IEEE MMTC R-Letter - IEEE Communications Society

2y ago
4 Views
2 Downloads
549.69 KB
21 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Ellie Forte
Transcription

IEEE COMSOC MMTC R-LetterMULTIMEDIA COMMUNICATIONS TECHNICAL COMMITTEEIEEE COMMUNICATIONS . 4, No. 5, October 2013CONTENTSMessage from the Review Board . 2Design and Analysis of Simple Mechanisms to Achieve Attack Prevention forSpectrum Sensing in Cognitive Radio Networks . 4A short review for “Attack Prevention for Collaborative Spectrum Sensing inCognitive Radio Networks” . 4Analysis of Mobility Impact on the Throughput Performance and MAC Design ofEnhancement Schemes in Drive-Thru Internet . 6A short review for “ MAC in Motion: Impact of Mobility on the MAC of Drive-ThruInternet” . 6Improving the Video Conferencing QoE using the Cloud . 8A short review for “Airlift: Video Conferencing as a Cloud Service using InterDatacenter Networks” . 8Exploiting Cloud Images for Compression. 10A short review for “Cloud-Based Image Coding for Mobile Devices – TowardThousands to One Compression”. 10How to Realize the Blind Scheduling for Practical Mobile Media Cloud . 12A short review for “Exploring Blind Online Scheduling for Mobile Cloud MultimediaServices” . 12Estimating the Density of a Crowd using Computer Vision . 14A short review for “Crowd density analysis using Subspace Learning on Local BinaryPattern” . 14Optimal View Rectangle Learning in Photography from Human Aesthetics . 16A short review for “Learning to photograph: a compositional perspective” . 16Distributed Image Representation with Compressed Linear Measurements . 18A short review for “Distributed Representation of Geometrically Correlated Imageswith Compressed Linear Measurements” . 18Paper Nomination Policy . 20MMTC R-Letter Editorial Board. 21Multimedia Communications Technical Committee (MMTC) Officers . 21http://committees.comsoc.org/mmc1/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-LetterMessage from the Review BoardIntroduction – Call for NominationsThe Review Board thanks the WirelessTechnology in Multimedia CommunicationsInterest Group (WTIG) for the two edited articlesin addition to their nominations in this Octoberissue. We also received nominations from GreenMultimedia Technology Interest Group (GMTIG)and their articles will be included in theDecember issue.Regular CategoryThe term cloud and its associated technologicalconcepts are becoming more and more importantfor multimedia communication services. Hence,some papers of the regular category arededicated to this topic.We would like to invite MMTC members toparticipate in the nomination process, which isopen at all time. High quality publicationsdeserve recommendation for reading. Simplyemail the Review Board directors the paper title,authors, publication venue, brief summary andmajor contribution of the paper, as well as anelectronic copy of the paper when possible. Ifaccepted as a R-letter, the nominator will beacknowledged and invited to be the guest editor.The annual MMTC best paper awards will beselected from eligible papers recommended inthe R-letter.The first paper, published in the IEEEInternational Conference on Network Protocols,proposes the usage of cloud infrastructure(computational resources and high-speed interconnections) to improve the Quality ofExperience (QoE) of video conferencingapplications. The second paper, from IEEETransactions on Multimedia, suggests exploitingimages in the cloud to increase compressionefficiency by adopting image feature descriptorsin order to reconstruct images from thoseavailable in the cloud. In the third paper,published in IEEE Wireless Communications, theauthors provide a scheduling algorithm formobile cloud environments.The Review Board aims at recommending recent(within one and half year) state-of-the-art andemerging topics. The topics, either practical ortheoretical, should be of general interest for theMMTC community.Other R-Letters in this issue are related to crowddensity estimations, learning the optimal viewrectangle from aesthetics of images, and findingan efficient distributed representation forcorrelated images.Distinguished CategoryPublicly available information communicationchannels benefit society but can also causesecurity concern. In this issue, the first article,published in IEEE ISAC, investigates how toeffectively prevent attackers for collaborativespectrum sensing in cognitive radio network andintroduces a collision penalty to protect theprimary users. The second article, published inIEEE Transactions on Mobile Computing,discusses how to provide Internet access to roadtravelers (drive-thru Internet) and proposesenhancement schemes to achieve The fourth paper is a paper from InternationalWorkshop on Advances in AutomatedMultimedia Surveillance for Public Safety,collocated with ICME 2013, and proposes meansto estimate the density of a crowd usingcomputer vision techniques. The fifth paper,published