.  Computational auditory scene analysis , 1994, Comput. Speech Lang..

[568]  Cordelia Schmid,et al.  Aggregating local descriptors into a compact image representation , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[569]  Barry Smyth,et al.  A Community-Based Approach to Personalizing Web Search , 2007, Computer.

[570]  Bowen Zhang,et al.  Real-Time Action Recognition with Enhanced Motion Vector CNNs , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[571]  Hervé Jégou,et al.  Searching with expectations , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[572]  D. Ellis Beat Tracking by Dynamic Programming , 2007 .

[573]  K. Selçuk Candan,et al.  How Does the Data Sampling Strategy Impact the Discovery of Information Diffusion in Social Media? , 2010, ICWSM.

[574]  Lennart E. Nacke,et al.  From game design elements to gamefulness: defining "gamification" , 2011, MindTrek.

[575]  Chun-Ying Huang,et al.  Measuring the latency of cloud gaming systems , 2011, ACM Multimedia.

[576]  Pascal Fua,et al.  LDAHash: Improved Matching with Smaller Descriptors , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[577]  Ralf Steinmetz,et al.  Towards a P2P Cloud: Reliable Resource Reservations in Unreliable P2P Systems , 2010, 2010 IEEE 16th International Conference on Parallel and Distributed Systems.

[578]  Shree K. Nayar,et al.  Face swapping: automatically replacing faces in photographs , 2008, SIGGRAPH 2008.

[579]  Sushil Jajodia,et al.  Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.

[580]  Ping Li,et al.  Asymmetric LSH (ALSH) for Sublinear Time Maximum Inner Product Search (MIPS) , 2014, NIPS.

[581]  Wei Liu,et al.  Semi-supervised distance metric learning for Collaborative Image Retrieval , 2008, CVPR.

[582]  Ramesh C. Jain,et al.  Eventshop: from heterogeneous web streams to personalized situation detection and control , 2012, WebSci '12.

[583]  Bernt Schiele,et al.  Coherent Multi-sentence Video Description with Variable Level of Detail , 2014, GCPR.

[584]  Gerald Friedland,et al.  Speaker Recognition and Diarization , 2010 .

[585]  Yann LeCun,et al.  Convolutional Learning of Spatio-temporal Features , 2010, ECCV.

[586]  Matthieu Cord,et al.  Locality-Sensitive Hashing for Chi2 Distance , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[587]  David Woods,et al.  Situation Awareness: A Critical But Ill-Defined Phenomenon , 1991 .

[588]  Rajkumar Buyya,et al.  SLA-Based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[589]  Jessica K. Hodgins,et al.  Guide to the Carnegie Mellon University Multimodal Activity (CMU-MMAC) Database , 2008 .

[590]  Mark Bebbington,et al.  On the statistics of the linked stress release model , 2001, Journal of Applied Probability.

[591]  Li Fei-Fei,et al.  ImageNet: A large-scale hierarchical image database , 2009, CVPR.

[592]  Yang Wang,et al.  Human Action Recognition by Semilatent Topic Models , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[593]  Quoc V. Le,et al.  Learning hierarchical invariant spatio-temporal features for action recognition with independent subspace analysis , 2011, CVPR 2011.

[594]  Daniel P. W. Ellis,et al.  A Discriminative Model for Polyphonic Piano Transcription , 2007, EURASIP J. Adv. Signal Process..

[595]  E. C. Adam,et al.  Fighter cockpits of the future , 1993, [1993 Proceedings] AIAA/IEEE Digital Avionics Systems Conference.

[596]  Olivier Buisson,et al.  Logo retrieval with a contrario visual query expansion , 2009, ACM Multimedia.

[597]  Trevor Darrell,et al.  Nearest-Neighbor Methods in Learning and Vision: Theory and Practice (Neural Information Processing) , 2006 .

[598]  M. Perugini,et al.  The Big Five Marker Scales (BFMS) and the Italian AB5C taxonomy: Analyses from an emic-etic perspective , 2002 .

[599]  Jure Leskovec,et al.  Patterns of Influence in a Recommendation Network , 2006, PAKDD.

[600]  Kilian Q. Weinberger,et al.  Distance Metric Learning for Large Margin Nearest Neighbor Classification , 2005, NIPS.

[601]  Antonio Torralba,et al.  LabelMe: A Database and Web-Based Tool for Image Annotation , 2008, International Journal of Computer Vision.

[602]  Robert J. K. Jacob,et al.  Using fNIRS brain sensing to evaluate information visualization interfaces , 2013, CHI.

