Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798563
G. Hovden, N. Ling
In this paper, we present several speed optimizing techniques in our MPEG-4 video decoder for real-time multimedia applications. Accessor functions and a simple data structure are used. The use of pointers is minimized. Fast algorithms and fixed-point arithmetic are applied whenever possible. Memory accesses are kept to the minimum. Our results show that our software can decode and display MPEG-4 QCIF videos about eight times faster than the existing MoMuSys decoder.
{"title":"On speed optimization of MPEG-4 decoder for real-time multimedia applications","authors":"G. Hovden, N. Ling","doi":"10.1109/ICCIMA.1999.798563","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798563","url":null,"abstract":"In this paper, we present several speed optimizing techniques in our MPEG-4 video decoder for real-time multimedia applications. Accessor functions and a simple data structure are used. The use of pointers is minimized. Fast algorithms and fixed-point arithmetic are applied whenever possible. Memory accesses are kept to the minimum. Our results show that our software can decode and display MPEG-4 QCIF videos about eight times faster than the existing MoMuSys decoder.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130935067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798535
Jean Graffagnini, S. Shiva, D. Patel
Since conflict negotiation requires many humans interacting, the modeling of human decision-making within conflict negotiation requires accuracy at both the individual cognitive behavior level and the group interaction level. The key to this accuracy is the characterization of the attributes of conflict negotiation strategies and of individual human decision-making processes. The characteristics of the negotiation process must encompass the varying approaches to negotiation. Individual human decision-making characterization must incorporate both the possibility of embedded mediation behaviors and the existence of independent mediators. This paper gives a brief overview of these characteristics, primarily focusing on how each may influence the negotiation model's requirements.
{"title":"Modeling the decision making behaviors within human conflict negotiation","authors":"Jean Graffagnini, S. Shiva, D. Patel","doi":"10.1109/ICCIMA.1999.798535","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798535","url":null,"abstract":"Since conflict negotiation requires many humans interacting, the modeling of human decision-making within conflict negotiation requires accuracy at both the individual cognitive behavior level and the group interaction level. The key to this accuracy is the characterization of the attributes of conflict negotiation strategies and of individual human decision-making processes. The characteristics of the negotiation process must encompass the varying approaches to negotiation. Individual human decision-making characterization must incorporate both the possibility of embedded mediation behaviors and the existence of independent mediators. This paper gives a brief overview of these characteristics, primarily focusing on how each may influence the negotiation model's requirements.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"1689 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129374937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798492
T. Watanabe
The management of long lived transactions is an interesting topic in the application of databases for long term enterprise requests. Some methods have been proposed to manage this type of transaction well: nested transaction model, SAGAS model, etc. However, the models are not always successful at controlling various classes of long lived transactions effectively. We describe our 3-layer model of long lived transaction which was developed to avoid such troublesome problems, and address the management strategy to be constructed under the 3-layer model, based on work flow and task graph.
{"title":"Agent-oriented model for managing long-lived transaction, based on work-flow and task-graph","authors":"T. Watanabe","doi":"10.1109/ICCIMA.1999.798492","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798492","url":null,"abstract":"The management of long lived transactions is an interesting topic in the application of databases for long term enterprise requests. Some methods have been proposed to manage this type of transaction well: nested transaction model, SAGAS model, etc. However, the models are not always successful at controlling various classes of long lived transactions effectively. We describe our 3-layer model of long lived transaction which was developed to avoid such troublesome problems, and address the management strategy to be constructed under the 3-layer model, based on work flow and task graph.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798555
S. Wei, V. Tsaoussidis, V. Venkatakrishnan
Traditionally, the provided service of Internet transport protocols is reliable/ordered or unreliable/unordered service, respectively. It has been widely accepted that a variety of applications (e.g. multimedia) can tradeoff reliability mechanisms to achieve higher throughput. Such a solution, which additionally respects user preferences for QoS characteristics (e.g. reliability, cost, throughput, delay) is a current demand. We propose an application-oriented transport protocol (AOTP) to handle partially or completely reliable transport service favoring throughput at the expense of reliability, or dropping the reliability level in order to keep the cost at a desired level. The protocol can be applied to cases where resource reservation is not possible or desired. Our approach does not use forward error correction to save bandwidth, but uses instead, a receiver-based retransmission mechanism. Therefore, the protocol is appropriate for applications that tolerate losses and thus, the need for retransmission (additional RTTs) does not arise often. We present encouraging initial results tested over Ethernet links; we compare AOTP with TCP and a TCP-like protocol without congestion control (TCPWCC), contrasting throughput results for different levels of reliability requirements.