in IEEE Transactions on Multimedia,is about optimal view rectangular learning inphotography from human aesthetics, which, ifperformance can be optimized, is a candidatetechnology to be integrated into the autofocusing module of modern digital cameras.Finally, the sixth paper, published in the IEEETransactions on Image Processing, proposes adistributed representation of geometricallycorrelated images with compressed linearmeasurements.2/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-LetterWe would like to thank all the authors,nominators, reviewers, editors, and others whocontribute to the release of this issue.IEEE ComSoc MMTC R-LetterDirector:Irene Cheng, University of Alberta, CanadaEmail: locheng@ualberta.caEmail: maxzhang@research.att.comCo-Director:Christian TimmererAlpen-Adria-Universität Klagenfurt, AustriaEmail: christian.timmerer@itec.aau.atCo-Director:Weiyi Zhang, AT&T Research, USAhttp://committees.comsoc.org/mmc3/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-LetterDesign and Analysis of Simple Mechanisms to Achieve Attack Prevention for SpectrumSensing in Cognitive Radio NetworksA short review for “Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks”Edited by Fen HouL. Duan, A. W. Min, J. Huang, and K. G. Shin, “Attack Prevention for CollaborativeSpectrum Sensing in Cognitive Radio Networks”, IEEE Journal on Selected Areas inCommunications, vol. 30, no. , pp. 1658-1665, Oct. 2012.As a promising way to solve the spectrum scarcityand low spectrum utilization, cognitive radio networkhas been widely studied [1][2]. In order to achieveno-harmful interference on primary users, theefficient spectrum sensing plays a critical role.Collaborative spectrum sensing has been widely usedto improve the accuracy of the sensing result forsecondary networks. By exploiting the locationdiversity of different secondary users, thecollaborative sensing can achieve a better detectionperformance [3]. However, collaborative sensing isvulnerable to falsification attacks, in which attackersmay report distorted sensing results in order tomanipulate the sensing detection result [4]. Themalicious behavior of attackers will result in a wasteof spectrum opportunity, interference on the primaryusers, and unfairness to honest secondary users.Therefore, how to prevent attacks for collaborativespectrum sensing in cognitive radio networks is avery challenging and critical issue.center to identify and exclude attackers, which makethe mechanism simple and easy to implement.This paper also investigates the impacts of attackprevention mechanism on the behavior of cooperativeattackers. First, the paper analyzes the behavior ofcooperative attackers when the system lacks attackprevention mechanisms.The authors discussaggregate reward achieved by the attackers andhonest users in different cases: (1) all SUs sense thechannel idle; (2) all honest SUs sense the channel idle,but some attackers sense the channel busy; (3) somehonest SUs sense the channel busy. The resultswithout attack-prevention mechanisms can be used ascomparison and benchmark for the proposed attackprevention mechanisms.Then, the paper proposes and analyzes two attackprevention mechanisms. In the direct punishmentmechanism, the fusion center can directly charge apunishment to the SUs when attacks are identified. Inthe indirect punishment mechanism, the fusion centerterminates the collaborative sensing once it detects anattack. Without collaborative sensing, the attackerscannot overhear honest SUs’ sensing reports, whichwill result in an increase in attackers’ misseddetection probability.Therefore, the indirectpunishment of terminating the collaborative sensingcan reduce the attackers’ motivation to attack. Withthis innovative idea, the proposed indirect punishmentmechanism can effectively prevent the “say-withattacks” when the attackers care enough about theirfuture utilities. A punishment threshold to prevent allattack scenarios is proposed and provided in the directpunishment mechanism. The analysis result showsthat the threshold is a function of the numbers ofhonest SUs and attackers.For the indirectpunishment mechanism, the authors formulate theattack prevention problem in the long-term “staywith-attacks” scenario as a Markov decision process.Then, the paper discusses and analyzes several cases:aggressive transmission, non-aggressive transmission,weak cooperation, and strong cooperation. Finally,the paper discusses the impact of network size andcollision penalty on the proposed mechanism.This paper focuses on the prevention of sensing datafalsification attacks in cognitive radio networks,where multiple attackers cooperatively maximizetheir aggregate utilization by manipulating the resultsof the sensing decision.In this paper, the authors first describe the spectrumsensing and opportunistic access model. A timeslotted channel access model is used for secondaryusers to opportunistically access the