[603]  Xi Wang,et al.  Modeling Spatial-Temporal Clues in a Hybrid Deep Learning Framework for Video Classification , 2015, ACM Multimedia.

[604]  Weiting Ng,et al.  Clarifying the relation between neuroticism and positive emotions , 2009 .

[605]  Heng Tao Shen,et al.  Hashing for Similarity Search: A Survey , 2014, ArXiv.

[606]  E. Jeannot,et al.  The Development of Situation Awareness Measures in ATM Systems , 2003 .

[607]  Ryan Shea,et al.  Cloud gaming: architecture and performance , 2013, IEEE Network.

[608]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[609]  Kate Saenko,et al.  Improving LSTM-based Video Description with Linguistic Knowledge Mined from Text , 2016, EMNLP.

[610]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[611]  W. Pitts,et al.  A Logical Calculus of the Ideas Immanent in Nervous Activity (1943) , 2021, Ideas That Created the Future.

[612]  Alan Hanjalic,et al.  Affective video content representation and modeling , 2005, IEEE Transactions on Multimedia.

[613]  Jeffrey D. Ullman,et al.  Principles of Database Systems , 1980 .

[614]  Yan Liu,et al.  Latent feature learning in social media network , 2013, ACM Multimedia.

[615]  Ankur Chattopadhyay,et al.  PrivacyCam: a Privacy Preserving Camera Using uCLinux on the Blackfin DSP , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[616]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[617]  Chong-Wah Ngo,et al.  Click-through-based cross-view learning for image search , 2014, SIGIR.

[618]  Antonio Torralba,et al.  Spectral Hashing , 2008, NIPS.

[619]  Junqing Yu,et al.  Optimized residual vector quantization for efficient approximate nearest neighbor search , 2017, Multimedia Systems.

[620]  Shrikanth S. Narayanan,et al.  Toward detecting emotions in spoken dialogs , 2005, IEEE Transactions on Speech and Audio Processing.

[621]  Nicu Sebe,et al.  UX_Mate: from facial expressions to UX evaluation , 2012, DIS '12.

[622]  Guo-Jun Qi,et al.  Differential Recurrent Neural Networks for Action Recognition , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[623]  John McCarthy,et al.  SOME PHILOSOPHICAL PROBLEMS FROM THE STANDPOINT OF ARTI CIAL INTELLIGENCE , 1987 .

[624]  Douglas DeCarlo,et al.  Robust clustering of eye movement recordings for quantification of visual interest , 2004, ETRA.

[625]  Murat Kantarcioglu,et al.  A Cryptographic Approach to Securely Share and Query Genomic Sequences , 2008, IEEE Transactions on Information Technology in Biomedicine.

[626]  Tim Verbelen,et al.  Cloudlets: bringing the cloud to the mobile user , 2012, MCS '12.

[627]  Haroon Idrees,et al.  The THUMOS challenge on action recognition for videos "in the wild" , 2016, Comput. Vis. Image Underst..

[628]  Victor Lempitsky,et al.  The inverted multi-index , 2012, CVPR.

[629]  Chung-Ta King,et al.  Context-aware decision engine for mobile cloud offloading , 2013, 2013 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[630]  Jiebo Luo,et al.  Aesthetics and Emotions in Images , 2011, IEEE Signal Processing Magazine.

[631]  Takeo Kanade,et al.  Neural Network-Based Face Detection , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[632]  Cordelia Schmid,et al.  Learning realistic human actions from movies , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[633]  Qiang Yang,et al.  User demographics prediction based on mobile data , 2013, Pervasive Mob. Comput..

[634]  Mauro Barni,et al.  Implementing the discrete Fourier transform in the encrypted domain , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[635]  Richard M. Stern,et al.  A vector Taylor series approach for environment-independent speech recognition , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[636]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[637]  Antonin Guttman,et al.  R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.

[638]  Scott Sanner,et al.  Expecting to be HIP: Hawkes Intensity Processes for Social Media Popularity , 2016, WWW.

[639]  Guan-Ming Su,et al.  Confidentiality-preserving rank-ordered search , 2007, StorageSS '07.

[640]  Laurent Amsaleg,et al.  Locality sensitive hashing: A comparison of hash function types and querying mechanisms , 2010, Pattern Recognit. Lett..

[641]  O. Kallenberg Foundations of Modern Probability , 2021, Probability Theory and Stochastic Modelling.

[642]  Bhiksha Raj,et al.  The Markov selection model for concurrent speech recognition , 2010, 2010 IEEE International Workshop on Machine Learning for Signal Processing.

