{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:20:32Z","timestamp":1751430032029,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":851,"publisher":"Association for Computing Machinery and Morgan & Claypool","isbn-type":[{"type":"print","value":"9781970001075"}],"license":[{"start":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T00:00:00Z","timestamp":1513641600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,19]]},"DOI":"10.1145\/3122865.3122868","type":"book-chapter","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T19:37:55Z","timestamp":1518464275000},"page":"31-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Audition for multimedia computing"],"prefix":"10.1145","author":[{"given":"Gerald","family":"Friedland","sequence":"first","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Paris","family":"Smaragdis","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Josh","family":"McDermott","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]},{"given":"Bhiksha","family":"Raj","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2017,12,19]]},"reference":[{"key":"e_1_4_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/taffc.2015.2392932"},{"key":"e_1_4_1_2_1","first-page":"1978","volume-title":"Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR)","volume":"2","author":"Abdel-Hakim A. E.","unstructured":"A. E. Abdel-Hakim and A. A. Farag . 2006. CSIFT: A SIFT descriptor with color invariant characteristics . In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) , vol. 2 , pp. 1978 - 1983 . A. E. Abdel-Hakim and A. A. Farag. 2006. CSIFT: A SIFT descriptor with color invariant characteristics. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), vol. 2, pp. 1978-1983."},{"key":"e_1_4_1_3_1","first-page":"1265","volume-title":"CHI Extended Abstracts","author":"Abdulin E.","unstructured":"E. Abdulin and O. Komogortsev . 2015. User eye fatigue detection via eye movement behavior . In CHI Extended Abstracts , pp. 1265 - 1270 . E. Abdulin and O. Komogortsev. 2015. User eye fatigue detection via eye movement behavior. In CHI Extended Abstracts, pp. 1265-1270."},{"key":"e_1_4_1_4_1","volume-title":"Digital Avionics Systems Conference","author":"Adam E.","year":"1993","unstructured":"E. Adam . 1993 . Fighter cockpits of the future . In Digital Avionics Systems Conference , 1993. 12th DASC., AIAA\/IEEE, pp. 318-323. IEEE. E. Adam. 1993. Fighter cockpits of the future. In Digital Avionics Systems Conference, 1993. 12th DASC., AIAA\/IEEE, pp. 318-323. IEEE."},{"key":"e_1_4_1_5_1","series-title":"Lecture Notes in Computer Science","first-page":"273","volume-title":"Information Hiding","author":"Adelsbach A.","unstructured":"A. Adelsbach and A.-R. Sadeghi . 2001. Zero-knowledge watermark detection and proof of ownership . In Information Hiding , volume 2137 of Lecture Notes in Computer Science , pp. 273 - 288 . Springer . A. Adelsbach and A.-R. Sadeghi. 2001. Zero-knowledge watermark detection and proof of ownership. In Information Hiding, volume 2137 of Lecture Notes in Computer Science, pp. 273-288. Springer."},{"key":"e_1_4_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0108-y"},{"key":"e_1_4_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315460"},{"key":"e_1_4_1_8_1","first-page":"970","volume-title":"IEEE International Conference on Multimedia and Expo","author":"Aggarwal C.","unstructured":"C. Aggarwal , D. Olshefski , D. Saha , Z.-Y. Shae , and P. Yu . 2005. CSR: Speaker recognition from compressed VoIP packet stream . In IEEE International Conference on Multimedia and Expo , pp. 970 - 973 . C. Aggarwal, D. Olshefski, D. Saha, Z.-Y. Shae, and P. Yu. 2005. CSR: Speaker recognition from compressed VoIP packet stream. In IEEE International Conference on Multimedia and Expo, pp. 970-973."},{"key":"e_1_4_1_9_1","doi-asserted-by":"crossref","unstructured":"J. K. Aggarwal and M. S. Ryoo. 2011. Human activity analysis: A review. ACM Computing Surveys 43(3): April 2011. J. K. Aggarwal and M. S. Ryoo. 2011. Human activity analysis: A review. ACM Computing Surveys 43(3): April 2011.","DOI":"10.1145\/1922649.1922653"},{"key":"e_1_4_1_10_1","first-page":"362","volume-title":"IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom)","author":"Aghasaryan A.","unstructured":"A. Aghasaryan , M. Bouzid , D. Kostadinov , M. Kothari , and A. Nandi . July 2013. On the use of LSH for privacy preserving personalization . In IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom) , pp. 362 - 371 . A. Aghasaryan, M. Bouzid, D. Kostadinov, M. Kothari, and A. Nandi. July 2013. On the use of LSH for privacy preserving personalization. In IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), pp. 362-371."},{"key":"e_1_4_1_11_1","first-page":"3","volume-title":"Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Agichtein E.","unstructured":"E. Agichtein , E. Brill , S. Dumais , and R. Ragno . 2006. Learning user interaction models for predicting web search result preferences . In Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval , pp. 3 - 10 . ACM. E. Agichtein, E. Brill, S. Dumais, and R. Ragno. 2006. Learning user interaction models for predicting web search result preferences. In Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 3-10. ACM."},{"key":"e_1_4_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.800499"},{"key":"e_1_4_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230219"},{"key":"e_1_4_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/30401.30404"},{"key":"e_1_4_1_15_1","first-page":"1","volume-title":"Multimedia Systems","author":"Ai L.","unstructured":"L. Ai , J. Yu , Z. Wu , Y. He , and T. Guan . 2015. Optimized residual vector quantization for efficient approximate nearest neighbor search . Multimedia Systems , pp. 1 - 13 . L. Ai, J. Yu, Z. Wu, Y. He, and T. Guan. 2015. Optimized residual vector quantization for efficient approximate nearest neighbor search. Multimedia Systems, pp. 1-13."},{"key":"e_1_4_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364914548050"},{"key":"e_1_4_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12193-012-0111-y"},{"key":"e_1_4_1_18_1","first-page":"4","volume-title":"ACM International Conference on Multimedia (ACMMM)","author":"Alameda-Pineda X.","unstructured":"X. Alameda-Pineda , Y. Yan , E. Ricci , O. Lanz , and N. Sebe . 2015. Analyzing free-standing conversational groups: A multimodal approach . In ACM International Conference on Multimedia (ACMMM) , pp. 4 - 15 . X. Alameda-Pineda, Y. Yan, E. Ricci, O. Lanz, and N. Sebe. 2015. Analyzing free-standing conversational groups: A multimodal approach. In ACM International Conference on Multimedia (ACMMM), pp. 4-15."},{"key":"e_1_4_1_19_1","doi-asserted-by":"crossref","unstructured":"X. Alameda-Pineda E. Ricci Y. Yan and N. Sebe. 2016a. Recognizing emotions from abstract paintings using non-linear matrix completion. In CVPR. X. Alameda-Pineda E. Ricci Y. Yan and N. Sebe. 2016a. Recognizing emotions from abstract paintings using non-linear matrix completion. In CVPR .","DOI":"10.1109\/CVPR.2016.566"},{"key":"e_1_4_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2496269"},{"key":"e_1_4_1_21_1","first-page":"321","volume-title":"Proceedings of IEEE International Conference on Network-Based Information Systems (NBiS)","author":"Alhamad M.","unstructured":"M. Alhamad , T. Dillon , and E. Chang . 2010. SLA-based trust model for cloud computing . In Proceedings of IEEE International Conference on Network-Based Information Systems (NBiS) , pp. 321 - 324 . M. Alhamad, T. Dillon, and E. Chang. 2010. SLA-based trust model for cloud computing. In Proceedings of IEEE International Conference on Network-Based Information Systems (NBiS), pp. 321-324."},{"key":"e_1_4_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.171"},{"key":"e_1_4_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2004.14"},{"key":"e_1_4_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/581571.581573"},{"key":"e_1_4_1_25_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-012-0299-5"},{"key":"e_1_4_1_27_1","first-page":"459","volume-title":"Proceedings of the Symposium on the Foundations of Computer Science","author":"Andoni A.","unstructured":"A. Andoni and P. Indyk . 2006. Near-optimal hashing algorithms for near neighbor problem in high dimensions . In Proceedings of the Symposium on the Foundations of Computer Science , pp. 459 - 468 . A. Andoni and P. Indyk. 2006. Near-optimal hashing algorithms for near neighbor problem in high dimensions. In Proceedings of the Symposium on the Foundations of Computer Science, pp. 459-468."},{"key":"e_1_4_1_28_1","first-page":"340","volume-title":"IFIP Conference on Human-Computer Interaction","author":"Andr\u00e9 P.","unstructured":"P. Andr\u00e9 , E. Cutrell , D. S. Tan , and G. Smith . 2009. Designing novel image search interfaces by understanding unique characteristics and usage . In IFIP Conference on Human-Computer Interaction , pp. 340 - 353 . Springer. P. Andr\u00e9, E. Cutrell, D. S. Tan, and G. Smith. 2009. Designing novel image search interfaces by understanding unique characteristics and usage. In IFIP Conference on Human-Computer Interaction, pp. 340-353. Springer."},{"key":"e_1_4_1_29_1","first-page":"3686","volume-title":"CVPR","author":"Andriluka M.","unstructured":"M. Andriluka , L. Pishchulin , P. Gehler , and B. Schiele . 2014. 2D human pose estimation: New benchmark and state of the art analysis . In CVPR , pp. 3686 - 3693 . M. Andriluka, L. Pishchulin, P. Gehler, and B. Schiele. 2014. 2D human pose estimation: New benchmark and state of the art analysis. In CVPR, pp. 3686-3693."},{"key":"e_1_4_1_30_1","unstructured":"S. Argamon S. Dhawle M. Koppel and J. Pennbaker. 2005. Lexical predictors of personality type. In Interface and the Classification Society of North America. S. Argamon S. Dhawle M. Koppel and J. Pennbaker. 2005. Lexical predictors of personality type. In Interface and the Classification Society of North America ."},{"key":"e_1_4_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1140"},{"key":"e_1_4_1_32_1","doi-asserted-by":"crossref","unstructured":"S. Avidan and M. Butman . 2006 . Blind vision. In Proceedings of the 9th European Conference on Computer Vision volume 3953 of Lecture Notes in Computer Science pp. 1 - 13 . Springer . S. Avidan and M. Butman. 2006. Blind vision. In Proceedings of the 9th European Conference on Computer Vision volume 3953 of Lecture Notes in Computer Science pp. 1-13. Springer.","DOI":"10.1007\/11744078_1"},{"key":"e_1_4_1_33_1","first-page":"407","volume-title":"TRECVID 2016: Evaluating video search, video event detection, localization, and hyperlinking. In Proceedings of TRECVID 2016","author":"Awad G.","unstructured":"G. Awad , J. Fiscus , M. Michel , D. Joy , W. Kraaij , A. F. Smeaton , G. Quenot , M. Eskevich , R. Aly , G. J. F. Jones , R. Ordelman , B. Huet , and M. Larson . 2016 . TRECVID 2016: Evaluating video search, video event detection, localization, and hyperlinking. In Proceedings of TRECVID 2016 , pp. 407 - 411 . G. Awad, J. Fiscus, M. Michel, D. Joy, W. Kraaij, A. F. Smeaton, G. Quenot, M. Eskevich, R. Aly, G. J. F. Jones, R. Ordelman, B. Huet, and M. Larson. 2016. TRECVID 2016: Evaluating video search, video event detection, localization, and hyperlinking. In Proceedings of TRECVID 2016, pp. 407-411."},{"key":"e_1_4_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.07.006"},{"key":"e_1_4_1_35_1","first-page":"412","volume-title":"Proceedings of ACM Symposium on Applied Computing (SAC)","author":"Babaoglu O.","unstructured":"O. Babaoglu , M. Marzolla , and M. Tamburini . 2012. Design and implementation of a P2P cloud system . In Proceedings of ACM Symposium on Applied Computing (SAC) , pp. 412 - 417 . O. Babaoglu, M. Marzolla, and M. Tamburini. 2012. Design and implementation of a P2P cloud system. In Proceedings of ACM Symposium on Applied Computing (SAC), pp. 412-417."},{"key":"e_1_4_1_36_1","doi-asserted-by":"crossref","unstructured":"A. Babenko and V. Lempitsky. June 2014. Additive quantization for extreme vector compression. In CVPR. A. Babenko and V. Lempitsky. June 2014. Additive quantization for extreme vector compression. In CVPR .","DOI":"10.1109\/CVPR.2014.124"},{"key":"e_1_4_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2355036"},{"key":"e_1_4_1_38_1","doi-asserted-by":"crossref","unstructured":"A. Babenko and V. Lempitsky. June 2015b. Tree quantization for large-scale similarity search and classification. In CVPR. A. Babenko and V. Lempitsky. June 2015b. Tree quantization for large-scale similarity search and classification. In CVPR .","DOI":"10.1109\/CVPR.2015.7299052"},{"key":"e_1_4_1_39_1","first-page":"584","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV)","author":"Babenko A.","unstructured":"A. Babenko , A. Slesarev , A. Chigorin , and V. Lempitsky . September 2014. Neural codes for image retrieval . In Proceedings of the European Conference on Computer Vision (ECCV) , pp. 584 - 599 . A. Babenko, A. Slesarev, A. Chigorin, and V. Lempitsky. September 2014. Neural codes for image retrieval. In Proceedings of the European Conference on Computer Vision (ECCV), pp. 584-599."},{"key":"e_1_4_1_40_1","doi-asserted-by":"crossref","unstructured":"M. Backes G. Doychev M. D\u00fcrmuth and B. K\u00f6pf . 2010 . Speaker recognition in encrypted voice streams. In Computer Security--ESORICS volume 6345 of Lecture Notes in Computer Science pp. 508 - 523 . Springer . M. Backes G. Doychev M. D\u00fcrmuth and B. K\u00f6pf. 2010. Speaker recognition in encrypted voice streams. In Computer Security--ESORICS volume 6345 of Lecture Notes in Computer Science pp. 508-523. Springer.","DOI":"10.1007\/978-3-642-15497-3_31"},{"key":"e_1_4_1_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-842X.00128"},{"key":"e_1_4_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2012.07.004"},{"key":"e_1_4_1_43_1","first-page":"1148","volume-title":"Proceedings 45th IEEE Asilomar Conference on Signals, Systems, and Computers (ASILOMAR)","author":"Bahmani S.","unstructured":"S. Bahmani , P. Boufounos , and B. Raj . 2011. Greedy sparsity-constrained optimization . In Proceedings 45th IEEE Asilomar Conference on Signals, Systems, and Computers (ASILOMAR) , pp. 1148 - 1152 . S. Bahmani, P. Boufounos, and B. Raj. 2011. Greedy sparsity-constrained optimization. In Proceedings 45th IEEE Asilomar Conference on Signals, Systems, and Computers (ASILOMAR), pp. 1148-1152."},{"key":"e_1_4_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2515078"},{"key":"e_1_4_1_45_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR). arXiv:1511","author":"Ballas N.","year":"2015","unstructured":"N. Ballas , L. Yao , C. Pal , and A. Courville . 2016. Delving deeper into convolutional networks for learning video representations . In Proceedings of the International Conference on Learning Representations (ICLR). arXiv:1511 .06432, 2015 . N. Ballas, L. Yao, C. Pal, and A. Courville. 2016. Delving deeper into convolutional networks for learning video representations. In Proceedings of the International Conference on Learning Representations (ICLR). arXiv:1511.06432, 2015."},{"key":"e_1_4_1_46_1","first-page":"1","volume-title":"IEEE Winter Conference on Applications of Computer Vision","author":"Baltru\u0161aitis T.","year":"2016","unstructured":"T. Baltru\u0161aitis , P. Robinson , and L.-P. Morency . 2016 . OpenFace: an open source facial behavior analysis toolkit . In IEEE Winter Conference on Applications of Computer Vision , pp. 1 - 10 . T. Baltru\u0161aitis, P. Robinson, and L.-P. Morency. 2016. OpenFace: an open source facial behavior analysis toolkit. In IEEE Winter Conference on Applications of Computer Vision, pp. 1-10."},{"key":"e_1_4_1_47_1","first-page":"6884","volume-title":"Proc IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)","author":"Balu R.","unstructured":"R. Balu , T. Furon , and H. J\u00e9gou . April 2014. Beyond project and sign for distance estimation with binary codes . In Proc IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) , pp. 6884 - 6888 . R. Balu, T. Furon, and H. J\u00e9gou. April 2014. Beyond project and sign for distance estimation with binary codes. In Proc IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 6884-6888."},{"key":"e_1_4_1_48_1","first-page":"65","volume-title":"Proceedings of the ACL Workshop on Intrinsic and Extrinsic Evaluation Measures for Machine Translation and\/or Summarization","author":"Banerjee S.","unstructured":"S. Banerjee and A. Lavie . 2005. METEOR: An automatic metric for MT evaluation with improved correlation with human judgments . In Proceedings of the ACL Workshop on Intrinsic and Extrinsic Evaluation Measures for Machine Translation and\/or Summarization , pp. 65 - 72 . S. Banerjee and A. Lavie. 2005. METEOR: An automatic metric for MT evaluation with improved correlation with human judgments. In Proceedings of the ACL Workshop on Intrinsic and Extrinsic Evaluation Measures for Machine Translation and\/or Summarization, pp. 65-72."},{"key":"e_1_4_1_49_1","first-page":"4353","volume-title":"ICASSP","author":"Baokye K.","unstructured":"K. Baokye , B. Trueba-Hornero , O. Vinyals , and G. Friedland . 