channel.Meanwhile, direct punishment and collision penaltyare introduced to protect the privilege of primaryusers. A simple OR-rule is adopted in the paper asthe decision fusion rule.Based on the time-slotted channel access model, thepaper presents a comprehensive study on the attackprevention for collaborative spectrum in cognitiveratio networks. It considers two different ck”,andproposes two attack-prevention mechanisms: thedirect punishment scheme and the indirectpunishment scheme. Unlike the previous work, theproposed mechanisms do not require the decisionhttp://committees.comsoc.org/mmc4/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-LetterIn summary, the paper proposes two mechanisms toprevent the attacks for collaborative spectrum sensingin cognitive radio network. The detail and completeanalysis shows that the direct punishment mechanismcan effectively prevent all attacks in both “attack-andrun” and “stay-with-attacks,” and the indirectpunishment mechanism can prevent all attacks in thelong-run as long as the attackers care about theirfuture rewards.Fen Hou is an assistant professor in the Departmentof Electrical and Computer Engineering at theUniversity of Macau since2013. Dr. Fen Hou receivedthe Ph.D. degree in electricaland computer engineeringfrom the University ofWaterloo, Canada, in 2008.Sheworkedasapostdoctoral fellow in theElectrical and ComputerEngineeringattheUniversity of Waterloo andin the Department of Information Engineering at theChinese University of Hong Kong from 2008 to 2009and from 2009 to 2011, respectively. She worked as alecture at the Macao Polytechnic Institute from 2011to 2012. Her research interests include resourceallocation and scheduling in broadband wirelessnetworks, protocol design and QoS provisioning incognitive radio network, and mechanism design inparticipatory sensor networks. Dr. Hou is therecipient of IEEE GLOBECOM Best Paper Award in2010, as well as the Distinguished Service Award inIEEEComSocMultimediaCommunicationsTechnical Committee (MMTC) in 2011.Acknowledgement:This paper is nominated by the MMTC WirelessTechnology for Multimedia Communications(WTMC) Interest Group.References:[1] S. Haykin, “Cooperative radio: Brain-empoweredwireless communications,” IEEE Journal onSelected Areas on Communications, vol. 23, no.2, pp. 201-220, 2005.[2] I. F. Akyildiz, W. Lee, M. C. Vuran, and S.Mohanty, “NeXt generation/dynamic spectrumaccess/cognitive radio wireless networks: asurvey,” Computer Networks, vol. 50, no. 13, pp.2127-2159, 2006.[3] K. B. Letaief and W. Zhang, “Cooperativecommunications for cognitive radio networks,”Proc. IEEE, vol. 97, no. 5, pp. 878-893, 2009.[4] H. Li and Z. Han, “Catch me if you can: anabnormiality detection approach for collaborativespectrum sensing in cognitive radio networks,”IEEE Trans. Wireless Commun., vol. 9, no. 11,pp. 1554-3565, 2010.http://committees.comsoc.org/mmcDr. Hou has served as the chair of an Interest Groupin IEEE MMTC, as well as a technical programcommittee member for IEEE WiOpt 2012, IEEE ICC2011, IEEE WCNC 2011, IEEE GLOBECOM 2010,etc. Dr. Hou has also served as a technical reviewerfor IEEE Transactions on Wireless Communications,IEEE Transactions on Vehicular Technology, IEEEJournal on Selected Areas in Communications, IEEEINFOCOM, etc.5/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-LetterAnalysis of Mobility Impact on the Throughput Performance and MACDesign of Enhancement Schemes in Drive-Thru InternetA short review for “ MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet”Edited by Bin LinH. Luan, X. Ling, and X. (Sherman) Shen,, “ in Motion: Impact of Mobility on the MACof Drive-Thru Internet ”, IEEE Transactions on mobile computing, vol. 11, no. 2,pp.305319, Feb. 2012.The demand of high-rate Internet access fromvehicles is ever-increasing due to the fact thatpeople are spending more and more time in theirvehicles currently. However, traditional cellular orsatellite wireless communications can only providelimited available data rate which is far from enoughto deliver the media-rich Internet contents. Drivenby this, the plethora IEEE 802.11b access pointsAPs have been deployed in cities so as to addressthe issue of high-rate cheap Internet access fromvehicles [1][2].802.11 DCF in the newly emerged vehicularenvironment, instead of proposing new MACschemes [4] [5]. The consideration is more practicalfor the plethora IEEE 802.11b APs deploymentsituation.In this paper, the authors contributed at bothperformance evaluation and protocol enhancement.For performance evaluation, the authors provide atheoretical treatment based on a Markov chainmodel which incorporates the mobility of vehiclesin the analysis of DCF. The developed model isaccurate and scalable. It can investigate thethroughput performance under different velocitiesand network scales. The results have shown thatdue to the mobility, the network size of the drivethru Internet is solely dependent on