{"title":"QoS tradeoffs using an application-oriented transport protocol (AOTP) for multimedia applications over IP","authors":"S. Wei, V. Tsaoussidis, V. Venkatakrishnan","doi":"10.1109/ICCIMA.1999.798555","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798555","url":null,"abstract":"Traditionally, the provided service of Internet transport protocols is reliable/ordered or unreliable/unordered service, respectively. It has been widely accepted that a variety of applications (e.g. multimedia) can tradeoff reliability mechanisms to achieve higher throughput. Such a solution, which additionally respects user preferences for QoS characteristics (e.g. reliability, cost, throughput, delay) is a current demand. We propose an application-oriented transport protocol (AOTP) to handle partially or completely reliable transport service favoring throughput at the expense of reliability, or dropping the reliability level in order to keep the cost at a desired level. The protocol can be applied to cases where resource reservation is not possible or desired. Our approach does not use forward error correction to save bandwidth, but uses instead, a receiver-based retransmission mechanism. Therefore, the protocol is appropriate for applications that tolerate losses and thus, the need for retransmission (additional RTTs) does not arise often. We present encouraging initial results tested over Ethernet links; we compare AOTP with TCP and a TCP-like protocol without congestion control (TCPWCC), contrasting throughput results for different levels of reliability requirements.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798560
M. Lomic, Z. Putnik
The multimedia and advanced technologies are bringing enormous changes in the field of education, especially education for future computer professionals. Additional ways for students to interact with their study materials, as well as with their teachers, are available. Developments in the area of multimedia technology and its introduction into the educational process have changed the characteristics and methods of education. Still, computer science theory mainly considers the technical points of multimedia education, or necessary changes in education methods. This paper discusses some other angles of influence of advanced multimedia on education - social, ethical, legal or moral, for example.
{"title":"Multimedia education-several-angles view","authors":"M. Lomic, Z. Putnik","doi":"10.1109/ICCIMA.1999.798560","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798560","url":null,"abstract":"The multimedia and advanced technologies are bringing enormous changes in the field of education, especially education for future computer professionals. Additional ways for students to interact with their study materials, as well as with their teachers, are available. Developments in the area of multimedia technology and its introduction into the educational process have changed the characteristics and methods of education. Still, computer science theory mainly considers the technical points of multimedia education, or necessary changes in education methods. This paper discusses some other angles of influence of advanced multimedia on education - social, ethical, legal or moral, for example.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122239924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798565
F. Vignoli, F. Lavagetto
The bimodal acoustic-visual effect is of extreme importance in human face-to-face communication; it has been broadly investigated and the improvement in understanding when visual cues are integrated with speech has been clearly demonstrated, with particular emphasis in noisy environments. In this paper, we propose a novel synchronization procedure for speech and text, consisting of a neural network-based acoustic segmentation method for phoneme classes and a phonetic-acoustic time alignment algorithm which we call Segmental Time-Alignment (STA). The proposed algorithm is fast and speaker-independent since it uses neural networks trained to discriminate among broad phoneme classes. This technique has been used to animate the MPEG-4 compliant DIST face model.