2008a. Overlapped speech detection for improved diarization in multiparty meetings . In ICASSP , pp. 4353 - 4356 . K. Baokye, B. Trueba-Hornero, O. Vinyals, and G. Friedland. 2008a. Overlapped speech detection for improved diarization in multiparty meetings. In ICASSP, pp. 4353- 4356."},{"key":"e_1_4_1_50_1","first-page":"32","volume-title":"Proceedings of Interspeech","author":"Baokye K.","unstructured":"K. Baokye , O. Vinyals , and G. Friedland . 2008b. Two's a crowd: Improving speaker diarization by automatically identifying and excluding overlapped speech . In Proceedings of Interspeech , pp. 32 - 35 . K. Baokye, O. Vinyals, and G. Friedland. 2008b. Two's a crowd: Improving speaker diarization by automatically identifying and excluding overlapped speech. In Proceedings of Interspeech, pp. 32-35."},{"key":"e_1_4_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.014"},{"volume-title":"Proceedings of EURASIP European Signal Processing Conference.","author":"Barni M.","key":"e_1_4_1_52_1","unstructured":"M. Barni and A. Piva . 2008. Co-chairs, special issue on signal processing in the encrypted domain . Proceedings of EURASIP European Signal Processing Conference. M. Barni and A. Piva. 2008. Co-chairs, special issue on signal processing in the encrypted domain. Proceedings of EURASIP European Signal Processing Conference."},{"key":"e_1_4_1_53_1","first-page":"1","volume-title":"4th IEEE International Conference on Biometrics: Theory Applications and Systems","author":"Barni M.","unstructured":"M. Barni , T. Bianchi , D. Catalano , M. Di Raimondo , R. D. Labati , P. Failla , D. Fiore , R. Lazzeretti , V. Piuri , A. Piva , and F. Scotti . 2010. A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates . In 4th IEEE International Conference on Biometrics: Theory Applications and Systems , pp. 1 - 7 . M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. D. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, A. Piva, and F. Scotti. 2010. A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In 4th IEEE International Conference on Biometrics: Theory Applications and Systems, pp. 1-7."},{"key":"e_1_4_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2108650"},{"volume-title":"Camera Lucida: Reflections on Photography","author":"Barthes R.","key":"e_1_4_1_55_1","unstructured":"R. Barthes . 1981. Camera Lucida: Reflections on Photography . Macmillan . R. Barthes. 1981. Camera Lucida: Reflections on Photography. Macmillan."},{"key":"e_1_4_1_56_1","first-page":"1","article-title":"The situation underground","volume":"1","author":"Barwise J.","year":"1980","unstructured":"J. Barwise and J. Perry . 1980 . The situation underground . Stanford Working Papers in Semantics , 1 : 1 - 55 . J. Barwise and J. Perry. 1980. The situation underground. Stanford Working Papers in Semantics, 1: 1-55.","journal-title":"Stanford Working Papers in Semantics"},{"key":"e_1_4_1_57_1","doi-asserted-by":"publisher","DOI":"10.2307\/2026578"},{"key":"e_1_4_1_59_1","doi-asserted-by":"publisher","DOI":"10.1239\/jap\/1085496600"},{"key":"e_1_4_1_60_1","unstructured":"J. S. Beis and D. G. Lowe. June 1997. Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In CVPR. J. S. Beis and D. G. Lowe. June 1997. Shape indexing using approximate nearest-neighbour search in high-dimensional spaces. In CVPR ."},{"key":"e_1_4_1_61_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1995.7.6.1129"},{"key":"e_1_4_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.017"},{"key":"e_1_4_1_63_1","first-page":"120","volume-title":"Proceedings of the Workshop on Selected Areas of Cryptography","author":"Benaloh J.","year":"1994","unstructured":"J. Benaloh . 1994 . Dense probabilistic encryption . In Proceedings of the Workshop on Selected Areas of Cryptography , pp. 120 - 128 . J. Benaloh. 1994. Dense probabilistic encryption. In Proceedings of the Workshop on Selected Areas of Cryptography, pp. 120-128."},{"key":"e_1_4_1_64_1","first-page":"2344","volume-title":"Proceedings of IEEE Internationa Conference on Computer Vision (ICCV)","author":"Benfold B.","unstructured":"B. Benfold and I. Reid . 2011. Unsupervised learning of a scene-specific coarse gaze estimator . In Proceedings of IEEE Internationa Conference on Computer Vision (ICCV) , pp. 2344 - 2351 . B. Benfold and I. Reid. 2011. Unsupervised learning of a scene-specific coarse gaze estimator. In Proceedings of IEEE Internationa Conference on Computer Vision (ICCV), pp. 2344- 2351."},{"key":"e_1_4_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"e_1_4_1_66_1","first-page":"1798","volume-title":"IEEE TPAMI","author":"Bengio Y.","unstructured":"Y. Bengio , A. Courville , and P. Vincent . 2013. Representation learning: A review and new perspectives . IEEE TPAMI , pp. 1798 - 1828 . Y. Bengio, A. Courville, and P. Vincent. 2013. Representation learning: A review and new perspectives. IEEE TPAMI, pp. 1798-1828."},{"volume-title":"The Privacy Advocates: Resisting the Spread of Surveillance","author":"Bennett C. J.","key":"e_1_4_1_67_1","unstructured":"C. J. Bennett . 2008. The Privacy Advocates: Resisting the Spread of Surveillance . MIT Press . C. J. Bennett. 2008. The Privacy Advocates: Resisting the Spread of Surveillance. MIT Press."},{"key":"e_1_4_1_68_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01340.x"},{"key":"e_1_4_1_69_1","doi-asserted-by":"publisher","DOI":"10.1162\/014892604323112257"},{"key":"e_1_4_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPAA.2011.6082307"},{"key":"e_1_4_1_71_1","first-page":"85","volume-title":"Proceedings of the ACM 10th Workshop on Multimedia and Security","author":"Bianchi T.","unstructured":"T. Bianchi , A. Piva , and M. Barni . 2008a. Efficient pointwise and blockwise encrypted operations . In Proceedings of the ACM 10th Workshop on Multimedia and Security , pp. 85 - 90 . T. Bianchi, A. Piva, and M. Barni. 2008a. Efficient pointwise and blockwise encrypted operations. In Proceedings of the ACM 10th Workshop on Multimedia and Security, pp. 85-90."},{"key":"e_1_4_1_72_1","first-page":"1","volume-title":"Proceedings of EUSIPCO 16th European Signal Processing Conference","author":"Bianchi T.","unstructured":"T. Bianchi , A. Piva , and M. Barni . 2008b. Comparison of different FFT implementations in the encrypted domain . In Proceedings of EUSIPCO 16th European Signal Processing Conference , pp. 1 - 5 . T. Bianchi, A. Piva, and M. Barni. 2008b. Comparison of different FFT implementations in the encrypted domain. In Proceedings of EUSIPCO 16th European Signal Processing Conference, pp. 1-5."},{"key":"e_1_4_1_73_1","first-page":"1757","volume-title":"IEEE International Conference on Acoustics","author":"Bianchi T.","unstructured":"T. Bianchi , A. Piva , and M. Barni . 2008c. Implementing the discrete Fourier transform in the encrypted domain . In IEEE International Conference on Acoustics , pp. 1757 - 1760 . T. Bianchi, A. Piva, and M. Barni. 2008c. Implementing the discrete Fourier transform in the encrypted domain. In IEEE International Conference on Acoustics, pp. 1757-1760."},{"key":"e_1_4_1_74_1","first-page":"1","volume-title":"Proceedings of the IEEE 16th International Conference on Digital Signal Processing","author":"Bianchi T.","unstructured":"T. Bianchi , A. Piva , and M. Barni . 2009a. Efficient linear filtering of encrypted signals via composite representation . In Proceedings of the IEEE 16th International Conference on Digital Signal Processing , pp. 1 - 6 . T. Bianchi, A. Piva, and M. Barni. 2009a. Efficient linear filtering of encrypted signals via composite representation. In Proceedings of the IEEE 16th International Conference on Digital Signal Processing, pp. 1-6."},{"key":"e_1_4_1_75_1","first-page":"176","volume-title":"Proceedings of the IEEE 1st International Workshop on Information Forensics and Security","author":"Bianchi T.","unstructured":"T. Bianchi , T. Veugen , A. Piva , and M. Barni . 2009b. Processing in the encrypted domain using a composite signal representation: PROS and CONS . In Proceedings of the IEEE 1st International Workshop on Information Forensics and Security , pp. 176 - 180 . T. Bianchi, T. Veugen, A. Piva, and M. Barni. 2009b. Processing in the encrypted domain using a composite signal representation: PROS and CONS. In Proceedings of the IEEE 1st International Workshop on Information Forensics and Security, pp. 176-180."},{"key":"e_1_4_1_76_1","first-page":"15","volume-title":"IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications","author":"Bianchi T.","unstructured":"T. Bianchi , S. Turchi , A. Piva , R. D. Labati , V. Piuri , and F. Scotti . 2010. Implementing fingercode-based identity matching in the encrypted domain . In IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications , pp. 15 - 21 . T. Bianchi, S. Turchi, A. Piva, R. D. Labati, V. Piuri, and F. Scotti. 2010. Implementing fingercode-based identity matching in the encrypted domain. In IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications, pp. 15-21."},{"key":"e_1_4_1_77_1","first-page":"3034","volume-title":"CVPR","author":"Bilen H.","unstructured":"H. Bilen , B. Fernando , E. Gavves , A. Vedaldi , and S. Gould . 2016. Dynamic image networks for action recognition . In CVPR , pp. 3034 - 3042 . H. Bilen, B. Fernando, E. Gavves, A. Vedaldi, and S. Gould. 2016. Dynamic image networks for action recognition. In CVPR, pp. 3034-3042."},{"key":"e_1_4_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1360612.1360638"},{"key":"e_1_4_1_79_1","doi-asserted-by":"crossref","unstructured":"M. Blank L. Gorelick E. Shechtman M. Irani and R. Basri. 2005. Actions as space-time shapes. In ICCV. M. Blank L. Gorelick E. Shechtman M. Irani and R. Basri. 2005. Actions as space-time shapes. In ICCV .","DOI":"10.1109\/ICCV.2005.28"},{"key":"e_1_4_1_80_1","unstructured":"D. Bogdanov 2007. Foundations and properties of Shamir's secret sharing scheme. Research Seminar in Cryptography. D. Bogdanov 2007. Foundations and properties of Shamir's secret sharing scheme. Research Seminar in Cryptography."},{"key":"e_1_4_1_81_1","first-page":"13","volume-title":"Proceedings of ACM Workshop on Mobile Cloud Computing (MCC)","author":"Bonomi F.","unstructured":"F. Bonomi , R. Milito , J. Zhu , and S. Addepalli . 2012. Fog computing and its role in the Internet of Things . In Proceedings of ACM Workshop on Mobile Cloud Computing (MCC) , pp. 13 - 16 . F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. 2012. Fog computing and its role in the Internet of Things. In Proceedings of ACM Workshop on Mobile Cloud Computing (MCC), pp. 13-16."},{"key":"e_1_4_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502282"},{"key":"e_1_4_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173899"},{"key":"e_1_4_1_84_1","first-page":"16","volume-title":"Proceedings Conference on Information Science and Systems (CISS)","author":"Boufounos P. T.","unstructured":"P. T. Boufounos and R. G. Baraniuk . March 2008. 1-bit compressive sensing . In Proceedings Conference on Information Science and Systems (CISS) , pp. 16 - 21 . P. T. Boufounos and R. G. Baraniuk. March 2008. 1-bit compressive sensing. In Proceedings Conference on Information Science and Systems (CISS), pp. 16-21."},{"key":"e_1_4_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVIIE.2005.16"},{"key":"e_1_4_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10851-015-0555-2"},{"key":"e_1_4_1_87_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"e_1_4_1_88_1","unstructured":"G. Bradski and A. Kaehler. 2008. Learning OpenCV: Computer Vision with the OpenCV Library. O'Reilly Media. G. Bradski and A. Kaehler. 2008. Learning OpenCV: Computer Vision with the OpenCV Library . O'Reilly Media."},{"key":"e_1_4_1_89_1","first-page":"309","volume-title":"Proceedings of 3rd ACM Innovations in Theoretical Computer Science Conference","author":"Brakerski Z.","unstructured":"Z. Brakerski , C. Gentry , and V. Vaikuntanathan . 2012. (Leveled) fully homomorphic encryption without bootstrapping . In Proceedings of 3rd ACM Innovations in Theoretical Computer Science Conference , pp. 309 - 325 . Z. Brakerski, C. Gentry, and V. Vaikuntanathan. 2012. (Leveled) fully homomorphic encryption without bootstrapping. In Proceedings of 3rd ACM Innovations in Theoretical Computer Science Conference, pp. 309-325."},{"key":"e_1_4_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539852"},{"key":"e_1_4_1_91_1","first-page":"1175","volume-title":"18th International Conference on Pattern Recognition","volume":"1","author":"Brdiczka O.","year":"2006","unstructured":"O. Brdiczka , P. Yuen , S. Zaidenberg , P. Reignier , and J. Crowley . 2006. Automatic acquisition of context models and its application to video surveillance . In 18th International Conference on Pattern Recognition , 2006 (ICPR), volume 1 , pp. 1175 - 1178 . IEEE. O. Brdiczka, P. Yuen, S. Zaidenberg, P. Reignier, and J. Crowley. 2006. Automatic acquisition of context models and its application to video surveillance. In 18th International Conference on Pattern Recognition, 2006 (ICPR), volume 1, pp. 1175-1178. IEEE."},{"key":"e_1_4_1_92_1","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1065725193"},{"key":"e_1_4_1_93_1","first-page":"187","volume-title":"Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security","author":"Bringer J.","unstructured":"J. Bringer , H. Chabanne , M. Favre , A. Patey , T. Schneider , and M. Zohner . 2014. GSHADE: Faster privacy-preserving distance computation and biometric identification . In Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security , pp. 187 - 198 . ACM. J. Bringer, H. Chabanne, M. Favre, A. Patey, T. Schneider, and M. Zohner. 2014. GSHADE: Faster privacy-preserving distance computation and biometric identification. In Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 187-198. ACM."},{"key":"e_1_4_1_94_1","first-page":"21","volume-title":"Proceedings Compression and Complexity of Sequences","author":"Broder A. Z.","year":"1997","unstructured":"A. Z. Broder . June 1997 . On the resemblance and containment of documents . In Proceedings Compression and Complexity of Sequences , p. 21 . A. Z. Broder. June 1997. On the resemblance and containment of documents. In Proceedings Compression and Complexity of Sequences, p. 21."},{"key":"e_1_4_1_95_1","doi-asserted-by":"publisher","DOI":"10.1006\/csla.1994.1016"},{"key":"e_1_4_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2450332"},{"key":"e_1_4_1_97_1","first-page":"1","volume-title":"Proceedings of IEEE International Conference on Cloud and Service Computing (CSC)","author":"Buyya R.","unstructured":"R. Buyya , S. Garg , and R. Calheiros . 2011. SLA-oriented resource provisioning for cloud computing: Challenges . In Proceedings of IEEE International Conference on Cloud and Service Computing (CSC) , pp. 1 - 10 . R. Buyya, S. Garg, and R. Calheiros. 2011. SLA-oriented resource provisioning for cloud computing: Challenges. In Proceedings of IEEE International Conference on Cloud and Service Computing (CSC), pp. 1-10."},{"key":"e_1_4_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2343234"},{"key":"e_1_4_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.22"},{"key":"e_1_4_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2539418"},{"key":"e_1_4_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2590500"},{"key":"e_1_4_1_102_1","doi-asserted-by":"crossref","unstructured":"A. T. Campbell S. B. Eisenman N. D. Lane E. Miluzzo and R. A. Peterson. 2006. People-centric urban sensing. In Int. Work. on Wireless Internet article 18. A. T. Campbell S. B. Eisenman N. D. Lane E. Miluzzo and R. A. Peterson. 2006. People-centric urban sensing. In Int. Work. on Wireless Internet article 18.","DOI":"10.1145\/1234161.1234179"},{"key":"e_1_4_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2044061"},{"key":"e_1_4_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830525"},{"key":"e_1_4_1_105_1","doi-asserted-by":"crossref","unstructured":"C. Canton-Ferrer C. Segura J. R. Casas M. Pardas and J. Hernando. 2008. Audiovisual head orientation estimation with particle filtering in multisensor scenarios. EURASIP Journal on Advances in Signal Processing article 32. C. Canton-Ferrer C. Segura J. R. Casas M. Pardas and J. Hernando. 2008. Audiovisual head orientation estimation with particle filtering in multisensor scenarios. EURASIP Journal on Advances in Signal Processing article 32.","DOI":"10.1155\/2008\/276846"},{"key":"e_1_4_1_106_1","first-page":"1","volume-title":"TechnicalReport","author":"Cao J.","unstructured":"J. Cao , Y.-D. Zhang , Y.-C. Song , Z.-N. Chen , X. Zhang , and J.-T. Li. 2009. MCG-WEBV: A benchmark dataset for web video analysis . TechnicalReport , CAS Institute of Computing Technology , pp. 1 - 10 . J. Cao, Y.-D. Zhang, Y.-C. Song, Z.-N. Chen, X. Zhang, and J.-T. Li. 2009. MCG-WEBV: A benchmark dataset for web video analysis. TechnicalReport, CAS Institute of Computing Technology, pp. 1-10."},{"key":"e_1_4_1_107_1","unstructured":"N. Carrier T. Deutsch C. Gruber M. Heid and L. Jarrett. Aug. 2008. The business case for enterprise mashups. IBM White Paper. N. Carrier T. Deutsch C. Gruber M. Heid and L. Jarrett. Aug. 2008. The business case for enterprise mashups. IBM White Paper."