the nodevelocity, which can be applied to optimallyconfigure the DCF by knowing the node velocityonly.Although related performance studies in IEEE802.11 has been well investigated previously, theperformance of IEEE 802.11 in the high-speedlarge-scale drive-thru Internet scenario is still notclear and very challenging. The reasons are twofold. One is that the drive-thru Internet is typicallya much larger network composed of tens orhundreds of users, compared with the small-scaleindoor scenarios. The other is that the IEEE 802.11was originally designed for low-mobility scenarios[3]. Thus, the IEEE 802.11 adopts the contentionbased distributed coordination function (DCF) as itsMAC. In the case of drive-thru Internet, as vehicleshave volatile connectivity due to the fast mobility,whether DCF can fully utilize the cherished accesstime of users and provide them the guaranteedthroughput is questionable.For the protocol enhancement, which is based onthe developed model, the authors propose to furtherenhance the MAC throughput by adaptivelyadjusting the MAC in tune with the node mobility.In particular, the authors propose three assertions asthe guidelines of the DCF design in the highlymobile vehicular environment, and describe theoptimal schemes to determine the channel accessopportunity to fully utilize the transientconnectivity of vehicles. Simulations results haveshown the effectiveness of the scheme to mitigatethe impacts of mobility.To address these issues, the key questions facingthe authors are: how the performance of DCF is inthe high-speed large-scale drive-thru Internet; inwhat fashion the mobility affects the MACthroughput and, more importantly, how to remedythat?In summary, the paper focuses on the DCFperformance by considering high-node mobilities.A systematic and theoretical model is firstdeveloped based on the Markov model to analysisthe quantified impact of mobility (characterized bythe node velocity and moving direction) on theresultant system throughput. Then, protocolenhancement scheme is discussed as the guidelineof the selection of CWmin in different zones to boostthe performance of DCF by accommodating theCompared with reported research, the novelty andchallenge of this paper are that the authors providean elaborate MAC analysis of DCF performance bytaking high-node mobility into account, and modelthe specific DCF in detail, especially, the quantifiedimpacts of mobility on the MAC throughput areshown. In addition, the authors target to proposeenhancement schemes based on the legacy IEEEhttp://committees.comsoc.org/mmc6/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-Letterhigh mobility of nodes. Following this researchdirection, future work includes the extension ofthis framework to evaluate the QoS performancefor multimedia applications and the QoS provisionschemes in the high-speed drive-thru Internetscenario.Acknowledgement:This paper is nominated by the MMTC WirelessTechnology for Multimedia Communications(WTMC) Interest Group.References:[5] J. Ott and D. Kutscher, “Drive-ThruInternet: IEEE 802.11b for ‘Automobile’Users,” Proc. IEEE INFOCOM, 2004.[6] V. Bychkovsky, B. Hull, A. Miu, H.Balakrishnan,andS.Madden,“AMeasurement Study of Vehicular InternetAccess Using in SituWi-Fi Networks,”Proc. ACM MobiCom, 2006.[7] L.X. Cai, X. Shen, J.W. Mark, L. Cai, andY. Xiao, “Voice Capacity Analysis ofWLAN with Unbalanced Traffic,” IEEETrans. Vehicular Technology, vol. 55, no. 3,pp. 752-761, May 2006.[8] J. Zhang, Q. Zhang, and W. Jia, “VC-MAC:A Cooperative MAC Protocol in , vol. 58, no. 3, pp. 1561-1571,Mar. 2009.[9] B. Sikdar, “Characterization and Abatementof the Reassociation Overhead in Vehicle toRoadside Networks,” IEEE Trans. Comm.,vol. 58, no. 11, pp. 3296-3304, Nov. 2010.of Electrical and Computer Engineering,University of Waterloo. She has participated andhas been the principle investigator of severalnational and ministry level grants, notably theNational Natural Science Foundation of China(NFSC), the Scientific Research Foundation forthe Returned Overseas Chinese Scholars fromState Education Ministry and Ministry of HumanResources and Social Security, ChinaPostdoctoral Science Foundation, Start-upResearch Fund of Liaoning Province, andFundamental Research Funds for the CentralUniversities in China. Her research tical network integration, networkoptimization and dimensioning, locationproblems, resource allocation, algorithm design,and artificial intelligence.Bin Lin is an AssociateProfessorwiththeDepartmentofInformation Science andTechnology,DalianMaritimeUniversity,Dalian, Liaoning, China.She had received the B.Sc.degreeincomputercommunications and the M.Sc. degree incomputer science from Dalian MaritimeUniversity in 1999 and 2003, respectively, andthe Ph.D. degree in electrical and computerengineering from the University of Waterloo,Waterloo, ON, Canada, in 2009. In 2009, sheheld a postdoctoral position with the 4, No.5, October 2013