{"title":"A segmental time-alignment technique for text-speech synchronization","authors":"F. Vignoli, F. Lavagetto","doi":"10.1109/ICCIMA.1999.798565","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798565","url":null,"abstract":"The bimodal acoustic-visual effect is of extreme importance in human face-to-face communication; it has been broadly investigated and the improvement in understanding when visual cues are integrated with speech has been clearly demonstrated, with particular emphasis in noisy environments. In this paper, we propose a novel synchronization procedure for speech and text, consisting of a neural network-based acoustic segmentation method for phoneme classes and a phonetic-acoustic time alignment algorithm which we call Segmental Time-Alignment (STA). The proposed algorithm is fast and speaker-independent since it uses neural networks trained to discriminate among broad phoneme classes. This technique has been used to animate the MPEG-4 compliant DIST face model.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117160626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798522
T. Yairi, K. Hori, S. Nakasuka
Autonomous state generalization is one of the key issues in the behavior acquisition problem of reactive agents. The paper proposes a novel state generalization method which discretizes the continuous sensor space based on entropy minimization of agents' behavior outcomes. This general framework unifies the heuristic criteria for state generalization used in conventional works. An experimental study in the latter part suggests that our method increases the adaptability of agents to the environment and improves the overall behavior performance.
{"title":"State generalization method based on uncertainty minimization of behavior outcomes for reactive agents","authors":"T. Yairi, K. Hori, S. Nakasuka","doi":"10.1109/ICCIMA.1999.798522","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798522","url":null,"abstract":"Autonomous state generalization is one of the key issues in the behavior acquisition problem of reactive agents. The paper proposes a novel state generalization method which discretizes the continuous sensor space based on entropy minimization of agents' behavior outcomes. This general framework unifies the heuristic criteria for state generalization used in conventional works. An experimental study in the latter part suggests that our method increases the adaptability of agents to the environment and improves the overall behavior performance.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798545
K. Tabb, S. George, R. Adams, N. Davey
This paper documents experiments which have been carried out with several neural network systems designed to categorise pedestrian shapes from non-pedestrian shapes. Active contour models ('snakes') have been used to obtain contours of pedestrians as they move around the visual field. Neural networks have then been trained on representations of these relaxed snakes, and can successfully discriminate these contours based upon whether they are 'pedestrian' in shape or not.
{"title":"Human shape recognition from snakes using neural networks","authors":"K. Tabb, S. George, R. Adams, N. Davey","doi":"10.1109/ICCIMA.1999.798545","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798545","url":null,"abstract":"This paper documents experiments which have been carried out with several neural network systems designed to categorise pedestrian shapes from non-pedestrian shapes. Active contour models ('snakes') have been used to obtain contours of pedestrians as they move around the visual field. Neural networks have then been trained on representations of these relaxed snakes, and can successfully discriminate these contours based upon whether they are 'pedestrian' in shape or not.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124100835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798490
M. Vidyasagar
{"title":"Can neural networks really generalize?","authors":"M. Vidyasagar","doi":"10.1109/ICCIMA.1999.798490","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798490","url":null,"abstract":"","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1999-09-23DOI: 10.1109/ICCIMA.1999.798510
V. Pilla, H. S. Lopes
The article presents a neurofuzzy network that is applied to the detection of a specific wave of the electrocardiographic signal. The network was trained using genetic algorithms, using a software package publicly available on the Internet. The training procedure, its parameters and details of the application are presented. Results suggest that this kind of network is suitable for the identification of patterns in unidimensional time-varying signals.
{"title":"Evolutionary training of a neurofuzzy network for detection of P wave of the ECG","authors":"V. Pilla, H. S. Lopes","doi":"10.1109/ICCIMA.1999.798510","DOIUrl":"https://doi.org/10.1109/ICCIMA.1999.798510","url":null,"abstract":"The article presents a neurofuzzy network that is applied to the detection of a specific wave of the electrocardiographic signal. The network was trained using genetic algorithms, using a software package publicly available on the Internet. The training procedure, its parameters and details of the application are presented. Results suggest that this kind of network is suitable for the identification of patterns in unidimensional time-varying signals.","PeriodicalId":110736,"journal":{"name":"Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115185174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}