},{"key":"e_1_4_1_108_1","first-page":"1425","volume-title":"ICASSP","volume":"4","author":"Casey M.","unstructured":"M. Casey and M. Slaney . April 2007. Fast recognition of remixed music audio . In ICASSP , volume 4 , pp. 1425 - 1428 . M. Casey and M. Slaney. April 2007. Fast recognition of remixed music audio. In ICASSP, volume 4, pp. 1425-1428."},{"key":"e_1_4_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"e_1_4_1_110_1","volume-title":"ISSN 2048-7703","author":"Chachada S.","year":"2014","unstructured":"S. Chachada and C.-C. J. Kuo . 2014 . Environmental sound recognition: A survey. APSIPA Transactions on Signal and Information Processing, 3 . ISSN 2048-7703 . http:\/\/journals.cambridge.org\/article_S2048770314000122. S. Chachada and C.-C. J. Kuo. 2014. Environmental sound recognition: A survey. APSIPA Transactions on Signal and Information Processing, 3. ISSN 2048-7703. http:\/\/journals.cambridge.org\/article_S2048770314000122."},{"key":"e_1_4_1_111_1","doi-asserted-by":"crossref","unstructured":"S.-F. Chang. 2013. How far we've come: Impact of 20 years of multimedia information retrieval. ACM Transactions on Multimedia Computing Communications and Applications (TOMCCAP) 9(1s): 42. S.-F. Chang. 2013. How far we've come: Impact of 20 years of multimedia information retrieval. ACM Transactions on Multimedia Computing Communications and Applications (TOMCCAP) 9(1s): 42.","DOI":"10.1145\/2491844"},{"key":"e_1_4_1_112_1","first-page":"509","volume-title":"Proceedings of IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID)","author":"Chang V.","unstructured":"V. Chang , D. Bacigalupo , G. Wills , and D. Roure . 2010. Categorisation of cloud computing business models . In Proceedings of IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID) , pp. 509 - 512 . V. Chang, D. Bacigalupo, G. Wills, and D. Roure. 2010. Categorisation of cloud computing business models. In Proceedings of IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID), pp. 509-512."},{"key":"e_1_4_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.413"},{"key":"e_1_4_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/CQR.2011.5996092"},{"key":"e_1_4_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_4_1_116_1","first-page":"1","volume-title":"Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Chattopadhyay A.","unstructured":"A. Chattopadhyay and T. E. Boult . 2007. PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP . In Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition , pp. 1 - 8 . A. Chattopadhyay and T. E. Boult. 2007. PrivacyCam: A privacy preserving camera using uCLinux on the Blackfin DSP. In Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-8."},{"key":"e_1_4_1_118_1","first-page":"197","volume-title":"IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA)","author":"Chaudhuri S.","unstructured":"S. Chaudhuri and B. Raj . 2011. Learning contextual relevance of audio segments using discriminative models over AUD sequences . In IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA) , pp. 197 - 200 . S. Chaudhuri and B. Raj. 2011. Learning contextual relevance of audio segments using discriminative models over AUD sequences. In IEEE Workshop on Applications of Signal Processing to Audio and Acoustics (WASPAA), pp. 197-200."},{"key":"e_1_4_1_119_1","first-page":"1178","article-title":"Unsupervised structure discovery for semantic analysis of audio","volume":"2","author":"Chaudhuri S.","year":"2012","unstructured":"S. Chaudhuri and B. Raj . 2012 . Unsupervised structure discovery for semantic analysis of audio . In Proceedings of Neural Information Processing Systems (NIPS) , 2 : 1178 - 1186 . S. Chaudhuri and B. Raj. 2012. Unsupervised structure discovery for semantic analysis of audio. In Proceedings of Neural Information Processing Systems (NIPS), 2:1178-1186.","journal-title":"Proceedings of Neural Information Processing Systems (NIPS)"},{"key":"e_1_4_1_120_1","first-page":"2265","volume-title":"Proceedings of Interspeech","author":"Chaudhuri S.","unstructured":"S. Chaudhuri , M. Harvilla , and B. Raj . 2011. Unsupervised learning of acoustic unit descriptors for audio content representation and classification . In Proceedings of Interspeech , pp. 2265 - 2268 . S. Chaudhuri, M. Harvilla, and B. Raj. 2011. Unsupervised learning of acoustic unit descriptors for audio content representation and classification. In Proceedings of Interspeech, pp. 2265-2268."},{"key":"e_1_4_1_121_1","first-page":"1726","article-title":"Exploiting temporal sequence structure for semantic analysis of multimedia","volume":"2","author":"Chaudhuri S.","year":"2012","unstructured":"S. Chaudhuri , R. Singh , and B. Raj . 2012 . Exploiting temporal sequence structure for semantic analysis of multimedia . In Proceedings of Interspeech , 2 : 1726 - 1729 . S. Chaudhuri, R. Singh, and B. Raj. 2012. Exploiting temporal sequence structure for semantic analysis of multimedia. In Proceedings of Interspeech, 2:1726-1729.","journal-title":"Proceedings of Interspeech"},{"key":"e_1_4_1_122_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2354681"},{"key":"e_1_4_1_123_1","first-page":"190","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics (ACL)","author":"Chen D. L.","unstructured":"D. L. Chen and W. B. Dolan . 2011. Collecting highly parallel data for paraphrase evaluation . In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics (ACL) , pp. 190 - 200 . D. L. Chen and W. B. Dolan. 2011. Collecting highly parallel data for paraphrase evaluation. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics (ACL), pp. 190-200."},{"key":"e_1_4_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2071991"},{"key":"e_1_4_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2014.6890683"},{"key":"e_1_4_1_126_1","unstructured":"X. Chen H. Fang T.-Y. Lin R. Vedantam S. Gupta P. Doll\u00e1r and C. L. Zitnick. 2015. Microsoft COCO captions: Data collection and evaluation server. arXiv:1504.00325. X. Chen H. Fang T.-Y. Lin R. Vedantam S. Gupta P. Doll\u00e1r and C. L. Zitnick. 2015. Microsoft COCO captions: Data collection and evaluation server. arXiv:1504.00325 ."},{"key":"e_1_4_1_127_1","doi-asserted-by":"publisher","DOI":"10.3390\/s101211259"},{"key":"e_1_4_1_128_1","first-page":"3218","volume-title":"Proceedings of the IEEE International Conference on Computer Vision","author":"Ch\u00e9ron G.","unstructured":"G. Ch\u00e9ron , I. Laptev , and C. Schmid . 2015. P-CNN: Pose-based CNN features for action recognition . In Proceedings of the IEEE International Conference on Computer Vision , pp. 3218 - 3226 . arXiv:1506.03607 [cs.CV] G. Ch\u00e9ron, I. Laptev, and C. Schmid. 2015. P-CNN: Pose-based CNN features for action recognition. In Proceedings of the IEEE International Conference on Computer Vision, pp. 3218-3226. arXiv:1506.03607 [cs.CV]"},{"key":"e_1_4_1_129_1","first-page":"194","volume-title":"Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"Ching Y. W.","unstructured":"Y. W. Ching and P. C. Su . 2009. A region of interest rate-control scheme for encoding traffic surveillance videos . Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing , pp. 194 - 197 . Y. W. Ching and P. C. Su. 2009. A region of interest rate-control scheme for encoding traffic surveillance videos. Proceedings of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 194-197."},{"key":"e_1_4_1_130_1","volume-title":"Proceedings of MediaEval","author":"Choi J.","year":"2011","unstructured":"J. Choi , H. Lei , and G. Friedland . September 2011. The 2011 ICSI video location estimation system . Proceedings of MediaEval 2011 . http:\/\/www.icsi.berkeley.edu\/pubs\/speech\/icsivideolocation11.pdf J. Choi, H. Lei, and G. Friedland. September 2011. The 2011 ICSI video location estimation system. Proceedings of MediaEval 2011. http:\/\/www.icsi.berkeley.edu\/pubs\/speech\/icsivideolocation11.pdf"},{"key":"e_1_4_1_131_1","first-page":"216","volume-title":"Inter. Sym. on Wearable Comp.","author":"Choudhury T.","unstructured":"T. Choudhury and A. Pentland . 2003. Sensing and modeling human networks using the sociometer . In Inter. Sym. on Wearable Comp. , p. 216 . T. Choudhury and A. Pentland. 2003. Sensing and modeling human networks using the sociometer. In Inter. Sym. on Wearable Comp., p. 216."},{"key":"e_1_4_1_132_1","first-page":"597","volume-title":"Proceedings of the 21st ACM International Conference on Multimedia","author":"Chu K.-Y.","unstructured":"K.-Y. Chu , Y.-H. Kuo , and W. H. Hsu . 2013. Real-time privacy-preserving moving object detection in the cloud . In Proceedings of the 21st ACM International Conference on Multimedia , pp. 597 - 600 . K.-Y. Chu, Y.-H. Kuo, and W. H. Hsu. 2013. Real-time privacy-preserving moving object detection in the cloud. In Proceedings of the 21st ACM International Conference on Multimedia, pp. 597-600."},{"key":"e_1_4_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/2671188.2749286"},{"key":"e_1_4_1_134_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6882299"},{"key":"e_1_4_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167838.1167860"},{"key":"e_1_4_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056484"},{"key":"e_1_4_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056483"},{"key":"e_1_4_1_138_1","unstructured":"J. Conway and N. Sloane. 1990. Sphere Packings Lattices and Groups third ed. Springer. ISBN:0-387-96617-X J. Conway and N. Sloane. 1990. Sphere Packings Lattices and Groups third ed. Springer. ISBN:0-387-96617-X"},{"key":"e_1_4_1_139_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.2229005"},{"key":"e_1_4_1_140_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.38.4.668"},{"volume-title":"NEO-PI-R Professional Manual: Revised NEO Personality and NEO Five-Factor Inventory (NEO-FFI)","author":"Costa P. T. J.","key":"e_1_4_1_141_1","unstructured":"P. T. J. Costa and R. R. McCrae . 1992. NEO-PI-R Professional Manual: Revised NEO Personality and NEO Five-Factor Inventory (NEO-FFI) , volume 4 . Psychological Assessment Resources, Odessa , Florida . P. T. J. Costa and R. R. McCrae. 1992. NEO-PI-R Professional Manual: Revised NEO Personality and NEO Five-Factor Inventory (NEO-FFI), volume 4. Psychological Assessment Resources, Odessa, Florida."},{"key":"e_1_4_1_142_1","doi-asserted-by":"crossref","unstructured":"I. Cox J. Kilian T. Leighton and T. Shamoon . 1996 . A secure robust watermark for multimedia. In Information Hiding volume 1174 of Lecture Notes in Computer Science pp. 185 - 206 . Springer . ISBN:3-540-61996-8. I. Cox J. Kilian T. Leighton and T. Shamoon. 1996. A secure robust watermark for multimedia. In Information Hiding volume 1174 of Lecture Notes in Computer Science pp. 185-206. Springer. ISBN:3-540-61996-8.","DOI":"10.1007\/3-540-61996-8_41"},{"key":"e_1_4_1_143_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"volume-title":"British Machine Vision Conference (BMVC), 2(4).","author":"Cristani M.","key":"e_1_4_1_144_1","unstructured":"M. Cristani , L. Bazzani , G. Paggetti , A. Fossati , A. Del Blue , G. Menegaz , and V. Murino . 2011. Social interaction discovery by statistical analysis of F-formations . In British Machine Vision Conference (BMVC), 2(4). M. Cristani, L. Bazzani, G. Paggetti, A. Fossati, A. Del Blue, G. Menegaz, and V. Murino. 2011. Social interaction discovery by statistical analysis of F-formations. In British Machine Vision Conference (BMVC), 2(4)."},{"key":"e_1_4_1_145_1","first-page":"185","volume-title":"Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Cui P.","unstructured":"P. Cui , F. Wang , S. Liu , M. Ou , S. Yang , and L. Sun . 2011. Who should share what?: Item-level social influence prediction for users and posts ranking . In Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval , pp. 185 - 194 . ACM. P. Cui, F. Wang, S. Liu, M. Ou, S. Yang, and L. Sun. 2011. Who should share what?: Item-level social influence prediction for users and posts ranking. In Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 185-194. ACM."},{"key":"e_1_4_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590974"},{"key":"e_1_4_1_147_1","first-page":"597","volume-title":"Proceedings of the 22nd ACM International Conference on Multimedia","author":"Cui P.","unstructured":"P. Cui , Z. Wang , and Z. Su . 2014b. What videos are similar with you?: Learning a common attributed representation for video recommendation . In Proceedings of the 22nd ACM International Conference on Multimedia , pp. 597 - 606 . ACM. P. Cui, Z. Wang, and Z. Su. 2014b. What videos are similar with you?: Learning a common attributed representation for video recommendation. In Proceedings of the 22nd ACM International Conference on Multimedia, pp. 597-606. ACM."},{"key":"e_1_4_1_148_1","first-page":"886","volume-title":"CVPR","author":"Dalal N.","unstructured":"N. Dalal and B. Triggs . 2005. Histograms of oriented gradients for human detection . In CVPR , pp. 886 - 893 . N. Dalal and B. Triggs. 2005. Histograms of oriented gradients for human detection. In CVPR, pp. 886-893."},{"key":"e_1_4_1_149_1","unstructured":"D. J. Daley and D. Vere-Jones. 2003. An Introduction to the Theory of Point Processes 2nd ed. Springer-Verlag New York. D. J. Daley and D. Vere-Jones. 2003. An Introduction to the Theory of Point Processes 2nd ed. Springer-Verlag New York."},{"key":"e_1_4_1_150_1","doi-asserted-by":"crossref","unstructured":"I. Damgard and M. Jurik . 2001 . A generalisation a simplification and some applications of Paillier's probabilistic public-key system. In Proceeedings of 4th International Workshop on Practice and Theory in Public Key Cryptosystems volume 1992 of Lecture Notes in Computer Science pp. 119 - 136 . Springer . I. Damgard and M. Jurik. 2001. A generalisation a simplification and some applications of Paillier's probabilistic public-key system. In Proceeedings of 4 th International Workshop on Practice and Theory in Public Key Cryptosystems volume 1992 of Lecture Notes in Computer Science pp. 119-136. Springer.","DOI":"10.1007\/3-540-44586-2_9"},{"key":"e_1_4_1_151_1","first-page":"777","volume-title":"CVPR","author":"Danfeng Q.","unstructured":"Q. Danfeng , S. Gammeter , L. Bossard , T. Quack , and L. V. Gool . 2011. Hello neighbor: Accurate object retrieval with k-reciprocal nearest neighbors . In CVPR , pp. 777 - 784 . Q. Danfeng, S. Gammeter, L. Bossard, T. Quack, and L. V. Gool. 2011. Hello neighbor: Accurate object retrieval with k-reciprocal nearest neighbors. In CVPR, pp. 777-784."},{"key":"e_1_4_1_152_1","first-page":"2634","volume-title":"CVPR","author":"Das P.","unstructured":"P. Das , C. Xu , R. F. Doell , and J. J. Corso . 2013. A thousand frames in just a few words: Lingual description of videos through latent topics and sparse object stitching . In CVPR , pp. 2634 - 2641 . P. Das, C. Xu, R. F. Doell, and J. J. Corso. 2013. A thousand frames in just a few words: Lingual description of videos through latent topics and sparse object stitching. In CVPR, pp. 2634-2641."},{"key":"e_1_4_1_153_1","first-page":"814","volume-title":"Advances in Applied Probability","author":"Dassios A.","unstructured":"A. Dassios and H. Zhao . 2011. A dynamic contagion process . Advances in Applied Probability , pp. 814 - 846 . A. Dassios and H. Zhao. 2011. A dynamic contagion process. Advances in Applied Probability, pp. 814-846."},{"key":"e_1_4_1_154_1","doi-asserted-by":"publisher","DOI":"10.1214\/ECP.v18-2717"},{"key":"e_1_4_1_155_1","first-page":"253","volume-title":"Proceedings of the Symposium on Computational Geometry","author":"Datar M.","unstructured":"M. Datar , N. Immorlica , P. Indyk , and V. Mirrokni . 2004. Locality-sensitive hashing scheme based on p-stable distributions . In Proceedings of the Symposium on Computational Geometry , pp. 253 - 262 . M. Datar, N. Immorlica, P. Indyk, and V. Mirrokni. 2004. Locality-sensitive hashing scheme based on p-stable distributions. In Proceedings of the Symposium on Computational Geometry, pp. 253-262."},{"key":"e_1_4_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348246.1348248"},{"key":"e_1_4_1_157_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370949"},{"volume-title":"Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM), 10: 34-41","author":"Choudhury M. De","key":"e_1_4_1_158_1","unstructured":"M. De Choudhury , Y.-R. Lin , H. Sundaram , K. S. Candan , L. Xie , and A. Kelliher . 2010. How does the data sampling strategy impact the discovery of information diffusion in social media? Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM), 10: 34-41 . M. De Choudhury, Y.-R. Lin, H. Sundaram, K. S. Candan, L. Xie, and A. Kelliher. 2010. How does the data sampling strategy impact the discovery of information diffusion in social media? Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM), 10: 34-41."},{"key":"e_1_4_1_159_1","unstructured":"F. De la Torre etal 2009. Guide to the Carnegie Mellon University multimodal activity (CMU-MMAC) database. Technical report. F. De la Torre et al. 2009. Guide to the Carnegie Mellon University multimodal activity (CMU-MMAC) database. Technical report."