ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
Done
Inviting an author to review:
The path more travelled: Time pressure increases reliance on familiar route-based strategies during navigation.
Find an author and click ‘
Invite to review selected article
’ near their name.
Search for authors
Search for similar articles
Invite by email
6
views
13
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,722
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptology and Network Security: 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings
The Features and Functions of an Effective Multimedia Information Retrieval System (MMIR)
other
Author(s):
Jolanta Szulc
Publication date
(Online):
August 15 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Management Information Systems
Most cited references
13
Record
: found
Abstract
: not found
Article
: not found
“The most passionate cover I’ve seen”: emotional information in fan-created U2 music videos
Diane Rasmussen Pennington
(2016)
0
comments
Cited
3
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Knowledge Organisation and its Role in Multimedia Information Retrieval
Andrew MacFarlane
(2016)
0
comments
Cited
2
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Dictionary of Information Science and Technology (2nd Edition) :
Mehdi Khosrow-Pour, D.B.A.
(2013)
0
comments
Cited
2
times
– based on
0
reviews
Bookmark
All references
Author and book information
Contributors
Jolanta Szulc:
(View ORCID Profile)
Book Chapter
Publication date (Print):
2019
Publication date (Online):
August 15 2018
Pages
: 120-128
DOI:
10.1007/978-3-319-98678-4_14
SO-VID:
6c83a139-c738-4531-bffa-899f5e617391
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Identity Recognition by Incremental Learning
pp. 3
Faster Privacy-Preserving Location Proximity Schemes
pp. 5
Modern Approaches to Multi-dimensional Visual Signals Analysis
pp. 7
New Applications of Sound and Vision Engineering
pp. 13
A Concept of Visual Knowledge Representation
pp. 23
Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
pp. 23
Three-Dimensional Multi-resolution and Hardware Accelerated Compression for the Efficient Interactive Web Applications
pp. 35
Using the Virtual Assistant Alexa as a Communication Channel for Road Traffic Situation
pp. 43
$$\mathsf {HIKE}$$ : Walking the Privacy Trail
pp. 45
Application of the Sensor Fusion for the System to Track Human Upper Limb Motion
pp. 56
Estimation of the Amount of Noise in Digital Images Using Finite Differences
pp. 67
Linear Filtering of Blurry Photos
pp. 69
DNS-DNS: DNS-Based De-NAT Scheme
pp. 77
A First Summarization System of a Video in a Target Language
pp. 89
CLEF: Limiting the Damage Caused by Large Flows in the Internet Core
pp. 89
Comparative Analysis of Accuracy of Fuzzy Clustering Methods Applied for Image Processing
pp. 99
An Efficient Method for Sign Language Recognition from Image Using Convolutional Neural Network
pp. 109
Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Processing Pipeline
pp. 109
Audio/Speech Coding Based on the Perceptual Sparse Representation of the Signal with DAE Neural Network Quantizer and Near-End Listening Enhancement
pp. 120
The Features and Functions of an Effective Multimedia Information Retrieval System (MMIR)
pp. 131
YouTube Timed Metadata Enrichment Using a Collaborative Approach
pp. 133
Malware Tolerant (Mesh-)Networks
pp. 142
Improving the Responsiveness of Geospatial Web Applications Through Client-Side Processing
pp. 151
Isotone Galois Connections and Generalized One-Sided Concept Lattices
pp. 154
Inside GandCrab Ransomware
pp. 161
Transfer Learning in GMDH-Type Neural Networks
pp. 170
Modelling of Taxi Dispatch Problem Using Heuristic Algorithms
pp. 177
The Relation Between CENC and NEMO
pp. 180
Malware Detection Using Black-Box Neural Method
pp. 190
On the Efficiency of ZMAC-Type Modes
pp. 190
Intrusion Detection and Risk Evaluation in Online Transactions Using Partitioning Methods
pp. 201
Prediction of Autism Severity Level in Bangladesh Using Fuzzy Logic: FIS and ANFIS
pp. 213
Hierarchical Attribute-Based Signatures
pp. 213
A Framework for Analyzing Academic Data
pp. 224