[643]  Subramanian Ramanathan,et al.  Multitask Linear Discriminant Analysis for View Invariant Action Recognition , 2014, IEEE Transactions on Image Processing.

[644]  Kazue Sako,et al.  Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.

[645]  Li Lin,et al.  Bringing mobile online games to clouds , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[646]  Jon Barker,et al.  An audio-visual corpus for speech perception and automatic speech recognition. , 2006, The Journal of the Acoustical Society of America.

[647]  Yifan Peng,et al.  Studying Relationships between Human Gaze, Description, and Computer Vision , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[648]  Kristen Grauman,et al.  Kernelized locality-sensitive hashing for scalable image search , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[649]  Bhiksha Raj,et al.  Unsupervised Word Discovery from Phonetic Input Using Nested Pitman-Yor Language Modeling , 2013, ICRA 2013.

[650]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[651]  Ramesh C. Jain,et al.  Situation Recognition from Multimodal Data , 2016, ICMR.

[652]  Shuicheng Yan,et al.  Inferring semantic concepts from community-contributed images and noisy tags , 2009, ACM Multimedia.

[653]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[654]  Peter Bro Miltersen,et al.  On Data Structures and Asymmetric Communication Complexity , 1998, J. Comput. Syst. Sci..

[655]  Chong-Wah Ngo,et al.  Annotation for free: video tagging by mining user search behavior , 2013, ACM Multimedia.

[656]  Vivek K. Singh,et al.  Cooperative phoneotypes: exploring phone-based behavioral markers of cooperation , 2016, UbiComp.

[657]  James Ze Wang,et al.  Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.

[658]  Nalini Venkatasubramanian,et al.  CrowdMAC: A Crowdsourcing System for Mobile Access , 2012, Middleware.

[659]  P. Costa,et al.  Influence of extraversion and neuroticism on subjective well-being: happy and unhappy people. , 1980, Journal of personality and social psychology.

[660]  P. Embrechts,et al.  Multivariate Hawkes processes: an application to financial data , 2011, Journal of Applied Probability.

[661]  Min Wu,et al.  Security analysis for privacy preserving search of multimedia , 2010, 2010 IEEE International Conference on Image Processing.

[662]  Asha Iyer,et al.  Components of bottom-up gaze allocation in natural images , 2005, Vision Research.

[663]  Nicu Sebe,et al.  Self-Adaptive Matrix Completion for Heart Rate Estimation from Face Videos under Realistic Conditions , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[664]  Sergey Ioffe,et al.  Rethinking the Inception Architecture for Computer Vision , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[665]  N. Sebe,et al.  Emotion modulates eye movement patterns and subsequent memory for the gist and details of movie scenes. , 2014, Journal of vision.

[666]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[667]  N. J. A. Sloane,et al.  Voronoi regions of lattices, second moments of polytopes, and quantization , 1982, IEEE Trans. Inf. Theory.

[668]  Chenliang Xu,et al.  A Thousand Frames in Just a Few Words: Lingual Description of Videos through Latent Topics and Sparse Object Stitching , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[669]  Alexandre Bernardino,et al.  Matrix Completion for Multi-label Image Classification , 2011, NIPS.

[670]  Yosihiko Ogata,et al.  On Lewis' simulation method for point processes , 1981, IEEE Trans. Inf. Theory.

[671]  Sung-Soo Kim,et al.  Multi-view Rendering Approach for Cloud-based Gaming Services , 2011 .

[672]  Gerald Friedland,et al.  Tuning-Robust Initialization Methods for Speaker Diarization , 2010, IEEE Transactions on Audio, Speech, and Language Processing.

[673]  George Kollios,et al.  BoostMap: An Embedding Method for Efficient Nearest Neighbor Retrieval , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[674]  P. Brémaud,et al.  STABILITY OF NONLINEAR HAWKES PROCESSES , 1996 .

[675]  Harish Katti,et al.  CAVVA: Computational Affective Video-in-Video Advertising , 2014, IEEE Transactions on Multimedia.

[676]  Bernt Schiele,et al.  Translating Video Content to Natural Language Descriptions , 2013, 2013 IEEE International Conference on Computer Vision.

[677]  Cong Wang,et al.  Enabling Encrypted Cloud Media Center with Secure Deduplication , 2015, AsiaCCS.

[678]  Wei Chen,et al.  Jointly Modeling Deep Video and Compositional Text to Bridge Vision and Language in a Unified Framework , 2015, AAAI.

[679]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[680]  Luc Van Gool,et al.  Temporal Segment Networks: Towards Good Practices for Deep Action Recognition , 2016, ECCV.