},{"key":"e_1_4_1_160_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098790"},{"key":"e_1_4_1_161_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep05277"},{"key":"e_1_4_1_162_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"key":"e_1_4_1_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_4_1_164_1","first-page":"321","volume-title":"Proceedings of the International Conference on Computer Vision Theory and Applications (VISAPP)","author":"Delvinioti A.","unstructured":"A. Delvinioti , H. J\u00e9gou , L. Amsaleg , and M. Houle . January 2014. Image retrieval with reciprocal and shared nearest neighbors . In Proceedings of the International Conference on Computer Vision Theory and Applications (VISAPP) , pp. 321 - 328 . A. Delvinioti, H. J\u00e9gou, L. Amsaleg, and M. Houle. January 2014. Image retrieval with reciprocal and shared nearest neighbors. In Proceedings of the International Conference on Computer Vision Theory and Applications (VISAPP), pp. 321-328."},{"key":"e_1_4_1_165_1","first-page":"328","volume-title":"ECCV","author":"Demirkus M.","unstructured":"M. Demirkus , D. Precup , J. J. Clark , and T. Arbel . 2014. Probabilistic temporal head pose estimation using a hierarchical graphical model . In ECCV , pp. 328 - 344 . M. Demirkus, D. Precup, J. J. Clark, and T. Arbel. 2014. Probabilistic temporal head pose estimation using a hierarchical graphical model. In ECCV, pp. 328-344."},{"key":"e_1_4_1_166_1","doi-asserted-by":"crossref","unstructured":"J. Deng W. Dong R. Socher L.-J. Li K. Li and L. Fei-Fei. 2009. ImageNet: A large-scale hierarchical image database. In CVPR. J. Deng W. Dong R. Socher L.-J. Li K. Li and L. Fei-Fei. 2009. ImageNet: A large-scale hierarchical image database. In CVPR .","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_4_1_167_1","first-page":"9","volume-title":"Proceedings of ACM International Academic MindTrek Conference: Envisioning Future Media Environments (MindTrek)","author":"Deterding S.","unstructured":"S. Deterding , D. Dixon , R. Khaled , and L. Nacke . 2011. From game design elements to gamefulness: Defining gamification . In Proceedings of ACM International Academic MindTrek Conference: Envisioning Future Media Environments (MindTrek) , pp. 9 - 15 . S. Deterding, D. Dixon, R. Khaled, and L. Nacke. 2011. From game design elements to gamefulness: Defining gamification. In Proceedings of ACM International Academic MindTrek Conference: Envisioning Future Media Environments (MindTrek), pp. 9-15."},{"key":"e_1_4_1_168_1","first-page":"929","volume-title":"2012 International Conference on Computing, Networking and Communications, ICNC'12","author":"Dey S.","unstructured":"S. Dey , C. Invited , and P. Paper . 2012. Cloud mobile media: Opportunities, challenges, and directions . In 2012 International Conference on Computing, Networking and Communications, ICNC'12 , pp. 929 - 933 . S. Dey, C. Invited, and P. Paper. 2012. Cloud mobile media: Opportunities, challenges, and directions. In 2012 International Conference on Computing, Networking and Communications, ICNC'12, pp. 929-933."},{"key":"e_1_4_1_169_1","first-page":"93","volume-title":"Proceedings of the 2004 IEEE International Workshop on Factory Communication Systems","author":"Dietrich D.","unstructured":"D. Dietrich , W. Kastner , T. Maly , C. Roesener , G. Russ , and H. Schweinzer . 2004. Situation modeling . In Proceedings of the 2004 IEEE International Workshop on Factory Communication Systems , pp. 93 - 102 . IEEE. D. Dietrich, W. Kastner, T. Maly, C. Roesener, G. Russ, and H. Schweinzer. 2004. Situation modeling. In Proceedings of the 2004 IEEE International Workshop on Factory Communication Systems, pp. 93-102. IEEE."},{"key":"e_1_4_1_170_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(96)00034-3"},{"key":"e_1_4_1_171_1","doi-asserted-by":"crossref","unstructured":"M. V. Dijk C. Gentry S. Halevi and V. Vaikuntanathan . 2010 . Fully homomorphic encryption over the integers. In Advances in Cryptology--EUROCRYPT volume 6110 of Lecture Notes in Computer Science pp. 24 - 43 . Springer . M. V. Dijk C. Gentry S. Halevi and V. Vaikuntanathan. 2010. Fully homomorphic encryption over the integers. In Advances in Cryptology--EUROCRYPT volume 6110 of Lecture Notes in Computer Science pp. 24-43. Springer.","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_4_1_172_1","first-page":"27","volume-title":"Proceedings of IEEE International Conference on Advanced Information Networking and Applications (AINA)","author":"Dillon T.","unstructured":"T. Dillon , C. Wu , and E. Chang . 2010. Cloud computing: Issues and challenges . In Proceedings of IEEE International Conference on Advanced Information Networking and Applications (AINA) , pp. 27 - 33 . T. Dillon, C. Wu, and E. Chang. 2010. Cloud computing: Issues and challenges. In Proceedings of IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 27-33."},{"key":"e_1_4_1_173_1","volume-title":"TED Conference.","author":"Dimandis P.","year":"2012","unstructured":"P. Dimandis . 2012 . Abundance is our future . In TED Conference. P. Dimandis. 2012. Abundance is our future. In TED Conference."},{"key":"e_1_4_1_174_1","first-page":"1","volume-title":"Proceedings of ACM\/IFIP\/USENIX Middleware","author":"Do N.","unstructured":"N. Do , C. Hsu , and N. Venkatasubramanian . 2012. CrowdMAC: A crowdsourcing system for mobile access . In Proceedings of ACM\/IFIP\/USENIX Middleware , pp. 1 - 20 . N. Do, C. Hsu, and N. Venkatasubramanian. 2012. CrowdMAC: A crowdsourcing system for mobile access. In Proceedings of ACM\/IFIP\/USENIX Middleware, pp. 1-20."},{"key":"e_1_4_1_175_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939376"},{"key":"e_1_4_1_176_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0489-7"},{"key":"e_1_4_1_177_1","volume-title":"Situation awareness: Papers and annotated bibliography. Armstrong Laboratory","author":"Dominguez C.","year":"1994","unstructured":"C. Dominguez , M. Vidulich , E. Vogel , and G. McMillan . 1994. Situation awareness: Papers and annotated bibliography. Armstrong Laboratory , Human System Center , ref. Technical report, AL\/CF-TR- 1994 -0085. C. Dominguez, M. Vidulich, E. Vogel, and G. McMillan. 1994. Situation awareness: Papers and annotated bibliography. Armstrong Laboratory, Human System Center, ref. Technical report, AL\/CF-TR-1994-0085."},{"key":"e_1_4_1_178_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2599174"},{"key":"e_1_4_1_179_1","first-page":"123","volume-title":"Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development (SIGIR)","author":"Dong W.","unstructured":"W. Dong , M. Charikar , and K. Li . July 2008a. Asymmetric distance estimation with sketches for similarity search in high-dimensional spaces . In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development (SIGIR) , pp. 123 - 130 . W. Dong, M. Charikar, and K. Li. July 2008a. Asymmetric distance estimation with sketches for similarity search in high-dimensional spaces. In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development (SIGIR), pp. 123-130."},{"key":"e_1_4_1_180_1","first-page":"669","volume-title":"Proceedings of the 17th Conference on Information and Knowledge Management (CIKM)","author":"Dong W.","unstructured":"W. Dong , Z. Wang , W. Josephson , M. Charikar , and K. Li . October 2008b. Modeling LSH for performance tuning . In Proceedings of the 17th Conference on Information and Knowledge Management (CIKM) , pp. 669 - 678 . W. Dong, Z. Wang, W. Josephson, M. Charikar, and K. Li. October 2008b. Modeling LSH for performance tuning. In Proceedings of the 17th Conference on Information and Knowledge Management (CIKM), pp. 669-678."},{"key":"e_1_4_1_181_1","first-page":"577","volume-title":"Proceedings of the 20th International Conference on World Wide Web (WWW)","author":"Dong W.","unstructured":"W. Dong , M. Charikar , and K. Li . March 2011. Efficient k-nearest neighbor graph construction for generic similarity measures . In Proceedings of the 20th International Conference on World Wide Web (WWW) , pp. 577 - 586 . W. Dong, M. Charikar, and K. Li. March 2011. Efficient k-nearest neighbor graph construction for generic similarity measures. In Proceedings of the 20th International Conference on World Wide Web (WWW), pp. 577-586."},{"key":"e_1_4_1_182_1","doi-asserted-by":"publisher","DOI":"10.1145\/77626.79170"},{"key":"e_1_4_1_183_1","unstructured":"B. Dostal. 2007. Enhancing situational understanding through employment of unmanned aerial vehicle. Army Transformation Taking Shape: Interim Brigade Combat Team Newsletter. B. Dostal. 2007. Enhancing situational understanding through employment of unmanned aerial vehicle. Army Transformation Taking Shape: Interim Brigade Combat Team Newsletter ."},{"key":"e_1_4_1_184_1","first-page":"166","volume-title":"International Joint Conference on Artificial Intelligence","volume":"13","author":"Dousson C.","unstructured":"C. Dousson , P. Gaborit , and M. Ghallab . 1993. Situation recognition: Representation and algorithms . In International Joint Conference on Artificial Intelligence , volume 13 , pp. 166 - 166 . C. Dousson, P. Gaborit, and M. Ghallab. 1993. Situation recognition: Representation and algorithms. In International Joint Conference on Artificial Intelligence, volume 13, pp. 166-166."},{"key":"e_1_4_1_185_1","first-page":"140","volume-title":"Proceedings of the ACM International Conference on Image and Video Retrieval","author":"Douze M.","unstructured":"M. Douze , H. J\u00e9gou , H. Singh , L. Amsaleg , and C. Schmid . July 2009. Evaluation of GIST descriptors for web-scale image search . In Proceedings of the ACM International Conference on Image and Video Retrieval , pp. 140 - 147 . M. Douze, H. J\u00e9gou, H. Singh, L. Amsaleg, and C. Schmid. July 2009. Evaluation of GIST descriptors for web-scale image search. In Proceedings of the ACM International Conference on Image and Video Retrieval, pp. 140-147."},{"key":"e_1_4_1_186_1","first-page":"785","volume-title":"ECCV","author":"Douze M.","unstructured":"M. Douze , H. J\u00e9gou , and F. Perronnin . October 2016. PCIV Rolysemous codes . In ECCV , pp. 785 - 801 . M. Douze, H. J\u00e9gou, and F. Perronnin. October 2016. PCIV Rolysemous codes. In ECCV, pp. 785-801."},{"key":"e_1_4_1_187_1","doi-asserted-by":"publisher","DOI":"10.1250\/ast.29.247"},{"key":"e_1_4_1_188_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9362-y"},{"volume-title":"Protecting personal data in camera surveillance practices","author":"Dubbeld L.","key":"e_1_4_1_189_1","unstructured":"L. Dubbeld . 2002. Protecting personal data in camera surveillance practices . Surveillance & Society , 2(4). L. Dubbeld. 2002. Protecting personal data in camera surveillance practices. Surveillance & Society, 2(4)."},{"key":"e_1_4_1_190_1","unstructured":"R. Duda and P. Hart. 1996. Pattern Classification and Scene Analysis. Wiley. R. Duda and P. Hart. 1996. Pattern Classification and Scene Analysis . Wiley."},{"key":"e_1_4_1_191_1","first-page":"268","volume-title":"International Society for Optics and Photonics. Optical Science and Technology","author":"Dufaux F.","unstructured":"F. Dufaux and T. Ebrahimi . 2004. Video surveillance using JPEG 2000 . In International Society for Optics and Photonics. Optical Science and Technology , pp. 268 - 275 . F. Dufaux and T. Ebrahimi. 2004. Video surveillance using JPEG 2000. In International Society for Optics and Photonics. Optical Science and Technology, pp. 268-275."},{"key":"e_1_4_1_192_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.928225"},{"key":"e_1_4_1_193_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_4_1_194_1","doi-asserted-by":"publisher","DOI":"10.1080\/02699939208411068"},{"key":"e_1_4_1_195_1","first-page":"2049","volume-title":"Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems","author":"Ali A. El","unstructured":"A. El Ali , A. Matviienko , Y. Feld , W. Heuten , and S. Boll . 2016. VapeTracker: Tracking vapor consumption to help e-cigarette users quit . In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems , pp. 2049 - 2056 . ACM. A. El Ali, A. Matviienko, Y. Feld, W. Heuten, and S. Boll. 2016. VapeTracker: Tracking vapor consumption to help e-cigarette users quit. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2049-2056. ACM."},{"key":"e_1_4_1_196_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19480"},{"key":"e_1_4_1_197_1","first-page":"79","volume-title":"Proceedings of ACM International Conference on Management of Data (SIGMOD)","author":"Elgamal T.","unstructured":"T. Elgamal , M. Yabandeh , A. Aboulnaga , W. Mustafa , and M. Hefeeda . 2015. sPCA: Scalable principal component analysis for big data on distributed platforms . In Proceedings of ACM International Conference on Management of Data (SIGMOD) , pp. 79 - 91 . T. Elgamal, M. Yabandeh, A. Aboulnaga, W. Mustafa, and M. Hefeeda. 2015. sPCA: Scalable principal component analysis for big data on distributed platforms. In Proceedings of ACM International Conference on Management of Data (SIGMOD), pp. 79-91."},{"key":"e_1_4_1_198_1","unstructured":"P. Elias and L. Roberts. 1963. Machine Perception of Three-Dimensional Solids. PhD thesis Massachusetts Institute of Technology. http:\/\/hdl.handle.net\/1721.1\/11589. P. Elias and L. Roberts. 1963. Machine Perception of Three-Dimensional Solids . PhD thesis Massachusetts Institute of Technology. http:\/\/hdl.handle.net\/1721.1\/11589."},{"key":"e_1_4_1_199_1","first-page":"27","volume-title":"Proceedings of ACM Multimedia 2012 (MM'12)","author":"Elizalde B.","unstructured":"B. Elizalde , G. Friedland , H. Lei , and A. Divakaran . October 2012. There is no data like less data: percepts for video concept detection on consumer-produced media . In Proceedings of ACM Multimedia 2012 (MM'12) , pp. 27 - 32 . B. Elizalde, G. Friedland, H. Lei, and A. Divakaran. October 2012. There is no data like less data: percepts for video concept detection on consumer-produced media. In Proceedings of ACM Multimedia 2012 (MM'12), pp. 27-32."},{"key":"e_1_4_1_200_1","unstructured":"B. Elizalde A. Kumar R. Badlani A. Bhatnagar A. Shah R. Singh B. Raj and I. Lane 2016. Never Ending Learning of Sound. http:\/\/nels.cs.cmu.edu. B. Elizalde A. Kumar R. Badlani A. Bhatnagar A. Shah R. Singh B. Raj and I. Lane 2016. Never Ending Learning of Sound. http:\/\/nels.cs.cmu.edu."},{"key":"e_1_4_1_201_1","doi-asserted-by":"publisher","DOI":"10.1080\/09298210701653344"},{"key":"e_1_4_1_202_1","first-page":"1429","volume-title":"Proceedings of the ICASSP-07","author":"Ellis D. P. W.","unstructured":"D. P. W. Ellis and G. Poliner . 2007. Identifying cover songs with chroma features and dynamic programming beat tracking . In Proceedings of the ICASSP-07 , pp. 1429 - 1432 . Hawai'i. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/EllisP07-coversongs.pdf. D. P. W. Ellis and G. Poliner. 2007. Identifying cover songs with chroma features and dynamic programming beat tracking. In Proceedings of the ICASSP-07, pp. 1429-1432. Hawai'i. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/EllisP07-coversongs.pdf."},{"key":"e_1_4_1_203_1","first-page":"517","volume-title":"(ICASSP","author":"Ellis D. P. W.","unstructured":"D. P. W. Ellis , R. Singh , and S. Sivadas . 2001. Tandem acoustic modeling in large-vocabulary recognition . In (ICASSP , pp. I- 517 - 520 . Salt Lake City. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/icassp01-spine.pdf. D. P. W. Ellis, R. Singh, and S. Sivadas. 2001. Tandem acoustic modeling in large-vocabulary recognition. In (ICASSP, pp. I-517-520. Salt Lake City. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/icassp01-spine.pdf."},{"key":"e_1_4_1_204_1","doi-asserted-by":"publisher","DOI":"10.1239\/jap\/1318940477"},{"key":"e_1_4_1_205_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.1988.195097"},{"key":"e_1_4_1_206_1","unstructured":"Z. Erkin A. Piva S. Katzenbeisser R. L. Lagendijk J. Shokrollahi G. Neven and M. Barni 2006. SPEED project. http:\/\/www.speedproject.eu\/. Z. Erkin A. Piva S. Katzenbeisser R. L. Lagendijk J. Shokrollahi G. Neven and M. Barni 2006. SPEED project. http:\/\/www.speedproject.eu\/."},{"key":"e_1_4_1_207_1","volume-title":"EURASIP Journal on Information Security","author":"Erkin Z.","year":"2007","unstructured":"Z. Erkin , A. Piva , S. Katzenbeisser , R. L. Lagendijk , J. Shokrollahi , G. Neven , and M. Barni . 2007. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing . EURASIP Journal on Information Security , 2007 , article 78943. Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi, G. Neven, and M. Barni. 2007. Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing. EURASIP Journal on Information Security, 2007, article 78943."},{"key":"e_1_4_1_208_1","doi-asserted-by":"crossref","unstructured":"Z. Erkin M. Franz J. Guajardo S. Katzenbeisser I. Lagendijk and T. Toft . 2009 . Privacy-preserving face recognition. In Proceedings of the 9th International Symposium Privacy Enhancing Technologies volume 5672 of Lecture Notes in Computer Science pp. 235 - 253 . Springer . Z. Erkin M. Franz J. Guajardo S. Katzenbeisser I. Lagendijk and T. Toft. 2009. Privacy-preserving face recognition. In Proceedings of the 9 th International Symposium Privacy Enhancing Technologies volume 5672 of Lecture Notes in Computer Science pp. 235- 253. Springer.","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"e_1_4_1_209_1","first-page":"5864","volume-title":"(ICASSP)","author":"Erkin Z.","unstructured":"Z. Erkin , M. Beye , T. Veugeri , and R. L. Lagendijk . 