IEEE COMSOC MMTC R-LetterImproving the Video Conferencing QoE using the CloudA short review for “Airlift: Video Conferencing as a Cloud Service using Inter-Datacenter Networks”Edited by Jiang ZhuY. Feng, B. Li, and B. Li, “Airlift: Video Conferencing as a Cloud Service using InterDatacenter Networks”, in Proceedings of the 2012 IEEE International Conference onNetwork Protocols (ICNP12), pp. 1-11, 2012.Our way of communication has been fundamentallychanged with the introduction of the Internet, byusing emails, tweets, VoIP, and now videoconferencing. Existing video conferencing serviceslike Skype [1], Google Hangout [2], and iChat [3]have attracted millions of users. Video conferencing,specifically multi-party video conferencing, requireshigh bitrates and low-delay voice/video transmission.With todays' network infrastructure, it is still ing services to consumers through the besteffort Internet.Existing solutions in the literature have traditionallyfocused on the use of peer-to-peer (P2P) [4,5,7] orsimple client-server architectures (e.g., MicrosoftLync). In order to maximize the video bitrate from asingle source to the remaining participants in a videoconferencing application, Steiner tree packing can beemployed for video multicast. However, the problemis NP-complete and, thus, only depth-1 and depth-2trees are generally considered to reduce complexity[4,5]. Another approach is to use intra-sessionnetwork coding as advocated in this paper. With thehelp of network coding, it is possible to formulate theproblem of maximizing the total throughput across allsessions as a linear program, which is easily solvableusing a standard LP solver.A new trend for multi-party video conferencing isoffering it as a cloud-based service. The more popularones, for example, Google and Skype, rely on proxyservers residing inside datacenters that will relay thevideo flows to all other users in the conference [6].The proposed Airlift also takes advantage of thecomputational power of the datacenters as well as thehigh-capacity inter-datacenternetwork.Eachdatacenter is responsible for aggregating incomingvideo flows from users attaching to it, and forwardingthem to the other datacenter, eventually reachingother participants. With such aggregation, the numberof video flows traversing the network is naturallyminimized, without the complexity of tree packingand flow scheduling.http://committees.comsoc.org/mmcThere are a number of important objectives whendesigning a new protocol for multi-party videoconferencing. The first one is performance. It is in theusers' best interest, if the system can provide highervideo bitrates while still maintaining an acceptableend-to-end delay. From the service point of view, thesystem should be simple, and work as a full-servicebroker inside the datacenter. Last but not the least, thesystem should be scalable. In other words, it shouldbe able to handle thousands of flows on one interdatacenter link.With these considerations in mind, the authorsdesigned the Airlift protocol as follows. First, a LPproblem is solved to obtain conceptual flow rates oneach inter-datacenter link with delay bound. Thesolution provides the complete plan to start actualpacket transmission. It is non-trivial to realize thecomplete plan, simply due to the bandwidth overheadand additional decoding delay. The authors proposedto decouple generation (n packets unit) from slidingwindow, so that coded packets are generated within asmall generation (low decoding delay), while asliding window represents all the packets that havebeen sent but not yet acknowledged by the destination.By doing this, the link utilization can be maintainedas high as possible. The final step will be realizingconceptual flows by replicating, splitting, andmerging depending on cases. It is also worth to noticethat each session can be weighted by some factor toachieve basic fairness across participants when theirvideo sources share the bottleneck link.The implementation of Airlift is evaluated withPlanetLab and Amazon EC2 datacenters, where abroker is running as a VM executing network coding,packet processing, and forwarding. A centraloptimizer periodically collects network statistics fromall brokers and refactors the system operation.Experimental results show substantial performanceadvantage over the Celerity [4] system with up to 24xthroughput gain with similar end-to-end delay.8/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-LetterThis work is uniquely positioned for high data rateand delay stringent applications with practicalnetwork coding implementation. It does not onlyprovide a promising application layer protocol forhigh quality multi-party video conferencing, but canalso inspire others in the research areas of networkcoding, mobile cloud services, and multimediaadaptations.[16] M. Ponec, S. Sengupta, M. Chen, J. Li and P.Chou,“Multi-ratePeer-to-PeerVideoConferencing: A Distributed Approach usingScalable Coding”, in Proc. IEEE ICME, 2009Jiang Zhu is a seniortechnical leader in EnterpriseNetworking Labs at CiscoSystems, Inc. He has over 15years of industrial experiencebuilding networked systemsranging from embeddeddevices to large-scale mediasystems. His research focuseson adaptive content networking, large-scale datasystems, software defined networking (SDN), cloudservice orchestrations and applications of data miningand machine learning in these fields. He got hisdoctoral degree from Carnegie Mellon Universitywith thesis topic on machine learning and data miningof mobile user behavioral analysis. He also did hisdoctoral study on focusing on SDN and OpenFlow inHigh Performance Networking Group at StanfordUniversity. He also received his M.S. degrees inElectrical Engineering and in Management Science &Engineering from Stanford University. BeforeStanford, he obtained his B.Eng in Automation fromTsinghua University.References:[10] Skype, http://www.skype.com/.[11] Google , https://plus.google.com/.[12] hat.[13] X. Chen, M. Chen, B. Li, Y. Zhao, Y. Wu and J.Li, “Celerity: A Low-Delay Multi-PartyConferencing Solution,” in Proc. ACMMultimedia, pp. 493-502, 2011.[14] C. Liang, M. Zhao and Y. Liu, “OptimalBandwidth Sharing in Multiswarm MultipartyP2P Video Conferencing system,” IEEE/ACMtrans. Networking, vol. 19, no. 6, pp. 1704–1716,Aug. 1996.[15] Y. Xu, C. Yu, J. Li and Y. Liu, “VideoTelephony for End-consumers: Measurementstudy of Google , iChat and Skype,” in Proc.ACM Internet Measurement Conference, pp.371–384, 2012.http://committees.comsoc.org/mmc9/21Vol.4, No.5, October 2013