[681]  Xi Wang,et al.  Evaluating Two-Stream CNN for Video Classification , 2015, ICMR.

[682]  Tao Mei,et al.  Deep Quantization: Encoding Convolutional Activations with Deep Generative Model , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[683]  J. Rasmussen Bayesian Inference for Hawkes Processes , 2013 .

[684]  Wei Cai,et al.  Toward Gaming as a Service , 2014, IEEE Internet Computing.

[685]  A. Dassios,et al.  A dynamic contagion process , 2011, Advances in Applied Probability.

[686]  Cordelia Schmid,et al.  Product Quantization for Nearest Neighbor Search , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[687]  Yang Guo,et al.  A survey on peer-to-peer video streaming systems , 2008, Peer-to-Peer Netw. Appl..

[688]  Christof Koch,et al.  A Model of Saliency-Based Visual Attention for Rapid Scene Analysis , 2009 .

[689]  Ryan Shea,et al.  Cloud Gaming: Understanding the Support From Advanced Virtualization and Hardware , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[690]  Alex Pentland,et al.  Sensing and modeling human networks using the sociometer , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..

[691]  Wei Cai,et al.  A Survey on Cloud Gaming: Future of Computer Games , 2016, IEEE Access.

[692]  Radu Horaud,et al.  EM Algorithms for Weighted-Data Clustering with Application to Audio-Visual Scene Analysis , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[693]  Vladimir Krylov,et al.  Approximate nearest neighbor algorithm based on navigable small world graphs , 2014, Inf. Syst..

[694]  Yong Man Ro,et al.  Privacy-Preserving Watch List Screening in Video Surveillance System , 2010, PCM.

[695]  Tao Mei,et al.  MSR-VTT: A Large Video Description Dataset for Bridging Video and Language , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[696]  Daniel Gatica-Perez,et al.  Automatic nonverbal analysis of social interaction in small groups: A review , 2009, Image Vis. Comput..

[697]  Bhiksha Raj,et al.  Phoneme-Dependent NMF for Speech Enhancement in Monaural Mixtures , 2011, INTERSPEECH.

[698]  Fei Wang,et al.  Scalable Recommendation with Social Contextual Information , 2014, IEEE Transactions on Knowledge and Data Engineering.

[699]  Nicu Sebe,et al.  Recognizing Emotions from Abstract Paintings Using Non-Linear Matrix Completion , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[700]  Bhiksha Raj,et al.  Privacy-Preserving Speaker Verification and Identification Using Gaussian Mixture Models , 2013, IEEE Transactions on Audio, Speech, and Language Processing.

[701]  Sergios Theodoridis,et al.  Gunshot detection in audio streams from movies by means of dynamic programming and Bayesian networks , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[702]  Cheng-Hsin Hsu,et al.  Measuring the client performance and energy consumption in mobile cloud gaming , 2014, 2014 13th Annual Workshop on Network and Systems Support for Games.

[703]  Mauro Barni,et al.  Efficient linear filtering of encrypted signals via composite representation , 2009, 2009 16th International Conference on Digital Signal Processing.

[704]  Filip De Fruyt,et al.  Linking openness and intellect in childhood and adulthood , 1998 .

[705]  G. Hauske,et al.  Object and scene analysis by saccadic eye-movements: an investigation with higher-order statistics. , 2000, Spatial vision.

[706]  Jean-Marc Menaud,et al.  SLA-Aware Virtual Resource Management for Cloud Infrastructures , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.

[707]  Cheng-Hsin Hsu,et al.  Quantifying User Satisfaction in Mobile Cloud Games , 2014, MoVid@MMSys.

[708]  G. Stenberg,et al.  Personality and the EEG: Arousal and emotional arousability , 1992 .

[709]  Marcel Worring,et al.  Learning Social Tag Relevance by Neighbor Voting , 2009, IEEE Transactions on Multimedia.

[710]  Tara N. Sainath,et al.  Deep Neural Networks for Acoustic Modeling in Speech Recognition: The Shared Views of Four Research Groups , 2012, IEEE Signal Processing Magazine.

[711]  Maja Pantic,et al.  The MAHNOB Laughter database , 2013, Image Vis. Comput..

[712]  Bhiksha Raj,et al.  Speech denoising using nonnegative matrix factorization with priors , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[713]  Andrii Matviienko,et al.  NaviLight: investigating ambient light displays for turn-by-turn navigation in cars , 2016, MobileHCI.

[714]  Cheng-Hsin Hsu,et al.  Cloud gaming onward: research opportunities and outlook , 2014, 2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW).

