Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Databases and Information Systems

Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang Nov 2006

Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang

Computer Science Faculty Publications

Previous analytical results on the resilience of unstructured P2P systems have not explicitly modeled heterogeneity of user churn (i.e., difference in online behavior) or the impact of in-degree on system resilience. To overcome these limitations, we introduce a generic model of heterogeneous user churn, derive the distribution of the various metrics observed in prior experimental studies (e.g., lifetime distribution of joining users, joint distribution of session time of alive peers, and residual lifetime of a randomly selected user), derive several closed-form results on the transient behavior of in-degree, and eventually obtain the joint in/out degree isolation probability as a simple …


Fast Tracking Of Near-Duplicate Keyframes In Broadcast Domain With Transitivity Propagation, Chong-Wah Ngo, Wan-Lei Zhao, Yu-Gang Jiang Oct 2006

Fast Tracking Of Near-Duplicate Keyframes In Broadcast Domain With Transitivity Propagation, Chong-Wah Ngo, Wan-Lei Zhao, Yu-Gang Jiang

Research Collection School Of Computing and Information Systems

The identification of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this paper, we propose a novel approach for the discovery and tracking of NDK pairs and threads in the broadcast domain. The detection of NDKs in a large data set is a challenging task due to the fact that when the data set increases linearly, the computational cost increases in a quadratic speed, and so does the number of false alarms. This paper explores the symmetric and transitive nature of near-duplicate for the effective …


Discovering Image-Text Associations For Cross-Media Web Information Fusion, Tao Jiang, Ah-Hwee Tan Sep 2006

Discovering Image-Text Associations For Cross-Media Web Information Fusion, Tao Jiang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

The diverse and distributed nature of the information published on the World Wide Web has made it difficult to collate and track information related to specific topics. Whereas most existing work on web information fusion has focused on multiple document summarization, this paper presents a novel approach for discovering associations between images and text segments, which subsequently can be used to support cross-media web content summarization. Specifically, we employ a similarity-based multilingual retrieval model and adopt a vague transformation technique for measuring the information similarity between visual features and textual features. The experimental results on a terrorist domain document set …


Hierarchical Hidden Markov Model For Rushes Structuring And Indexing, Chong-Wah Ngo, Zailiang Pan, Xiaoyong Wei Jul 2006

Hierarchical Hidden Markov Model For Rushes Structuring And Indexing, Chong-Wah Ngo, Zailiang Pan, Xiaoyong Wei

Research Collection School Of Computing and Information Systems

Rushes footage are considered as cheap gold mine with the potential for reuse in broadcasting and filmmaking industries. However, it is difficult to mine the "gold" from the rushes since usually only minimum metadata is available. This paper focuses on the structuring and indexing of the rushes to facilitate mining and retrieval of "gold". We present a new approach for rushes structuring and indexing based on motion feature. We model the problem by a two-level Hierarchical Hidden Markov Model (HHMM). The HHMM, on one hand, represents the semantic concepts in its higher level to provide simultaneous structuring and indexing, on …


Prediction-Based Gesture Detection In Lecture Videos By Combining Visual, Speech And Electronic Slides, Feng Wang, Chong-Wah Ngo, Ting-Chuen Pong Jul 2006

Prediction-Based Gesture Detection In Lecture Videos By Combining Visual, Speech And Electronic Slides, Feng Wang, Chong-Wah Ngo, Ting-Chuen Pong

Research Collection School Of Computing and Information Systems

This paper presents an efficient algorithm for gesture detection in lecture videos by combining visual, speech and electronic slides. Besides accuracy, response time is also considered to cope with the efficiency requirements of real-time applications. Candidate gestures are first detected by visual cue. Then we modifity HMM models for complete gestures to predict and recognize incomplete gestures before the whole gestures paths are observed. Gesture recognition is used to verify the results of gesture detection. The relations between visual, speech and slides are analyzed. The correspondence between speech and gesture is employed to improve the accuracy and the responsiveness of …


Keyframe Retrieval By Keypoints: Can Point-To-Point Matching Help?, Wanlei Zhao, Yu-Gang Jiang, Chong-Wah Ngo Jul 2006

Keyframe Retrieval By Keypoints: Can Point-To-Point Matching Help?, Wanlei Zhao, Yu-Gang Jiang, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Bag-of-words representation with visual keypoints has recently emerged as an attractive approach for video search. In this paper, we study the degree of improvement when point-to-point (P2P) constraint is imposed on the bag-of-words. We conduct investigation on two tasks: near-duplicate keyframe (NDK) retrieval, and high-level concept classification, covering parts of TRECVID 2003 and 2005 datasets. In P2P matching, we propose a one-to-one symmetric keypoint matching strategy to diminish the noise effect during keyframe comparison. In addition, a new multi-dimensional index structure is proposed to speed up the matching process with keypoint filtering. Through experiments, we demonstrate that P2P constraint can …