IEEE COMSOC MMTC R-LetterExploiting Cloud Images for CompressionA short review for “Cloud-Based Image Coding for Mobile Devices – Toward Thousands to One Compression”Edited by Carl James DebonoH. Yue, X. Sun, J. Yang, and F. Wu, “Cloud-Based Image Coding for Mobile Devices –Toward Thousands to One Compression,” IEEE Transactions on Multimedia, vol. 15, no.4, pp. 845-857, June 2013.It is becoming customary to place images on thecloud which has become a huge repository for suchdata. The emergence of cloud images has poseddemands for the development and implementation ofcontent-based image retrieval. Furthermore, this isfacilitating advances, amongst others, on imagecompletion, object recognition, content annotation,and scene modeling. An open question tackled bythis paper is how to exploit cloud images for imagecompression. High compression of images isdesirable for both storage and transmission of thisdata, especially in memory-limited devices andbandwidth-limited networks.The biggest challenge when dealing with cloud-basedimage compression comes from the indefiniteness ofcloud images. Existing compression techniques, suchas those based on prediction and transforms, requirefixed correlated images to compress an image. Thesecorrelated images have to remain unaltered andcannot be deleted once they have been used asreference in compression. However, this requirementis very difficult to guarantee in clouds as the imagescan be changing frequently. New images arebecoming available while others in the cloud can bemodified or deleted in very short periods of time.The authors of this paper propose a method of cloudbased image coding that is different from the methodsthat are currently in use for image coding. Rather thancompressing images in a pixel-by-pixel fashion, thisalgorithm tries to provide a description of the imagesand reconstructs them from available cloud images byexploiting these descriptors. They first utilize theScale-Invariant Feature Transform (SIFT) descriptors[1] to characterize the local features available in animage. Previous work, such as [2] and [3], has