Verifying Usefulness of Algorithms for WordNet Based Similarity Sense Disambiguation
pp. 235
Enhanced Security of Attribute-Based Signatures
pp. 236
Comparison of Paragram and Glove Results for Similarity Benchmarks
pp. 249
Calculating Optimal Queries from the Query Relevance File
pp. 256
Protean Signature Schemes
pp. 260
Survey on Neural Machine Translation into Polish
pp. 273
Multilingual and Intercultural Competence for ICT: Accessing and Assessing Electronic Information in the Global World
pp. 277
Code-Based Signature Schemes from Identification Protocols in the Rank Metric
pp. 279
Selection of Most Suitable Secondary School Alternative by Multi-Criteria Fuzzy Analytic Hierarchy Process
pp. 290
Comparison of the Novel Classification Methods on the Reuters-21578 Corpus
pp. 299
SETLA: Signature and Encryption from Lattices
pp. 303
Deep Learning Techniques for Visual Food Recognition on a Mobile App
pp. 313
To Identify Hot Spots in Power Lines Using Infrared and Visible Sensors
pp. 322
Sparse Solution to Inverse Problem of Nonlinear Dimensionality Reduction
pp. 323
Assessing and Countering Reaction Attacks Against Post-Quantum Public-Key Cryptosystems Based on QC-LDPC Codes
pp. 332
Towards Structural Monitoring and 3D Documentation of Architectural Heritage Using UAV
pp. 343
Remote Sensing for Maritime Monitoring and Vessel Prompt Identification
pp. 344
Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
pp. 353
Deep Learning Approach to Human Osteosarcoma Cell Detection and Classification
pp. 357
Solving LWR via BDD Strategy: Modulus Switching Approach
pp. 362
Detection of Suspicious Accounts on Twitter Using Word2Vec and Sentiment Analysis
pp. 372
A Hybrid CNN Approach for Single Image Depth Estimation: A Case Study
pp. 377
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation
pp. 385
Cross-Lingual Speech-to-Text Summarization
pp. 394
Several MILP-Aided Attacks Against SNOW 2.0
pp. 396
A Proposed Methodology for Subjective Evaluation of Video and Text Summarization
pp. 405
Collection, Analysis and Summarization of Video Content
pp. 415
An Integrated AMIS Prototype for Automated Summarization and Translation of Newscasts and Reports
pp. 417
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption
pp. 424
Evaluation of Multimedia Content Summarization Algorithms
pp. 434
A Knowledge Discovery from Full-Text Document Collections Using Clustering and Interpretable Genetic-Fuzzy Systems
pp. 440
Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
pp. 444
Microservices Architecture for Content-Based Indexing of Video Shots
pp. 459
Spatial Audio Scene Characterization (SASC)
pp. 463
Secret Sharing Schemes for (k, n)-Consecutive Access Structures
pp. 470
Automatic Clustering of EEG-Based Data Associated with Brain Activity
pp. 480
Comparative Analysis of Spectral and Cepstral Feature Extraction Techniques for Phoneme Modelling
pp. 481
Extending a Framework for Biometric Visual Cryptography
pp. 490
Selection of Features for Multimodal Vocalic Segments Classification
pp. 495
Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework
pp. 503
Weight Adaptation Stability of Linear and Higher-Order Neural Units for Prediction Applications
pp. 512
Visual Analysis of Differential Evolution Algorithms
pp. 522
PCA Algorithms in the Visualization of Big Data from Polish Digital Libraries
pp. 533
Recognition of the Pathology of the Human Movement with the Use of Mobile Technology and Machine Learning
pp. 542
A Multimedia Platform for Mexican Cultural Heritage Diffusion
pp. 552
Authentication Mechanism to Access Multiple-Domain Multimedia Data
pp. 565
Accident Prevention System During Immersion in Virtual Reality
pp. 574
Design and Development of “Battle Drone” Computer-Based Trading Card Game (CTCG)
pp. 586
Wide Field of View Projection Using Rasterization
Similar content
5,722
Using game making pedagogy to facilitate student learning of interactive multimedia
Authors:
Gary Cheng
,
Gary Cheng
Architectural Interior Modeling Product Design Based on the Multimedia Three-Dimensional Hybrid Algorithm
Authors:
Tao Su
,
Gang Ouyang
,
Zhendong Mu
Continuous retrieval of multimedia data using parallelism
Authors:
S Ghandeharizadeh
,
L. Ramos
See all similar