2011. Efficiently computing private recommendations . In (ICASSP) , pp. 5864 - 5867 . Z. Erkin, M. Beye, T. Veugeri, and R. L. Lagendijk. 2011. Efficiently computing private recommendations. In (ICASSP), pp. 5864-5867."},{"key":"e_1_4_1_210_1","first-page":"459","volume-title":"ECCV Workshops","author":"Escalera S.","unstructured":"S. Escalera , X. Bar , J. Gonzlez , M. A. Bautista , M. Madadi , M. Reyes , V. Ponce , H. J. Escalante , J. Shotton , and I. Guyon . 2014. ChaLearn Looking at People Challenge 2014: Dataset and results . In ECCV Workshops , pp. 459 - 473 . S. Escalera, X. Bar, J. Gonzlez, M. A. Bautista, M. Madadi, M. Reyes, V. Ponce, H. J. Escalante, J. Shotton, and I. Guyon. 2014. ChaLearn Looking at People Challenge 2014: Dataset and results. In ECCV Workshops, pp. 459-473."},{"key":"e_1_4_1_211_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2443271"},{"key":"e_1_4_1_212_1","unstructured":"M. Everingham L. Van Gool C. K. I. Williams J. Winn and A. Zisserman. 2012. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http:\/\/www.pascalnetwork.org\/challenges\/VOC\/voc2012\/workshop\/index.html. M. Everingham L. Van Gool C. K. I. Williams J. Winn and A. Zisserman. 2012. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http:\/\/www.pascalnetwork.org\/challenges\/VOC\/voc2012\/workshop\/index.html."},{"key":"e_1_4_1_213_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-014-0733-5"},{"volume-title":"Dimensions of Personality","author":"Eysenck H. J.","key":"e_1_4_1_214_1","unstructured":"H. J. Eysenck . 1947. Dimensions of Personality . The International Library of Psychology. Transaction Publishers . H. J. Eysenck. 1947. Dimensions of Personality. The International Library of Psychology. Transaction Publishers."},{"key":"e_1_4_1_215_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275488"},{"key":"e_1_4_1_216_1","first-page":"301","volume-title":"SIGMOD","author":"Fagin R.","unstructured":"R. Fagin , R. Kumar , and D. Sivakumar . 2003. Efficient similarity search and classification via rank aggregation . In SIGMOD , pp. 301 - 312 . R. Fagin, R. Kumar, and D. Sivakumar. 2003. Efficient similarity search and classification via rank aggregation. In SIGMOD, pp. 301-312."},{"key":"e_1_4_1_217_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.12"},{"key":"e_1_4_1_218_1","first-page":"171","volume-title":"Proceedings of the Symposium on the Foundations of Computer Science","author":"Indyk Farach-Colton","unstructured":"Farach-Colton and P. Indyk . October 1999. Approximate nearest neighbor algorithms for Hausdorff metrics via embeddings . In Proceedings of the Symposium on the Foundations of Computer Science , pp. 171 - 179 . Farach-Colton and P. Indyk. October 1999. Approximate nearest neighbor algorithms for Hausdorff metrics via embeddings. In Proceedings of the Symposium on the Foundations of Computer Science, pp. 171-179."},{"key":"e_1_4_1_219_1","first-page":"1933","volume-title":"CVPR","author":"Feichtenhofer C.","unstructured":"C. Feichtenhofer , A. Pinz , and A. Zisserman . 2016. Convolutional two-stream network fusion for video action recognition . In CVPR , pp. 1933 - 1941 . C. Feichtenhofer, A. Pinz, and A. Zisserman. 2016. Convolutional two-stream network fusion for video action recognition. In CVPR, pp. 1933-1941."},{"key":"e_1_4_1_220_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"e_1_4_1_221_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.410146"},{"key":"e_1_4_1_222_1","doi-asserted-by":"publisher","DOI":"10.5555\/2907333.2907524"},{"key":"e_1_4_1_223_1","first-page":"841","volume-title":"Proceedings of the 2016 ACM Conference on Designing Interactive Systems, DIS '16","author":"Fortmann J.","unstructured":"J. Fortmann , E. Root , S. Boll , and W. Heuten . 2016. Tangible apps bracelet: Designing modular wrist-worn digital jewellery for multiple purposes . In Proceedings of the 2016 ACM Conference on Designing Interactive Systems, DIS '16 , pp. 841 - 852 . ACM, New York. J. Fortmann, E. Root, S. Boll, and W. Heuten. 2016. Tangible apps bracelet: Designing modular wrist-worn digital jewellery for multiple purposes. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems, DIS '16, pp. 841-852. ACM, New York."},{"key":"e_1_4_1_224_1","first-page":"1","article-title":"Comparing scanpaths during scene encoding and recognition: A multi-dimensional approach","author":"Foulsham T.","year":"2012","unstructured":"T. Foulsham , R. Dewhurst , M. Nystr\u00f6m , H. Jarodzka , R. Johansson , G. Underwood , and K. Holmqvist . 2012 . Comparing scanpaths during scene encoding and recognition: A multi-dimensional approach . Journal of Eye Movement Research, 5(4:3) : 1 - 14 . T. Foulsham, R. Dewhurst, M. Nystr\u00f6m, H. Jarodzka, R. Johansson, G. Underwood, and K. Holmqvist. 2012. Comparing scanpaths during scene encoding and recognition: A multi-dimensional approach. Journal of Eye Movement Research, 5(4:3): 1-14.","journal-title":"Journal of Eye Movement Research, 5(4:3)"},{"key":"e_1_4_1_225_1","first-page":"103","volume-title":"Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security","author":"Franz M.","unstructured":"M. Franz and S. Katzenbeisser . 2011. Processing encrypted floating point signals . In Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security , pp. 103 - 108 . ACM. M. Franz and S. Katzenbeisser. 2011. Processing encrypted floating point signals. In Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, pp. 103-108. ACM."},{"key":"e_1_4_1_226_1","first-page":"25","volume-title":"Proceedings of the IEEE Workshop on Information Forensics and Security (WIFS)","author":"Franz M.","unstructured":"M. Franz , B. Deiseroth , K. Hamacher , S. Katzenbeisser , S. Jha , and H. Schroeder . 2010. Secure computations on real-valued signals . In Proceedings of the IEEE Workshop on Information Forensics and Security (WIFS) , pp. 25 - 27 . M. Franz, B. Deiseroth, K. Hamacher, S. Katzenbeisser, S. Jha, and H. Schroeder. 2010. Secure computations on real-valued signals. In Proceedings of the IEEE Workshop on Information Forensics and Security (WIFS), pp. 25-27."},{"key":"e_1_4_1_227_1","first-page":"115","volume-title":"Semantic Computing","author":"Friedland G.","unstructured":"G. Friedland and D. van Leeuwen . 2010. Speaker recognition and diarization . In Semantic Computing , pp. 115 - 130 . IEEE Press\/Wileys . G. Friedland and D. van Leeuwen. 2010. Speaker recognition and diarization. In Semantic Computing, pp. 115-130. IEEE Press\/Wileys."},{"key":"e_1_4_1_228_1","doi-asserted-by":"publisher","DOI":"10.1145\/355744.355745"},{"key":"e_1_4_1_229_1","doi-asserted-by":"crossref","unstructured":"J.-J. Fuchs. November 2011. Spread representations. In ASILOMAR. J.-J. Fuchs. November 2011. Spread representations. In ASILOMAR .","DOI":"10.1109\/ACSSC.2011.6190120"},{"key":"e_1_4_1_230_1","first-page":"464","volume-title":"Proceedings International Computer Music Conference","author":"Fujishima T.","year":"1999","unstructured":"T. Fujishima . 1999 . Realtime chord recognition of musical sound: A system using Common Lisp music . In Proceedings International Computer Music Conference , pp. 464 - 467 . http:\/\/www-ccrma.stanford.edu\/~jos\/mus423h\/Real_Time_Chord_Recognition_Musical.html. T. Fujishima. 1999. Realtime chord recognition of musical sound: A system using Common Lisp music. In Proceedings International Computer Music Conference, pp. 464-467. http:\/\/www-ccrma.stanford.edu\/~jos\/mus423h\/Real_Time_Chord_Recognition_Musical.html."},{"key":"e_1_4_1_231_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00344251"},{"key":"e_1_4_1_232_1","volume-title":"Research Report RR-8244, INRIA.","author":"Furon T.","year":"2013","unstructured":"T. Furon and H. J\u00e9gou . February 2013 . Using extreme value theory for image detection. Research Report RR-8244, INRIA. T. Furon and H. J\u00e9gou. February 2013. Using extreme value theory for image detection. Research Report RR-8244, INRIA."},{"key":"e_1_4_1_233_1","first-page":"73","volume-title":"WIFS","author":"Furon T.","unstructured":"T. Furon , H. J\u00e9gou , L. Amsaleg , and B. Mathon . November 2013. Fast and secure similarity search in high dimensional space . In WIFS , pp. 73 - 78 . T. Furon, H. J\u00e9gou, L. Amsaleg, and B. Mathon. November 2013. Fast and secure similarity search in high dimensional space. In WIFS, pp. 73-78."},{"key":"e_1_4_1_234_1","unstructured":"GaiKai. January 2015. GaiKai web page. http:\/\/www.gaikai.com\/. GaiKai. January 2015. GaiKai web page. http:\/\/www.gaikai.com\/."},{"key":"e_1_4_1_235_1","unstructured":"GamingAnywhere Repository. 2013. GamingAnywhere: An open source cloud gaming project. http:\/\/gaminganywhere.org. GamingAnywhere Repository. 2013. GamingAnywhere: An open source cloud gaming project. http:\/\/gaminganywhere.org."},{"key":"e_1_4_1_236_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"e_1_4_1_238_1","first-page":"105","volume-title":"Proceedings of the 4th Annual ACM Web Science Conference","author":"Gao M.","unstructured":"M. Gao , V. K. Singh , and R. Jain . 2012. EventShop: From heterogeneous web streams to personalized situation detection and control . In Proceedings of the 4th Annual ACM Web Science Conference , pp. 105 - 108 . ACM. M. Gao, V. K. Singh, and R. Jain. 2012. EventShop: From heterogeneous web streams to personalized situation detection and control. In Proceedings of the 4th Annual ACM Web Science Conference, pp. 105-108. ACM."},{"key":"e_1_4_1_239_1","doi-asserted-by":"publisher","DOI":"10.1109\/SLT.2012.6424243"},{"key":"e_1_4_1_240_1","first-page":"2455","volume-title":"INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association","author":"Garc\u00eda-Perera L. P.","year":"2013","unstructured":"L. P. Garc\u00eda-Perera , B. Raj , and J. A. Nolazco-Flores . 2013a. Ensemble approach in speaker verification . In INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association , Lyon, France , August 25-29, 2013 , pp. 2455 - 2459 . L. P. Garc\u00eda-Perera, B. Raj, and J. A. Nolazco-Flores. 2013a. Ensemble approach in speaker verification. In INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, Lyon, France, August 25-29, 2013, pp. 2455-2459."},{"key":"e_1_4_1_241_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639175"},{"key":"e_1_4_1_242_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.01.004"},{"key":"e_1_4_1_243_1","first-page":"744","volume-title":"CVPR","author":"Ge T.","unstructured":"T. Ge , K. He , Q. Ke , and J. Sun . June 2013. Optimized product quantization for approximate nearest neighbor search . In CVPR , pp. 744 - 755 . T. Ge, K. He, Q. Ke, and J. Sun. June 2013. Optimized product quantization for approximate nearest neighbor search. In CVPR, pp. 744-755."},{"key":"e_1_4_1_244_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2522425"},{"key":"e_1_4_1_245_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016587515822"},{"key":"e_1_4_1_246_1","doi-asserted-by":"crossref","unstructured":"X. Geng and Y. Xia. 2014. Head pose estimation based on multivariate label distribution. In CVPR. X. Geng and Y. Xia. 2014. Head pose estimation based on multivariate label distribution. In CVPR .","DOI":"10.1109\/CVPR.2014.237"},{"key":"e_1_4_1_248_1","doi-asserted-by":"crossref","unstructured":"L. Georgiadis M. Neely and L. Tassiulas. 2006. Resource allocation and cross-layer control in wireless networks. Foundations and Trends in Networking. L. Georgiadis M. Neely and L. Tassiulas. 2006. Resource allocation and cross-layer control in wireless networks. Foundations and Trends in Networking .","DOI":"10.1561\/9781933019697"},{"key":"e_1_4_1_249_1","first-page":"51","volume-title":"Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation, Washington DC","volume":"1","author":"Ghosh I.","unstructured":"I. Ghosh and V. Singh . 2016. Predicting privacy attitudes using phone metadata . In Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation, Washington DC , volume 1 , pp. 51 - 60 . I. Ghosh and V. Singh. 2016. Predicting privacy attitudes using phone metadata. In Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation, Washington DC, volume 1, pp. 51-60."},{"key":"e_1_4_1_250_1","doi-asserted-by":"crossref","unstructured":"D. Giannoulis E. Benetos D. Stowell M. Rossignol M. Lagrange and M. Plumbley 2013. IEEE AASP challenge: Detection and classification of acoustic scenes and events. Web resource available: http:\/\/c4dm.eecs.qmul.ac.uk\/sceneseventschallenge\/. D. Giannoulis E. Benetos D. Stowell M. Rossignol M. Lagrange and M. Plumbley 2013. IEEE AASP challenge: Detection and classification of acoustic scenes and events. Web resource available: http:\/\/c4dm.eecs.qmul.ac.uk\/sceneseventschallenge\/.","DOI":"10.1109\/WASPAA.2013.6701819"},{"volume-title":"International Conference on Multimedia & Expo (ICME).","author":"Gilani S. O.","key":"e_1_4_1_251_1","unstructured":"S. O. Gilani , R. Subramanian , Y. Yan , D. Melcher , N. Sebe , and S. Winkler . 2015. PET: An eye-tracking dataset for animal-centric Pascal object classes . In International Conference on Multimedia & Expo (ICME). S. O. Gilani, R. Subramanian, Y. Yan, D. Melcher, N. Sebe, and S. Winkler. 2015. PET: An eye-tracking dataset for animal-centric Pascal object classes. In International Conference on Multimedia & Expo (ICME)."},{"key":"e_1_4_1_252_1","first-page":"518","volume-title":"Proceedings of the International Conference on Very Large Databases","author":"Gionis A.","unstructured":"A. Gionis , P. Indyk , and R. Motwani . 1999. Similarity search in high dimension via hashing . In Proceedings of the International Conference on Very Large Databases , pp. 518 - 529 . A. Gionis, P. Indyk, and R. Motwani. 1999. Similarity search in high dimension via hashing. In Proceedings of the International Conference on Very Large Databases, pp. 518-529."},{"key":"e_1_4_1_253_1","first-page":"374","volume-title":"2008 34th Euromicro Conference Software Engineering and Advanced Applications","author":"Girolami M.","unstructured":"M. Girolami , S. Lenzi , F. Furfari , and S. Chessa . 2008. SAIL: A sensor abstraction and integration layer for context awareness . In 2008 34th Euromicro Conference Software Engineering and Advanced Applications , pp. 374 - 381 . IEEE. M. Girolami, S. Lenzi, F. Furfari, and S. Chessa. 2008. SAIL: A sensor abstraction and integration layer for context awareness. In 2008 34th Euromicro Conference Software Engineering and Advanced Applications, pp. 374-381. IEEE."},{"key":"e_1_4_1_254_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_4_1_255_1","first-page":"580","volume-title":"CVPR","author":"Girshick R.","unstructured":"R. Girshick , J. Donahue , T. Darrell , and J. Malik . 2014. Rich feature hierarchies for accurate object detection and semantic segmentation . In CVPR , pp. 580 - 587 . R. Girshick, J. Donahue, T. Darrell, and J. Malik. 2014. Rich feature hierarchies for accurate object detection and semantic segmentation. In CVPR, pp. 580-587."},{"key":"e_1_4_1_256_1","first-page":"757","volume-title":"NIPS","author":"Goldberg A.","unstructured":"A. Goldberg , B. Recht , J. Xu , R. Nowak , and X. Zhu . 2010. Transduction with matrix completion: Three birds with one stone . In NIPS , pp. 757 - 765 . A. Goldberg, B. Recht, J. Xu, R. Nowak, and X. Zhu. 2010. Transduction with matrix completion: Three birds with one stone. In NIPS, pp. 757-765."},{"key":"e_1_4_1_257_1","unstructured":"D. Goldman. Apr. 2012. Google unveils 'Project Glass' virtual-reality glasses. In Money. D. Goldman. Apr. 2012. Google unveils 'Project Glass' virtual-reality glasses. In Money ."},{"key":"e_1_4_1_258_1","first-page":"218","volume-title":"Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing","author":"Goldreich O.","unstructured":"O. Goldreich , S. Micali , and A. Wigderson . 1987. How to play any mental game . In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing , pp. 218 - 229 . ACM. O. Goldreich, S. Micali, and A. Wigderson. 1987. How to play any mental game. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218-229. ACM."},{"key":"e_1_4_1_259_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_4_1_260_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1000814107"},{"key":"e_1_4_1_261_1","first-page":"817","volume-title":"CVPR","author":"Gong Y.","unstructured":"Y. Gong and S. Lazebnik . June 2011. Iterative quantization: A procrustean approach to learning binary codes . In CVPR , pp. 817 - 824 . Y. Gong and S. Lazebnik. June 2011. Iterative quantization: A procrustean approach to learning binary codes. In CVPR, pp. 817-824."},{"key":"e_1_4_1_262_1","first-page":"9","volume-title":"Proceedings of IEEE International Conference on Network and Service Management (CNSM)","author":"Gong Z.","unstructured":"Z. Gong , X. Gu , and J. Wilkes . 2010. PRESS: Predictive elastic resource scaling for cloud systems . In Proceedings of IEEE International Conference on Network and Service Management (CNSM) , pp. 9 - 16 . Z. Gong, X. Gu, and J. Wilkes. 2010. PRESS: Predictive elastic resource scaling for cloud systems. In Proceedings of IEEE International Conference on Network and Service Management (CNSM), pp. 9-16."