[715]  Petros Boufounos,et al.  Universal Rate-Efficient Scalar Quantization , 2010, IEEE Transactions on Information Theory.

[716]  Meina Song,et al.  A Cloud Computing Platform Based on P2P , 2009, 2009 IEEE International Symposium on IT in Medicine & Education.

[717]  Ramesh C. Jain,et al.  Situation recognition: an evolving problem for heterogeneous dynamic big multimedia data , 2012, ACM Multimedia.

[718]  Harish Katti,et al.  An Eye Fixation Database for Saliency Detection in Images , 2010, ECCV.

[719]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[720]  Ales Leonardis,et al.  High-Dimensional Feature Matching: Employing the Concept of Meaningful Nearest Neighbors , 2007, 2007 IEEE 11th International Conference on Computer Vision.

[721]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[722]  W. Kastner,et al.  Situation modeling , 2004, IEEE International Workshop on Factory Communication Systems, 2004. Proceedings..

[723]  Yoichi Sato,et al.  Graph-based joint clustering of fixations and visual entities , 2013, TAP.

[724]  Anssi Klapuri,et al.  Query by humming of midi and audio using locality sensitive hashing , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[725]  Kip Smith,et al.  Situation Awareness Is Adaptive, Externally Directed Consciousness , 1995, Hum. Factors.

[726]  T. Taimre,et al.  Hawkes Processes , 2015, 1507.02822.

[727]  Özalp Babaoglu,et al.  Design and implementation of a P2P Cloud system , 2012, SAC '12.

[728]  Christopher Slobogin,et al.  Public Privacy: Camera Surveillance of Public Places AndThe Right to Anonymity , 2003 .

[729]  Cordelia Schmid,et al.  Query adaptative locality sensitive hashing , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[730]  Bernt Schiele,et al.  2D Human Pose Estimation: New Benchmark and State of the Art Analysis , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[731]  David G. Lowe,et al.  Shape indexing using approximate nearest-neighbour search in high-dimensional spaces , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[732]  Tao Mei,et al.  Learning Deep Intrinsic Video Representation by Exploring Temporal Coherence and Graph Structure , 2016, IJCAI.

[733]  Y. Ogata,et al.  Fast likelihood computation of epidemic type aftershock‐sequence model , 1993 .

[734]  Stefano Chessa,et al.  SAIL: A Sensor Abstraction and Integration Layer for Context Awareness , 2008, 2008 34th Euromicro Conference Software Engineering and Advanced Applications.

[735]  Ramesh C. Jain,et al.  Social pixels: genesis and evaluation , 2010, ACM Multimedia.

[736]  Pong C. Yuen,et al.  Automatic Acquisition of Context Models and its Application to Video Surveillance , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[737]  Laurent Amsaleg,et al.  NV-Tree: An Efficient Disk-Based Index for Approximate Search in Very Large High-Dimensional Collections , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[738]  Yann LeCun,et al.  Regularization of Neural Networks using DropConnect , 2013, ICML.

[739]  Lin Sun,et al.  Human Action Recognition Using Factorized Spatio-Temporal Convolutional Networks , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[740]  Jaideep Srivastava,et al.  Social Multimedia Computing , 2010, Computer.

[741]  Luc Van Gool,et al.  Privacy in video surveilled spaces , 2008, J. Comput. Secur..

[742]  A. Baddeley,et al.  Practical Maximum Pseudolikelihood for Spatial Point Patterns , 1998, Advances in Applied Probability.

[743]  Subramanian Ramanathan,et al.  No Matter Where You Are: Flexible Graph-Guided Multi-task Learning for Multi-view Head Pose Classification under Target Motion , 2013, 2013 IEEE International Conference on Computer Vision.

[744]  Luis F. G. Sarmenta,et al.  Volunteer Computing , 1996 .

[745]  David G. Lowe,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.

[746]  Winston H. Hsu,et al.  Real-time privacy-preserving moving object detection in the cloud , 2013, ACM Multimedia.

[747]  D. Harville Matrix Algebra From a Statistician's Perspective , 1998 .

[748]  Shih-Fu Chang,et al.  Consumer video understanding: a benchmark database and an evaluation of human and machine performance , 2011, ICMR.

[749]  Feng Qiu,et al.  Automatic identification of user interest for personalized search , 2006, WWW '06.

[750]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[751]  Arjen P. de Vries,et al.  Obtaining High-Quality Relevance Judgments Using Crowdsourcing , 2012, IEEE Internet Computing.

[752]  Chong-Wah Ngo,et al.  Towards textually describing complex video contents with audio-visual concept classifiers , 2011, ACM Multimedia.