This paper is nominated by the MMTC Wireless Technology for Multimedia Communications (WTMC) Interest Group. References: [1] S. Haykin, “Cooperative radio: Brain-empowered wireless communications,” IEEE Journal on Selected Areas on Communications, vol. 23, no. 2, pp. 201-220, 2005.

Related Documents:

NOTICE INVITING TENDER FOR MAINTENANCE OF 62.5 KVA DG SET AND MISC. ELECTRICAL JOBS AT MMTC BHAWAN NIT No MMTC/VIZAG/ADMN/DG SET/2020-21 19th Mar 2021 MMTC Limited (A Govt. of India Enterprise), Regional Office at MMTC Bhawan, Port Area, Visakhapatnam, 530035, India, hereinafter called “MMTC” invites sealed bids in two bids system from .

largest electric utility, American Electric Power (AEP). GM’s products emitted 99 MMTc, and Ford’s emitted 80 MMTc, nearly twice AEP’s 41 MMTc. DaimlerChrysler’s cars and light trucks in use emitted 51 MMTc.The total CO 2 emissions from Big Three auto-mobiles in 2004 was comparable to the total from the top 11 electric companies.

Letter 1 Letter 2 Letter 3 Letter 4 . Letter 5 Letter 6 Letter 7 Letter 8 Letter 9 Letter 10 Letter 11 Letter 12 Letter 13 Letter 14 Letter 15 Letter 16 Letter 17 . the intellect for the attainment of the divine union of love. Proofs from passages and figures of Sacred Scripture. Chapter 10: A division of all apprehensions and ideas

IEEE 3 Park Avenue New York, NY 10016-5997 USA 28 December 2012 IEEE Power and Energy Society IEEE Std 81 -2012 (Revision of IEEE Std 81-1983) Authorized licensed use limited to: Australian National University. Downloaded on July 27,2018 at 14:57:43 UTC from IEEE Xplore. Restrictions apply.File Size: 2MBPage Count: 86Explore furtherIEEE 81-2012 - IEEE Guide for Measuring Earth Resistivity .standards.ieee.org81-2012 - IEEE Guide for Measuring Earth Resistivity .ieeexplore.ieee.orgAn Overview Of The IEEE Standard 81 Fall-Of-Potential .www.agiusa.com(PDF) IEEE Std 80-2000 IEEE Guide for Safety in AC .www.academia.eduTesting and Evaluation of Grounding . - IEEE Web Hostingwww.ewh.ieee.orgRecommended to you b

3. Massive Machine-Type Communications (mMTC) The goal of mMTC is to create an environment where a million homes and industrial IoT devices within 1 km2 can be connected. mMTC aims to meet the demands of a highly developed digital socie

Standards IEEE 802.1D-2004 for Spanning Tree Protocol IEEE 802.1p for Class of Service IEEE 802.1Q for VLAN Tagging IEEE 802.1s for Multiple Spanning Tree Protocol IEEE 802.1w for Rapid Spanning Tree Protocol IEEE 802.1X for authentication IEEE 802.3 for 10BaseT IEEE 802.3ab for 1000BaseT(X) IEEE 802.3ad for Port Trunk with LACP IEEE 802.3u for .

Signal Processing, IEEE Transactions on IEEE Trans. Signal Process. IEEE Trans. Acoust., Speech, Signal Process.*(1975-1990) IEEE Trans. Audio Electroacoust.* (until 1974) Smart Grid, IEEE Transactions on IEEE Trans. Smart Grid Software Engineering, IEEE Transactions on IEEE Trans. Softw. Eng.

Certification Review The Certified Person holds a gas interconnector licence granted under section 7ZA of the Gas Act and is a person required to be certified as independent under section 8C of the Gas Act. On 21 May 2013, the Authority certified the Certified Person as independent, under two grounds: To: Interconnector (IUK) Limited Cc: European Commission, DECC, other interested stakeholders .