},{"key":"e_1_4_1_263_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"e_1_4_1_264_1","first-page":"1319","volume-title":"Proceedings of the International Conference on Machine Learning (ICML)","author":"Goodfellow I. J.","unstructured":"I. J. Goodfellow , D. Warde-Farley , M. Mirza , A. C. Courville , and Y. Bengio . 2013. Maxout networks . In Proceedings of the International Conference on Machine Learning (ICML) , pp. 1319 - 1327 . I. J. Goodfellow, D. Warde-Farley, M. Mirza, A. C. Courville, and Y. Bengio. 2013. Maxout networks. In Proceedings of the International Conference on Machine Learning (ICML), pp. 1319-1327."},{"key":"e_1_4_1_265_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.193"},{"key":"e_1_4_1_266_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224298204600109"},{"key":"e_1_4_1_267_1","first-page":"3365","volume-title":"Proceedings ICASSP-2001","author":"Goto M.","year":"2001","unstructured":"M. Goto . 2001 . A predominant-F0 estimation method for CD recordings: Map estimation using EM algorithm for adaptive tone models . In Proceedings ICASSP-2001 , pp. 3365 - 3368 . M. Goto. 2001. A predominant-F0 estimation method for CD recordings: Map estimation using EM algorithm for adaptive tone models. In Proceedings ICASSP-2001, pp. 3365-3368."},{"key":"e_1_4_1_268_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.650985"},{"key":"e_1_4_1_269_1","first-page":"27","volume-title":"Proceedings of IEEE International Conference on Parallel and Distributed Systems (ICPADS)","author":"Graffi K.","unstructured":"K. Graffi , D. Stingl , C. Gross , H. Nguyen , A. Kovacevic , and R. Steinmetz . 2010. Towards a P2P cloud: Reliable resource reservations in unreliable P2P systems . In Proceedings of IEEE International Conference on Parallel and Distributed Systems (ICPADS) , pp. 27 - 34 . K. Graffi, D. Stingl, C. Gross, H. Nguyen, A. Kovacevic, and R. Steinmetz. 2010. Towards a P2P cloud: Reliable resource reservations in unreliable P2P systems. In Proceedings of IEEE International Conference on Parallel and Distributed Systems (ICPADS), pp. 27-34."},{"volume-title":"Supervised Sequence Labelling with Recurrent Neural Networks","author":"Graves A.","key":"e_1_4_1_270_1","unstructured":"A. Graves . 2012. Supervised Sequence Labelling with Recurrent Neural Networks . Springer . A. Graves. 2012. Supervised Sequence Labelling with Recurrent Neural Networks. Springer."},{"key":"e_1_4_1_271_1","first-page":"6645","volume-title":"ICASSP","author":"Graves A.","unstructured":"A. Graves , A. Mohamed , and G. E. Hinton . 2013. Speech recognition with deep recurrent neural networks . In ICASSP , pp. 6645 - 6649 . A. Graves, A. Mohamed, and G. E. Hinton. 2013. Speech recognition with deep recurrent neural networks. In ICASSP, pp. 6645-6649."},{"key":"e_1_4_1_272_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.720541"},{"key":"e_1_4_1_273_1","unstructured":"J. Gu Z. Wang J. Kuen L. Ma A. Shahroudy B. Shuai T. Liu X. Wang and G. Wang. 2016. Recent advances in convolutional neural networks. In arXiv:1512.07108. J. Gu Z. Wang J. Kuen L. Ma A. Shahroudy B. Shuai T. Liu X. Wang and G. Wang. 2016. Recent advances in convolutional neural networks. In arXiv:1512.07108 ."},{"key":"e_1_4_1_274_1","first-page":"2712","volume-title":"ICCV","author":"Guadarrama S.","unstructured":"S. Guadarrama , N. Krishnamoorthy , G. Malkarnenkar , S. Venugopalan , R. Mooney , T. Darrell , and K. Saenko . 2013. YouTube2Text: Recognizing and describing arbitrary activities using semantic hierarchies and zero-shot recognition . In ICCV , pp. 2712 - 2719 . S. Guadarrama, N. Krishnamoorthy, G. Malkarnenkar, S. Venugopalan, R. Mooney, T. Darrell, and K. Saenko. 2013. YouTube2Text: Recognizing and describing arbitrary activities using semantic hierarchies and zero-shot recognition. In ICCV, pp. 2712-2719."},{"key":"e_1_4_1_275_1","first-page":"271","volume-title":"Proceedings of the 3rd ACM International Conference on Multimedia Retrieval","author":"Guo J.","unstructured":"J. Guo , C. Gurrin , and S. Lao . 2013. Who produced this video, amateur or professional ? In Proceedings of the 3rd ACM International Conference on Multimedia Retrieval , pp. 271 - 278 . ACM. J. Guo, C. Gurrin, and S. Lao. 2013. Who produced this video, amateur or professional? In Proceedings of the 3rd ACM International Conference on Multimedia Retrieval, pp. 271-278. ACM."},{"key":"e_1_4_1_276_1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(85)90139-4"},{"key":"e_1_4_1_277_1","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"e_1_4_1_278_1","unstructured":"H. Haddadi H. Howard A. Chaudhry J. Crowcroft A. Madhavapeddy and R. Mortier. 2015. Personal data: Thinking inside the box. In arXiv:1501.04737. H. Haddadi H. Howard A. Chaudhry J. Crowcroft A. Madhavapeddy and R. Mortier. 2015. Personal data: Thinking inside the box. In arXiv:1501.04737 ."},{"key":"e_1_4_1_279_1","doi-asserted-by":"crossref","unstructured":"A. Hanjalic. 2013. Multimedia retrieval that matters. ACM Transactions on Multimedia Computing Communications and Applications (TOMCCAP) 9(1s): 44. A. Hanjalic. 2013. Multimedia retrieval that matters. ACM Transactions on Multimedia Computing Communications and Applications (TOMCCAP) 9(1s): 44.","DOI":"10.1145\/2490827"},{"key":"e_1_4_1_280_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2004.840618"},{"key":"e_1_4_1_281_1","first-page":"1239","volume-title":"Proceedings of the 20th ACM International Conference on Multimedia","author":"Hanjalic A.","unstructured":"A. Hanjalic , C. Kofler , and M. Larson . 2012. Intent and its discontents: The user at the wheel of the online video search engine . In Proceedings of the 20th ACM International Conference on Multimedia , pp. 1239 - 1248 . ACM. A. Hanjalic, C. Kofler, and M. Larson. 2012. Intent and its discontents: The user at the wheel of the online video search engine. In Proceedings of the 20th ACM International Conference on Multimedia, pp. 1239-1248. ACM."},{"volume-title":"Matrix Algebra from a Statistician's Perspective","author":"Harville D. A.","key":"e_1_4_1_282_1","unstructured":"D. A. Harville . 1998. Matrix Algebra from a Statistician's Perspective . Springer-verlag . D. A. Harville. 1998. Matrix Algebra from a Statistician's Perspective. Springer-verlag."},{"key":"e_1_4_1_283_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/58.1.83"},{"key":"e_1_4_1_284_1","doi-asserted-by":"publisher","DOI":"10.2307\/3212693"},{"key":"e_1_4_1_285_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.7973835"},{"key":"e_1_4_1_286_1","first-page":"2938","volume-title":"CVPR","author":"He K.","unstructured":"K. He , F. Wen , and J. Sun . June 2013. K-means hashing: An affinity-preserving quantization method for learning binary compact codes . In CVPR , pp. 2938 - 2945 . K. He, F. Wen, and J. Sun. June 2013. K-means hashing: An affinity-preserving quantization method for learning binary compact codes. In CVPR, pp. 2938-2945."},{"key":"e_1_4_1_287_1","first-page":"630","volume-title":"ECCV","author":"He K.","unstructured":"K. He , X. Zhang , S. Ren , and J. Sun . 2016a. Identity mappings in deep residual networks . In ECCV , pp. 630 - 645 . K. He, X. Zhang, S. Ren, and J. Sun. 2016a. Identity mappings in deep residual networks. In ECCV, pp. 630-645."},{"key":"e_1_4_1_288_1","first-page":"770","volume-title":"CVPR","author":"He K.","unstructured":"K. He , X. Zhang , S. Ren , and J. Sun . 2016b. Deep residual learning for image recognition . In CVPR , pp. 770 - 778 . K. He, X. Zhang, S. Ren, and J. Sun. 2016b. Deep residual learning for image recognition. In CVPR, pp. 770-778."},{"key":"e_1_4_1_289_1","first-page":"1","volume-title":"2014 IEEE International Conference on Multimedia and Expo Workshops (ICME)","author":"He L.","unstructured":"L. He , G. Liu , and C. Yuchen . Jul . 2014. Buffer status and content aware scheduling scheme for cloud gaming based on video streaming . In 2014 IEEE International Conference on Multimedia and Expo Workshops (ICME) , pp. 1 - 6 . L. He, G. Liu, and C. Yuchen. Jul. 2014. Buffer status and content aware scheduling scheme for cloud gaming based on video streaming. In 2014 IEEE International Conference on Multimedia and Expo Workshops (ICME), pp. 1-6."},{"key":"e_1_4_1_290_1","first-page":"1914","volume-title":"CVPR","author":"Heilbron F. C.","unstructured":"F. C. Heilbron , V. Escorcia , B. Ghanem , and J. C. Niebles . 2015. ActivityNet: A large-scale video benchmark for human activity understanding . In CVPR , pp. 1914 - 1923 . F. C. Heilbron, V. Escorcia, B. Ghanem, and J. C. Niebles. 2015. ActivityNet: A large-scale video benchmark for human activity understanding. In CVPR, pp. 1914-1923."},{"key":"e_1_4_1_291_1","first-page":"7","volume-title":"Proceedings of the 23rd ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV '13","author":"Hemmati M.","unstructured":"M. Hemmati , A. Javadtalab , A. A. Nazari Shirehjini , S. Shirmohammadi , and T. Arici . 2013. Game as video: Bit rate reduction through adaptive object encoding . In Proceedings of the 23rd ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV '13 , pp. 7 - 12 . ACM, New York. M. Hemmati, A. Javadtalab, A. A. Nazari Shirehjini, S. Shirmohammadi, and T. Arici. 2013. Game as video: Bit rate reduction through adaptive object encoding. In Proceedings of the 23rd ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV '13, pp. 7-12. ACM, New York."},{"key":"e_1_4_1_292_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2008.11.001"},{"key":"e_1_4_1_293_1","first-page":"270","article-title":"System for distributing, processing and displaying financial information","volume":"5","author":"Higgins G.","year":"1993","unstructured":"G. Higgins . December 14 , 1993 . System for distributing, processing and displaying financial information . US Patent 5 , 270 ,922. G. Higgins. December 14, 1993. System for distributing, processing and displaying financial information. US Patent 5,270,922.","journal-title":"US Patent"},{"key":"e_1_4_1_294_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_4_1_295_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_4_1_296_1","doi-asserted-by":"crossref","unstructured":"M. Hirt and K. Sako . 2000 . Efficient receipt-free voting based on homomorphic encryption. In Advances in Cryptology volume 1807 of Lecture Notes in Computer Science pp. 539 - 556 . Springer . M. Hirt and K. Sako. 2000. Efficient receipt-free voting based on homomorphic encryption. In Advances in Cryptology volume 1807 of Lecture Notes in Computer Science pp. 539-556. Springer.","DOI":"10.1007\/3-540-45539-6_38"},{"key":"e_1_4_1_297_1","doi-asserted-by":"publisher","DOI":"10.1145\/276305.276326"},{"key":"e_1_4_1_298_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_4_1_299_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587351"},{"key":"e_1_4_1_300_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2338295"},{"key":"e_1_4_1_301_1","first-page":"336","volume-title":"Proceedings of IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","author":"Hong H.","unstructured":"H. Hong , J. Chuang , and C. Hsu . 2016a. Animation rendering on multimedia fog computing platforms . In Proceedings of IEEE International Conference on Cloud Computing Technology and Science (CloudCom) , pp. 336 - 343 . H. Hong, J. Chuang, and C. Hsu. 2016a. Animation rendering on multimedia fog computing platforms. In Proceedings of IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 336-343."},{"key":"e_1_4_1_302_1","first-page":"1","volume-title":"Proceedings of the Asia-Pacific Network Operations and Management Symposium (APNOMS)","author":"Hong H.","unstructured":"H. Hong , P. Tsai , and C. Hsu . 2016b. Dynamic module deployment in a fog computing platform . In Proceedings of the Asia-Pacific Network Operations and Management Symposium (APNOMS) , pp. 1 - 6 . H. Hong, P. Tsai, and C. Hsu. 2016b. Dynamic module deployment in a fog computing platform. In Proceedings of the Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1-6."},{"key":"e_1_4_1_303_1","first-page":"1","article-title":"Placing virtual machines to optimize cloud gaming experience","author":"Hong H.-J.","year":"2014","unstructured":"H.-J. Hong , D.-Y. Chen , C.-Y. Huang , K.-T. Chen , and C.-H. Hsu . 2014 a. Placing virtual machines to optimize cloud gaming experience . IEEE Transactions on Cloud Computing , pp. 1 - 2 . http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=6853364. H.-J. Hong, D.-Y. Chen, C.-Y. Huang, K.-T. Chen, and C.-H. Hsu. 2014a. Placing virtual machines to optimize cloud gaming experience. IEEE Transactions on Cloud Computing, pp. 1-2. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=6853364.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"e_1_4_1_304_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755535.2755539"},{"key":"e_1_4_1_305_1","doi-asserted-by":"publisher","DOI":"10.1145\/2713168.2713176"},{"key":"e_1_4_1_306_1","first-page":"637","volume-title":"Proceedings of the 17th ACM International Conference on Multimedia","author":"Hsu C. Y.","unstructured":"C. Y. Hsu , C. S. Lu , and S. C. Pei . 2009. Secure and robust SIFT . In Proceedings of the 17th ACM International Conference on Multimedia , pp. 637 - 640 . C. Y. Hsu, C. S. Lu, and S. C. Pei. 2009. Secure and robust SIFT. In Proceedings of the 17th ACM International Conference on Multimedia, pp. 637-640."},{"volume-title":"Proceedings of the International Society for Optics and Photonics, IS&T\/SPIE Electronic Imaging, 7880(788005)","author":"Hsu C. Y.","key":"e_1_4_1_307_1","unstructured":"C. Y. Hsu , C. S. Lu , and S. C. Pei . 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction . Proceedings of the International Society for Optics and Photonics, IS&T\/SPIE Electronic Imaging, 7880(788005) . C. Y. Hsu, C. S. Lu, and S. C. Pei. 2011. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction. Proceedings of the International Society for Optics and Photonics, IS&T\/SPIE Electronic Imaging, 7880(788005)."},{"key":"e_1_4_1_308_1","volume-title":"NIPS","volume":"13","author":"Hu G.","unstructured":"G. Hu and D. L. Wang . 2003. Monaural speech separation . In NIPS , volume 13 . MIT Press, Cambridge MA. G. Hu and D. L. Wang. 2003. Monaural speech separation. In NIPS, volume 13. MIT Press, Cambridge MA."},{"key":"e_1_4_1_309_1","first-page":"243","volume-title":"Proceedings of the 21st ACM International Conference on Multimedia","author":"Hua X.-S.","unstructured":"X.-S. Hua , L. Yang , J. Wang , J. Wang , M. Ye , K. Wang , Y. Rui , and J. Li . 2013. Clickage: Towards bridging semantic and intent gaps via mining click logs of search engines . In Proceedings of the 21st ACM International Conference on Multimedia , pp. 243 - 252 . ACM. X.-S. Hua, L. Yang, J. Wang, J. Wang, M. Ye, K. Wang, Y. Rui, and J. Li. 2013. Clickage: Towards bridging semantic and intent gaps via mining click logs of search engines. In Proceedings of the 21st ACM International Conference on Multimedia, pp. 243- 252. ACM."},{"key":"e_1_4_1_310_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502222"},{"key":"e_1_4_1_311_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594449.2579468"},{"key":"e_1_4_1_312_1","doi-asserted-by":"crossref","unstructured":"C.-Y. Huang K.-T. Chen D.-Y. Chen H.-J. Hsu and C.-H. Hsu. Jan. 2014a. GamingAnywhere: The first open source cloud gaming system. ACM Transactions on Multimedia Computer Communication Applications 10(1s): 10:1-25. C.-Y. Huang K.-T. Chen D.-Y. Chen H.-J. Hsu and C.-H. Hsu. Jan. 2014a. GamingAnywhere: The first open source cloud gaming system. ACM Transactions on Multimedia Computer Communication Applications 10(1s): 10:1-25.","DOI":"10.1145\/2537855"},{"key":"e_1_4_1_313_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755535.2755542"},{"key":"e_1_4_1_314_1","first-page":"222","article-title":"The state use of closed circuit TV: Is there a reasonable expectation of privacy in public","volume":"49","author":"Hubbard R. W.","year":"2004","unstructured":"R. W. Hubbard , S. Magotiaux , and M. Sullivan . 2004 . The state use of closed circuit TV: Is there a reasonable expectation of privacy in public ? Crim. LQ , 49 : 222 . R. W. Hubbard, S. Magotiaux, and M. Sullivan. 2004. The state use of closed circuit TV: Is there a reasonable expectation of privacy in public? Crim. LQ, 49: 222.","journal-title":"Crim. LQ"},{"key":"e_1_4_1_315_1","doi-asserted-by":"publisher","DOI":"10.1113\/jphysiol.1968.sp008455"},{"key":"e_1_4_1_316_1","first-page":"231","volume-title":"Proceedings of the 13th International Conference on Multimodal Interfaces (ICMI)","author":"Hung H.","unstructured":"H. Hung and B. Kr\u00f6se . 2011. Detecting F-formations as dominant sets . In Proceedings of the 13th International Conference on Multimodal Interfaces (ICMI) , pp. 231 - 238 . H. Hung and B. Kr\u00f6se. 2011. Detecting F-formations as dominant sets. In Proceedings of the 13th International Conference on Multimodal Interfaces (ICMI), pp. 231-238."},{"key":"e_1_4_1_317_1","unstructured":"ICSI U. Berkeley Yahoo and LLNL. 2015. The Multimedia Commons Project. http:\/\/mmcommons.org. ICSI U. Berkeley Yahoo and LLNL. 2015. The Multimedia Commons Project. http:\/\/mmcommons.org."