Student Interactive Campus Map At Marshall University, Edward Aractingi, Jamie Wolfe Jun 2006

Student Interactive Campus Map At Marshall University, Edward Aractingi, Jamie Wolfe

IT Research

Marshall University is a state-funded university in Huntington, West Virginia. Like many universities, it is a large organization with multiple and diverse units (colleges, departments, centers, etc.) and depends on data to run efficiently. Much of this data is used by multiple entities. To better manage the needed data collected by the university, the Marshall University Geographic Information System (MUGIS) has been developed. MUGIS will address several needs of Marshall University’s principal stakeholders. Stakeholders include the university administration, faculty, and students. One of the first applications developed for MUGIS was an interactive campus map. This Web-based application is intended to …


Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan Jun 2006

Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan

Computer Science Faculty Publications

Web site interfaces are a particularly good fit for hierarchies in the broadest sense of that idea, i.e. a classification with multiple attributes, not necessarily a tree structure. Several adaptive interface designs are emerging that support flexible navigation orders, exposing and exploring dependencies, and procedural information-seeking tasks. This paper provides a context and vocabulary for thinking about hierarchical Web sites and their design. The paper identifies three features that interface to information hierarchies. These are flexible navigation orders, the ability to expose and explore dependencies, and support for procedural tasks. A few examples of these features are also provided


Clip-Based Similarity Measure For Query-Dependent Clip Retrieval And Video Summarization, Yuxin Peng, Chong-Wah Ngo May 2006

Clip-Based Similarity Measure For Query-Dependent Clip Retrieval And Video Summarization, Yuxin Peng, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

This paper proposes a new approach and algorithm for the similarity measure of video clips. The similarity is mainly based on two bipartite graph matching algorithms: maximum matching (MM) and optimal matching (OM). MM is able to rapidly filter irrelevant video clips, while OM is capable of ranking the similarity of clips according to visual and granularity factors. We apply the similarity measure for two tasks: retrieval and summarization. In video retrieval, a hierarchical retrieval framework is constructed based on MM and OM. The validity of the framework is theoretically proved and empirically verified on a video database of 21 …


Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman Jan 2006

Research-Based Web Design & Usability Guidelines [2006 Edition], Michael O. Leavitt, Ben Shneiderman, Robert W. Bailey, Carol Barnum, John Bosley, Barbara Chaparro, Joseph Dumas, Melody Y. Ivory, Bonnie John, Hal Miller-Jacobs, Sanjay J. Koyani, James R. Lewis, Stanley Page, Judith Ramey, Janice (Ginny) Redish, Jean Scholtz, Steve Wigginton, Cari A. Wolfson, Larry E. Wood, Don Zimmerman

Publications

The new edition of the U.S. Department of Health and Human Services’ (HHS) Research-Based Web Design and Usability Guidelines. These guidelines reflect HHS’ commitment to identifying innovative, research-based approaches that result in highly responsive and easy-to-use Web sites for the public.

These guidelines help move us in that direction by providing practical, yet authoritative, guidance on a broad range of Web design and communication issues. Having access to the best available research helps to ensure we make the right decisions the first time around and reduces the possibility of errors and costly mistakes.


Realtime Query Expansion And Procedural Interfaces For Information Hierarchies, Saverio Perugini Jan 2006

Realtime Query Expansion And Procedural Interfaces For Information Hierarchies, Saverio Perugini

Computer Science Faculty Publications

We demonstrate the use of two user interfaces for interacting with web hierarchies. One uses the dependencies underlying a hierarchy to perform real-time query expansion and, in this way, acts as an in situ feedback mechanism. The other enables the user to cascade the output from one interaction to the input of another, and so on, and, in this way, supports procedural information-seeking tasks without disrupting the flow of interaction.


Information Assurance Through Binary Vulnerability Auditing, William B. Kimball, Saverio Perugini Jan 2006

Information Assurance Through Binary Vulnerability Auditing, William B. Kimball, Saverio Perugini

Computer Science Faculty Publications

The goal of this research is to develop improved methods of discovering vulnerabilities in software. A large volume of software, from the most frequently used programs on a desktop computer, such as web browsers, e-mail programs, and word processing applications, to mission-critical services for the space shuttle, is unintentionally vulnerable to attacks and thus insecure. By seeking to improve the identification of vulnerabilities in software, the security community can save the time and money necessary to restore compromised computer systems. In addition, this research is imperative to activities of national security such as counterterrorism. The current approach involves a systematic …