},{"key":"e_1_4_1_318_1","doi-asserted-by":"crossref","unstructured":"H. Idrees A. R. Zamir Y.-G. Jiang A. Gorban I. Laptev R. Sukthankar and M. Shah. 2016. The THUMOS challenge on action recognition for videos \"in the wild.\" In arXiv:1604.06182. H. Idrees A. R. Zamir Y.-G. Jiang A. Gorban I. Laptev R. Sukthankar and M. Shah. 2016. The THUMOS challenge on action recognition for videos \"in the wild.\" In arXiv:1604.06182 .","DOI":"10.1016\/j.cviu.2016.10.018"},{"key":"e_1_4_1_319_1","doi-asserted-by":"publisher","DOI":"10.5555\/2209820.2210665"},{"key":"e_1_4_1_320_1","doi-asserted-by":"publisher","DOI":"10.1145\/513400.513414"},{"key":"e_1_4_1_321_1","first-page":"604","volume-title":"STOC","author":"Indyk P.","unstructured":"P. Indyk and R. Motwani . 1998. Approximate nearest neighbors: Towards removing the curse of dimensionality . In STOC , pp. 604 - 613 . P. Indyk and R. Motwani. 1998. Approximate nearest neighbors: Towards removing the curse of dimensionality. In STOC, pp. 604-613."},{"key":"e_1_4_1_322_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273340.1273347"},{"volume-title":"International Workshop on Statistical and Computational Theories of Vision, ICCV Workshop.","author":"Indyk P.","key":"e_1_4_1_323_1","unstructured":"P. Indyk and N. Thaper . Oct . 2003. Fast image retrieval via embeddings . In International Workshop on Statistical and Computational Theories of Vision, ICCV Workshop. P. Indyk and N. Thaper. Oct. 2003. Fast image retrieval via embeddings. In International Workshop on Statistical and Computational Theories of Vision, ICCV Workshop."},{"key":"e_1_4_1_324_1","unstructured":"Infinity Research. Dec. 2016. Global Cloud Gaming Market 2017-2021. http:\/\/www.technavio.com\/report\/global-gaming-global-cloud-gaming-market-2017-2021. Infinity Research. Dec. 2016. Global Cloud Gaming Market 2017-2021. http:\/\/www.technavio.com\/report\/global-gaming-global-cloud-gaming-market-2017-2021."},{"key":"e_1_4_1_325_1","first-page":"448","volume-title":"ICML","author":"Ioffe S.","unstructured":"S. Ioffe and C. Szegedy . 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift . In ICML , pp. 448 - 456 . S. Ioffe and C. Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In ICML, pp. 448-456."},{"key":"e_1_4_1_326_1","first-page":"979","volume-title":"Proceedings of IEEE 8th International Symposium on Multimedia","author":"Iqbal R.","unstructured":"R. Iqbal , S. Shirmohammadi , and A. E. Saddik . 2006. Compressed-domain encryption of adapted H.264 video . Proceedings of IEEE 8th International Symposium on Multimedia , pp. 979 - 984 . R. Iqbal, S. Shirmohammadi, and A. E. Saddik. 2006. Compressed-domain encryption of adapted H.264 video. Proceedings of IEEE 8th International Symposium on Multimedia, pp. 979-984."},{"key":"e_1_4_1_327_1","doi-asserted-by":"crossref","unstructured":"N. Islam W. Puech and R. Brouzet . 2009 . A homomorphic method for sharing secret images. In Proceedings of the 8th International Workshop on Digital Watermarking volume 5703 of Lecture Notes in Computer Science pp. 121 - 135 . Springer . N. Islam W. Puech and R. Brouzet. 2009. A homomorphic method for sharing secret images. In Proceedings of the 8 th International Workshop on Digital Watermarking volume 5703 of Lecture Notes in Computer Science pp. 121-135. Springer.","DOI":"10.1007\/978-3-642-03688-0_13"},{"key":"e_1_4_1_328_1","first-page":"512","volume-title":"18th International Conference on Advanced Information Networking and Applications","volume":"1","author":"Isoda Y.","unstructured":"Y. Isoda , S. Kurakake , and H. Nakano . 2004. Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states . In 18th International Conference on Advanced Information Networking and Applications , volume 1 , pp. 512 - 517 . IEEE. Y. Isoda, S. Kurakake, and H. Nakano. 2004. Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In 18th International Conference on Advanced Information Networking and Applications, volume 1, pp. 512-517. IEEE."},{"key":"e_1_4_1_329_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(99)00163-7"},{"key":"e_1_4_1_330_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.730558"},{"key":"e_1_4_1_331_1","first-page":"681","volume-title":"ECCV","author":"Jain H.","unstructured":"H. Jain , P. P\u00e9rez , R. Gribonval , J. Zepeda , and H. J\u00e9gou . October 2016. Approximate search with quantized sparse representations . In ECCV , pp. 681 - 696 . H. Jain, P. P\u00e9rez, R. Gribonval, J. Zepeda, and H. J\u00e9gou. October 2016. Approximate search with quantized sparse representations. In ECCV, pp. 681-696."},{"key":"e_1_4_1_332_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.86"},{"key":"e_1_4_1_333_1","first-page":"1","volume-title":"Military Communications Conference","author":"Jakobson G.","year":"2006","unstructured":"G. Jakobson , J. Buford , and L. Lewis . Oct . 2006. A framework of cognitive situation modeling and recognition . In Military Communications Conference , 2006 . IEEE, pp. 1 - 7 . G. Jakobson, J. Buford, and L. Lewis. Oct. 2006. A framework of cognitive situation modeling and recognition. In Military Communications Conference, 2006. IEEE, pp. 1-7."},{"key":"e_1_4_1_334_1","first-page":"397","volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Jamali M.","unstructured":"M. Jamali and M. Ester . 2009. TrustWalker: A random walk model for combining trust-based and item-based recommendation . In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 397 - 406 . ACM. M. Jamali and M. Ester. 2009. TrustWalker: A random walk model for combining trust-based and item-based recommendation. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 397-406. ACM."},{"key":"e_1_4_1_335_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2006.06.005"},{"volume-title":"2006 3rd IEEE Consumer Communications and Networking Conference, 2: 994- 997","author":"Jarvinen S.","key":"e_1_4_1_336_1","unstructured":"S. Jarvinen , J.-P. Laulajainen , T. Sutinen , and S. Sallinen . 2006. QoS-aware real-time video encoding how to improve the user experience of a gaming-on-demand service . 2006 3rd IEEE Consumer Communications and Networking Conference, 2: 994- 997 . http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=1593187. S. Jarvinen, J.-P. Laulajainen, T. Sutinen, and S. Sallinen. 2006. QoS-aware real-time video encoding how to improve the user experience of a gaming-on-demand service. 2006 3rd IEEE Consumer Communications and Networking Conference, 2: 994- 997. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=1593187."},{"key":"e_1_4_1_337_1","unstructured":"E. Jeannot C. Kelly and D. Thompson. 2003. The development of situation awareness measures in ATM systems. EATMP Report HRS\/HSP-005-REP-01. E. Jeannot C. Kelly and D. Thompson. 2003. The development of situation awareness measures in ATM systems. EATMP Report HRS\/HSP-005-REP-01."},{"key":"e_1_4_1_338_1","first-page":"1","volume-title":"CVPR","author":"J\u00e9gou H.","unstructured":"H. J\u00e9gou , H. Harzallah , and C. Schmid . June 2007. A contextual dissimilarity measure for accurate and efficient image search . In CVPR , pp. 1 - 8 . H. J\u00e9gou, H. Harzallah, and C. Schmid. June 2007. A contextual dissimilarity measure for accurate and efficient image search. In CVPR, pp. 1-8."},{"key":"e_1_4_1_339_1","first-page":"825","volume-title":"ICASSP","author":"J\u00e9gou H.","unstructured":"H. J\u00e9gou , L. Amsaleg , C. Schmid , and P. Gros . April 2008a. Query-adaptive locality sensitive hashing . In ICASSP , pp. 825 - 828 . H. J\u00e9gou, L. Amsaleg, C. Schmid, and P. Gros. April 2008a. Query-adaptive locality sensitive hashing. In ICASSP, pp. 825-828."},{"key":"e_1_4_1_340_1","first-page":"304","volume-title":"ECCV","author":"J\u00e9gou H.","unstructured":"H. J\u00e9gou , M. Douze , and C. Schmid . October 2008b. Hamming embedding and weak geometric consistency for large scale image search . In ECCV , pp. 304 - 317 . H. J\u00e9gou, M. Douze, and C. Schmid. October 2008b. Hamming embedding and weak geometric consistency for large scale image search. In ECCV, pp. 304-317."},{"key":"e_1_4_1_341_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0285-2"},{"key":"e_1_4_1_342_1","first-page":"3304","volume-title":"CVPR","author":"J\u00e9gou H.","unstructured":"H. J\u00e9gou , M. Douze , C. Schmid , and P. P\u00e9rez . June 2010b. Aggregating local descriptors into a compact image representation . In CVPR , pp. 3304 - 3311 . H. J\u00e9gou, M. Douze, C. Schmid, and P. P\u00e9rez. June 2010b. Aggregating local descriptors into a compact image representation. In CVPR, pp. 3304-3311."},{"key":"e_1_4_1_343_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.285"},{"key":"e_1_4_1_344_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.57"},{"key":"e_1_4_1_345_1","first-page":"861","volume-title":"ICASSP","author":"J\u00e9gou H.","unstructured":"H. J\u00e9gou , R. Tavenard , M. Douze , and L. Amsaleg . May 2011. Searching in one billion vectors: Re-rank with source coding . In ICASSP , pp. 861 - 864 . H. J\u00e9gou, R. Tavenard, M. Douze, and L. Amsaleg. May 2011. Searching in one billion vectors: Re-rank with source coding. In ICASSP, pp. 861-864."},{"key":"e_1_4_1_346_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288307"},{"key":"e_1_4_1_347_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2008.2012314"},{"key":"e_1_4_1_348_1","first-page":"108","volume-title":"NIPS","author":"Ji J.","unstructured":"J. Ji , J. Li , S. Yan , B. Zhang , and Q. Tian . Dec . 2012. Super-bit locality-sensitive hashing . In NIPS , pp. 108 - 116 . J. Ji, J. Li, S. Yan, B. Zhang, and Q. Tian. Dec. 2012. Super-bit locality-sensitive hashing. In NIPS, pp. 108-116."},{"key":"e_1_4_1_349_1","first-page":"221","volume-title":"ICML","author":"Ji S.","unstructured":"S. Ji , W. Xu , M. Yang , and K. Yu . 2010. 3D convolutional neural networks for human action recognition . In ICML , pp. 221 - 231 . S. Ji, W. Xu, M. Yang, and K. Yu. 2010. 3D convolutional neural networks for human action recognition. In ICML, pp. 221-231."},{"key":"e_1_4_1_350_1","first-page":"45","volume-title":"Proceedings of the 21st ACM International Conference on Information and Knowledge Management","author":"Jiang M.","unstructured":"M. Jiang , P. Cui , R. Liu , Q. Yang , F. Wang , W. Zhu , and S. Yang . 2012a. Social contextual recommendation . In Proceedings of the 21st ACM International Conference on Information and Knowledge Management , pp. 45 - 54 . ACM. M. Jiang, P. Cui, R. Liu, Q. Yang, F. Wang, W. Zhu, and S. Yang. 2012a. Social contextual recommendation. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 45-54. ACM."},{"key":"e_1_4_1_351_1","first-page":"1422","volume-title":"Proceedings of the 21st ACM International Conference on Information and Knowledge Management","author":"Jiang M.","unstructured":"M. Jiang , P. Cui , F. Wang , Q. Yang , W. Zhu , and S. Yang . 2012b. Social recommendation across multiple relational domains . In Proceedings of the 21st ACM International Conference on Information and Knowledge Management , pp. 1422 - 1431 . ACM. M. Jiang, P. Cui, F. Wang, Q. Yang, W. Zhu, and S. Yang. 2012b. Social recommendation across multiple relational domains. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1422-1431. ACM."},{"key":"e_1_4_1_352_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2300487"},{"key":"e_1_4_1_353_1","first-page":"29","volume-title":"ACM International Conference on Multimedia Retrieval (ICMR)","author":"Jiang Y.-G.","unstructured":"Y.-G. Jiang , G. Ye , S.-F. Chang , D. Ellis , and A. C. Loui . 2011. Consumer video understanding: A benchmark database and an evaluation of human and machine performance . In ACM International Conference on Multimedia Retrieval (ICMR) , p. 29 . Y.-G. Jiang, G. Ye, S.-F. Chang, D. Ellis, and A. C. Loui. 2011. Consumer video understanding: A benchmark database and an evaluation of human and machine performance. In ACM International Conference on Multimedia Retrieval (ICMR), p. 29."},{"key":"e_1_4_1_354_1","first-page":"73","volume-title":"International Journal of Multimedia Information Retrieval (IJMIR)","author":"Jiang Y.-G.","unstructured":"Y.-G. Jiang , S. Bhattacharya , S.-F. Chang , and M. Shah . 2013. High-level event recognition in unconstrained videos . International Journal of Multimedia Information Retrieval (IJMIR) , pp. 73 - 101 . Y.-G. Jiang, S. Bhattacharya, S.-F. Chang, and M. Shah. 2013. High-level event recognition in unconstrained videos. International Journal of Multimedia Information Retrieval (IJMIR), pp. 73-101."},{"key":"e_1_4_1_355_1","unstructured":"Y.-G. Jiang J. Liu A. Roshan Zamir G. Toderici I. Laptev M. Shah and R. Sukthankar. 2014b. THUMOS challenge: Action recognition with a large number of classes. http:\/\/crcv.ucf.edu\/THUMOS14\/. Y.-G. Jiang J. Liu A. Roshan Zamir G. Toderici I. Laptev M. Shah and R. Sukthankar. 2014b. THUMOS challenge: Action recognition with a large number of classes. http:\/\/crcv.ucf.edu\/THUMOS14\/."},{"key":"e_1_4_1_356_1","unstructured":"Y.-G. Jiang Z. Wu J. Wang X. Xue and S.-F. Chang. 2015. Exploiting feature and class relationships in video categorization with regularized deep neural networks. arXiv:1502.07209. Y.-G. Jiang Z. Wu J. Wang X. Xue and S.-F. Chang. 2015. Exploiting feature and class relationships in video categorization with regularized deep neural networks. arXiv:1502.07209 ."},{"key":"e_1_4_1_357_1","first-page":"1235","volume-title":"Proceedings of the International Conference on Multimedia","author":"Jin X.","unstructured":"X. Jin , A. Gallagher , L. Cao , J. Luo , and J. Han . 2010. The wisdom of social multimedia: Using Flickr for prediction and forecast . In Proceedings of the International Conference on Multimedia , pp. 1235 - 1244 . ACM. X. Jin, A. Gallagher, L. Cao, J. Luo, and J. Han. 2010. The wisdom of social multimedia: Using Flickr for prediction and forecast. In Proceedings of the International Conference on Multimedia, pp. 1235-1244. ACM."},{"key":"e_1_4_1_358_1","first-page":"257","volume-title":"ICCV","author":"Jin Z.","unstructured":"Z. Jin , Y. Hu , Y. Lin , D. Zhang , S. Lin , D. Cai , and X. Li. Dec . 2013. Complementary projection hashing . In ICCV , pp. 257 - 264 . Z. Jin, Y. Hu, Y. Lin, D. Zhang, S. Lin, D. Cai, and X. Li. Dec. 2013. Complementary projection hashing. In ICCV, pp. 257-264."},{"key":"e_1_4_1_359_1","first-page":"200","volume-title":"ICML","author":"Joachims T.","year":"1999","unstructured":"T. Joachims . 1999 . Transductive inference for text classification using SVM . In ICML , pp. 200 - 209 . T. Joachims. 1999. Transductive inference for text classification using SVM. In ICML, pp. 200-209."},{"key":"e_1_4_1_360_1","unstructured":"J. Johnson M. Douze and H. J\u00e9gou. Feb. 2017. Billion-scale similarity search with GPU. arXiv:1702.08734. J. Johnson M. Douze and H. J\u00e9gou. Feb. 2017. Billion-scale similarity search with GPU. arXiv:1702.08734 ."},{"key":"e_1_4_1_361_1","doi-asserted-by":"crossref","unstructured":"W. B. Johnson and J. Lindenstrauss. 1984. Extensions of Lipschitz mappings into a Hilbert space. Contemp. Math. (26): 189-206. W. B. Johnson and J. Lindenstrauss. 1984. Extensions of Lipschitz mappings into a Hilbert space. Contemp. Math. (26): 189-206.","DOI":"10.1090\/conm\/026\/737400"},{"key":"e_1_4_1_362_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0632-x"},{"key":"e_1_4_1_363_1","first-page":"209","volume-title":"ACM Multimedia","author":"Joly A.","unstructured":"A. Joly and O. Buisson . 2008. A posteriori multi-probe locality sensitive hashing . In ACM Multimedia , pp. 209 - 218 . A. Joly and O. Buisson. 2008. A posteriori multi-probe locality sensitive hashing. In ACM Multimedia, pp. 209-218."},{"key":"e_1_4_1_364_1","first-page":"581","volume-title":"ACM Multimedia","author":"Joly A.","unstructured":"A. Joly and O. Buisson . Oct . 2009. Logo retrieval with a contrario visual query expansion . In ACM Multimedia , pp. 581 - 584 . A. Joly and O. Buisson. Oct. 2009. Logo retrieval with a contrario visual query expansion. In ACM Multimedia, pp. 581-584."},{"key":"e_1_4_1_365_1","first-page":"873","volume-title":"CVPR","author":"Joly A.","unstructured":"A. Joly and O. Buisson . 2011. Random maximum margin hashing . In CVPR , pp. 873 - 880 . A. Joly and O. Buisson. 2011. Random maximum margin hashing. In CVPR, pp. 873-880."},{"key":"e_1_4_1_366_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.941851"},{"key":"e_1_4_1_367_1","first-page":"2106","volume-title":"ICCV","author":"Judd T.","unstructured":"T. Judd , K. Ehinger , F. Durand , and A. Torralba . 2009. Learning to predict where humans look . In ICCV , pp. 2106 - 2113 . T. Judd, K. Ehinger, F. Durand, and A. Torralba. 2009. Learning to predict where humans look. In ICCV, pp. 2106-2113."},{"key":"e_1_4_1_368_1","series-title":"Lecture Notes in Computer Science","first-page":"26","volume-title":"Information Hiding","author":"Kalker T.","unstructured":"T. Kalker . 2007. A cryptographic method for secure watermark detection . In Information Hiding , volume 4437 of Lecture Notes in Computer Science , pp. 26 - 41 . Springer . T. Kalker. 2007. A cryptographic method for secure watermark detection. In Information Hiding, volume 4437 of Lecture Notes in Computer Science, pp. 26-41. Springer."},{"volume-title":"Foundations of Modern Probability","author":"Kallenberg O.","key":"e_1_4_1_369_1","unstructured":"O. Kallenberg . 2006. Foundations of Modern Probability . Springer Science & Business Media . O. Kallenberg. 2006. Foundations of Modern Probability. Springer Science & Business Media."},{"key":"e_1_4_1_370_1","unstructured":"V. Kalofolias X. Bresson M. Bronstein and P. Vandergheynst. 2014. Matrix completion on graphs. arXiv:1408.1717. V. Kalofolias X. Bresson M. Bronstein and P. Vandergheynst. 2014. Matrix completion on graphs. arXiv:1408.1717 ."},{"key":"e_1_4_1_371_1","doi-asserted-by":"publisher","DOI":"10.3141\/1857-09"},{"key":"e_1_4_1_372_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.908465"},{"key":"e_1_4_1_373_1","first-page":"1","volume-title":"CVPR","author":"Kapoor A.","unstructured":"A. Kapoor , P. Shenoy , and D. Tan . 2008. Combining brain computer interfaces with vision for object categorization . In CVPR , pp. 1 - 8 . A. Kapoor, P. Shenoy, and D. Tan. 2008. Combining brain computer interfaces with vision for object categorization. In CVPR, pp. 1-8."},{"key":"e_1_4_1_374_1","first-page":"1725","volume-title":"CVPR","author":"Karpathy A.","unstructured":"A. Karpathy , G. Toderici , S. Shetty , T. Leung , R. Sukthankar , and L. Fei-Fei . 2014. Large-scale video classification with convolutional neural networks . In CVPR , pp. 1725 - 1732 . A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar, and L. Fei-Fei. 2014. Large-scale video classification with convolutional neural networks. In CVPR, pp. 1725-1732."},{"key":"e_1_4_1_375_1","first-page":"869","volume-title":"ACM Multimedia","author":"Ke Y.","unstructured":"Y. Ke , R. Sukthankar , and L. Huston . 2004. Efficient near-duplicate detection and subimage retrieval . In ACM Multimedia , pp. 869 - 876 . Y. Ke, R. Sukthankar, and L. Huston. 2004. Efficient near-duplicate detection and subimage retrieval. In ACM Multimedia, pp. 869-876."},{"key":"e_1_4_1_376_1","doi-asserted-by":"publisher","DOI":"10.1093\/scan\/nsr059"},{"volume-title":"Conducting Interaction: Patterns of Behavior in Focused Encounters","author":"Kendon A.","key":"e_1_4_1_377_1","unstructured":"A. Kendon . 1990. Conducting Interaction: Patterns of Behavior in Focused Encounters , volume 7 . Cambridge University Press Archive , Cambridge . A. Kendon. 1990. Conducting Interaction: Patterns of Behavior in Focused Encounters, volume 7. Cambridge University Press Archive, Cambridge."},{"key":"e_1_4_1_378_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information Systems Security","author":"Keromytis A. D.","unstructured":"A. D. Keromytis . 2009. A survey of voice over IP security research . In Information Systems Security , volume 5905 of Lecture Notes in Computer Science , pp. 1 - 17 . Springer . A. D. Keromytis. 2009. A survey of voice over IP security research. In Information Systems Security, volume 5905 of Lecture Notes in Computer Science, pp. 1-17. Springer."},{"key":"e_1_4_1_379_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.10.001"},{"key":"e_1_4_1_380_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.892710"},{"key":"e_1_4_1_381_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.26"},{"key":"e_1_4_1_382_1","first-page":"102","volume-title":"AFIN 2011, The Third International Conference on Advances in Future Internet","author":"Kim S.-S.","year":"2081","unstructured":"S.-S. Kim , K.-I. Kim , and J. Won . 2011. Multi-view rendering approach for cloud-based gaming services . In AFIN 2011, The Third International Conference on Advances in Future Internet , pp. 102 - 107 . ISBN 978161 2081 489. S.-S. Kim, K.-I. Kim, and J. Won. 2011. Multi-view rendering approach for cloud-based gaming services. In AFIN 2011, The Third International Conference on Advances in Future Internet, pp. 102-107. ISBN 9781612081489."},{"key":"e_1_4_1_383_1","doi-asserted-by":"publisher","DOI":"10.2307\/455412"},{"issue":"1","key":"e_1_4_1_384_1","first-page":"11","article-title":"Signal and image processing in the encrypted domain","volume":"6","author":"Kiya H.","year":"2012","unstructured":"H. Kiya and M. Fujiyoshi . 2012 . Signal and image processing in the encrypted domain . ECIT Transactions on Computer and Information Technology , 6 ( 1 ): 11 - 18 . H. Kiya and M. Fujiyoshi. 2012. Signal and image processing in the encrypted domain. ECIT Transactions on Computer and Information Technology, 6(1): 11-18.","journal-title":"ECIT Transactions on Computer and Information Technology"},{"key":"e_1_4_1_385_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2003.815516"},{"key":"e_1_4_1_386_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2012.10.002"},{"key":"e_1_4_1_387_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2011.15"},{"key":"e_1_4_1_388_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2315777"},{"key":"e_1_4_1_389_1","first-page":"171","volume-title":"IJCV","author":"Kojima A.","unstructured":"A. Kojima , T. Tamura , and K. Fukunaga . 2002. Natural language description of human activities from video images based on concept hierarchy of actions . IJCV , pp. 171 - 184 . A. Kojima, T. Tamura, and K. Fukunaga. 2002. Natural language description of human activities from video images based on concept hierarchy of actions. IJCV, pp. 171- 184."},{"key":"e_1_4_1_390_1","doi-asserted-by":"publisher","DOI":"10.5555\/2992818.2992824"},{"volume-title":"IEEE International Conference on Audio, Speech and Signal Processing","author":"Kounades-Bastian D.","key":"e_1_4_1_391_1","unstructured":"D. Kounades-Bastian , L. Girin , X. Alameda-Pineda , S. Gannot , and R. Horaud . 2017. An EM algorithm for joint source separation and diarisation of multichannel convolutive mixtures . In IEEE International Conference on Audio, Speech and Signal Processing . New Orleans, USA. D. Kounades-Bastian, L. Girin, X. Alameda-Pineda, S. Gannot, and R. Horaud. 2017. An EM algorithm for joint source separation and diarisation of multichannel convolutive mixtures. In IEEE International Conference on Audio, Speech and Signal Processing. New Orleans, USA."},{"key":"e_1_4_1_392_1","first-page":"11","volume-title":"AVSS","author":"Krahnstoever N.","unstructured":"N. Krahnstoever , M.-C. Chang , and W. Ge . 2011. Gaze and body pose estimation from a distance . In AVSS , pp. 11 - 16 . N. Krahnstoever, M.-C. Chang, and W. Ge. 2011. Gaze and body pose estimation from a distance. In AVSS, pp. 11-16."},{"key":"e_1_4_1_393_1","doi-asserted-by":"publisher","DOI":"10.1163\/156856800741216"},{"key":"e_1_4_1_394_1","first-page":"1097","volume-title":"NIPS","author":"Krizhevsky A.","unstructured":"A. Krizhevsky , I. Sutskever , and G. E. Hinton . 2012. ImageNet classification with deep convolutional neural networks . In NIPS , pp. 1097 - 1105 . A. Krizhevsky, I. Sutskever, and G. E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In NIPS, pp. 1097-1105."},{"key":"e_1_4_1_395_1","first-page":"2556","volume-title":"ICCV","author":"Kuehne H.","unstructured":"H. Kuehne , H. Jhuang , E. Garrote , T. Poggio , and T. Serre . 2011. HMDB: A large video database for human motion recognition . In ICCV , pp. 2556 - 2563 . H. Kuehne, H. Jhuang, E. Garrote, T. Poggio, and T. Serre. 2011. HMDB: A large video database for human motion recognition. In ICCV, pp. 2556-2563."},{"key":"e_1_4_1_396_1","doi-asserted-by":"publisher","DOI":"10.1080\/13506280902826775"},{"key":"e_1_4_1_397_1","first-page":"1042","volume-title":"NIPS","author":"Kulis B.","unstructured":"B. Kulis and T. Darrell . December 2009. Learning to hash with binary reconstructive embeddings . In NIPS , pp. 1042 - 1050 . B. Kulis and T. Darrell. December 2009. Learning to hash with binary reconstructive embeddings. In NIPS, pp. 1042-1050."},{"key":"e_1_4_1_398_1","first-page":"2130","volume-title":"ICCV","author":"Kulis B.","unstructured":"B. Kulis and K. Grauman . October 2009. Kernelized locality-sensitive hashing for scalable image search . In ICCV , pp. 2130 - 2137 . B. Kulis and K. Grauman. October 2009. Kernelized locality-sensitive hashing for scalable image search. In ICCV, pp. 2130-2137."},{"key":"e_1_4_1_399_1","first-page":"489","volume-title":"Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)","author":"Kumar A.","unstructured":"A. Kumar , P. Dighe , S. Chaudhuri , R. Singh , and B. Raj . 2012. Audio event detection from acoustic unit occurrence patterns . In Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) , pp. 489 - 492 . A. Kumar, P. Dighe, S. Chaudhuri, R. Singh, and B. Raj. 2012. Audio event detection from acoustic unit occurrence patterns. In Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 489-492."},{"key":"e_1_4_1_400_1","first-page":"905","volume-title":"22nd European Signal Processing Conference, EUSIPCO 2014","author":"Kumar A.","year":"2014","unstructured":"A. Kumar , R. Singh , and B. Raj . 2014. Detecting sound objects in audio recordings . In 22nd European Signal Processing Conference, EUSIPCO 2014 , Lisbon, Portugal , September 1-5, 2014 , pp. 905 - 909 . A. Kumar, R. Singh, and B. Raj. 2014. Detecting sound objects in audio recordings. In 22nd European Signal Processing Conference, EUSIPCO 2014, Lisbon, Portugal, September 1-5, 2014, pp. 905-909."},{"key":"e_1_4_1_401_1","first-page":"591","volume-title":"WWW '10","author":"Kwak H.","unstructured":"H. Kwak , C. Lee , H. Park , and S. Moon . 2010. What is Twitter, a social network or a news media ? In WWW '10 , pp. 591 - 600 . H. Kwak, C. Lee, H. Park, and S. Moon. 2010. What is Twitter, a social network or a news media? In WWW '10, pp. 591-600."},{"key":"e_1_4_1_402_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"e_1_4_1_403_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.177"},{"volume-title":"Hawkes processes and some financial applications. Thesis","author":"Lapham B. M.","key":"e_1_4_1_404_1","unstructured":"B. M. Lapham . 2014. Hawkes processes and some financial applications. Thesis , University of Cape Town. B. M. Lapham. 2014. Hawkes processes and some financial applications. Thesis, University of Cape Town."},{"key":"e_1_4_1_405_1","first-page":"1","volume-title":"CVPR","author":"Laptev I.","unstructured":"I. Laptev , M. Marszalek , C. Schmid , and B. Rozenfeld . 2008. Learning realistic human actions from movies . In CVPR , pp. 1 - 8 . I. Laptev, M. Marszalek, C. Schmid, and B. Rozenfeld. 2008. Learning realistic human actions from movies. In CVPR, pp. 1-8."},{"key":"e_1_4_1_406_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656205"},{"key":"e_1_4_1_407_1","first-page":"310","volume-title":"IEEE International Conference on International Conference on Semantic Computing","author":"Lathey A.","unstructured":"A. Lathey , P. Atrey , and N. Joshi . 2013. Homomorphic low pass filtering over cloud . In IEEE International Conference on International Conference on Semantic Computing , pp. 310 - 313 . A. Lathey, P. Atrey, and N. Joshi. 2013. Homomorphic low pass filtering over cloud. In IEEE International Conference on International Conference on Semantic Computing, pp. 310-313."},{"key":"e_1_4_1_408_1","unstructured":"P. J. Laub T. Taimre and P. K. Pollett. 2015. Hawkes processes. arXiv:1507.02822. P. J. Laub T. Taimre and P. K. Pollett. 2015. Hawkes processes. arXiv:1507.02822 ."},{"key":"e_1_4_1_409_1","first-page":"805","volume-title":"20th International Conference on Advanced Information Networking and Applications","volume":"1","author":"Laulajainen J.-P.","unstructured":"J.-P. Laulajainen , T. Sutinen , S. J\u00e4rvinen , and S. Jarvinen . Apr . 2006. Experiments with QoS-aware gaming-on-demand service . In 20th International Conference on Advanced Information Networking and Applications , volume 1 , pp. 805 - 810 . J.-P. Laulajainen, T. Sutinen, S. J\u00e4rvinen, and S. Jarvinen. Apr. 2006. Experiments with QoS-aware gaming-on-demand service. In 20th International Conference on Advanced Information Networking and Applications, volume 1, pp. 805-810."},{"key":"e_1_4_1_410_1","first-page":"165","volume-title":"Proceedings of the 14th ACM Workshop on Multimedia and Security","author":"Lazzeretti R.","unstructured":"R. Lazzeretti , J. Guajardo , and M. Barni . 2012. Privacy preserving ECG quality evaluation . In Proceedings of the 14th ACM Workshop on Multimedia and Security , pp. 165 - 174 . ACM. R. Lazzeretti, J. Guajardo, and M. Barni. 2012. Privacy preserving ECG quality evaluation. In Proceedings of the 14th ACM Workshop on Multimedia and Security, pp. 165-174. ACM."},{"key":"e_1_4_1_411_1","first-page":"3361","volume-title":"CVPR","author":"Le Q. V.","unstructured":"Q. V. Le , W. Y. Zou , S. Y. Yeung , and A. Y. Ng . 2011. Learning hierarchical invariant spatio-temporal features for action recognition with independent subspace analysis . In CVPR , pp. 3361 - 3368 . Q. V. Le, W. Y. Zou, S. Y. Yeung, and A. Y. Ng. 2011. Learning hierarchical invariant spatio-temporal features for action recognition with independent subspace analysis. In CVPR, pp. 3361-3368."},{"key":"e_1_4_1_412_1","volume-title":"NIPS","volume":"2","author":"LeCun B. B.","unstructured":"B. B. LeCun , J. S. Denker , D. Henderson , R. E. Howard , W. Hubbard , and L. D. Jackel . 1990. Handwritten digit recognition with a back-propagation network . In NIPS , vol. 2 . B. B. LeCun, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, and L. D. Jackel. 1990. Handwritten digit recognition with a back-propagation network. In NIPS, vol. 2."},{"key":"e_1_4_1_413_1","first-page":"306","volume-title":"Intelligent Signal Processing","author":"LeCun Y.","unstructured":"Y. LeCun , L. Bottou , Y. Bengio , and P. Haffner . 2001. Gradient-based learning applied to document recognition . In Intelligent Signal Processing , pp. 306 - 351 . Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner. 2001. Gradient-based learning applied to document recognition. In Intelligent Signal Processing, pp. 306-351."},{"key":"e_1_4_1_414_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2004.838534"},{"key":"e_1_4_1_415_1","first-page":"2404","volume-title":"Proceedings of ICASSP","author":"Lei H.","unstructured":"H. Lei , J. Choi , A. Janin , and G. Friedland . May 2011. Persona linking: Matching uploaders of videos across accounts . In Proceedings of ICASSP , pp. 2404 - 2407 . H. Lei, J. Choi, A. Janin, and G. Friedland. May 2011. Persona linking: Matching uploaders of videos across accounts. In Proceedings of ICASSP, pp. 2404-2407."},{"key":"e_1_4_1_416_1","first-page":"2273","volume-title":"Proceedings of ICASSP","author":"Lei H.","unstructured":"H. Lei , J. Choi , and G. Friedland . 2012. Multimodal city-verification on Flickr videos using acoustic and textual features . In Proceedings of ICASSP , pp. 2273 - 2276 . H. Lei, J. Choi, and G. Friedland. 2012. Multimodal city-verification on Flickr videos using acoustic and textual features. In Proceedings of ICASSP, pp. 2273-2276."},{"key":"e_1_4_1_417_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.130"},{"key":"e_1_4_1_418_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2012.17"},{"key":"e_1_4_1_419_1","first-page":"380","volume-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Leskovec J.","unstructured":"J. Leskovec , A. Singh , and J. Kleinberg . 2006. Patterns of influence in a recommendation network . In Pacific-Asia Conference on Knowledge Discovery and Data Mining , pp. 380 - 389 . Springer. J. Leskovec, A. Singh, and J. Kleinberg. 2006. Patterns of influence in a recommendation network. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 380-389. Springer."},{"key":"e_1_4_1_420_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0743-1066(96)00121-5"},{"key":"e_1_4_1_421_1","doi-asserted-by":"publisher","DOI":"10.1145\/1126004.1126005"},{"key":"e_1_4_1_422_1","first-page":"441","volume-title":"Proceedings of IEEE INFOCOM","author":"Li J.","unstructured":"J. Li , Q. Wang , C. Wang , N. Cao , K. Ren , and W. Lou . 2010. Fuzzy keyword search over encrypted data in cloud computing . In Proceedings of IEEE INFOCOM , pp. 441 - 445 . J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou. 2010. Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of IEEE INFOCOM, pp. 441-445."},{"key":"e_1_4_1_423_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.1.26"},{"key":"e_1_4_1_424_1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/2911996.2912001","article-title":"Action recognition by learning deep multi-granular spatio-temporal video representation","author":"Li Q.","year":"2016","unstructured":"Q. Li , Z. Qiu , T. Yao , T. Mei , Y. Rui , and J. Luo . 2016 a. Action recognition by learning deep multi-granular spatio-temporal video representation . In ICMR , 159 - 166 . Q. Li, Z. Qiu, T. Yao, T. Mei, Y. Rui, and J. Luo. 2016a. Action recognition by learning deep multi-granular spatio-temporal video representation. In ICMR, 159-166.","journal-title":"ICMR"},{"key":"e_1_4_1_425_1","unstructured":"W. Li Y. Zhang Y. Sun W. Wang W. Zhang and X. Lin. 2016b. Approximate nearest neighbor search on high dimensional data--Experiments analyses and improvement (v1.0). arXiv:1610.02455. W. Li Y. Zhang Y. Sun W. Wang W. Zhang and X. Lin. 2016b. Approximate nearest neighbor search on high dimensional data--Experiments analyses and improvement (v1.0). arXiv:1610.02455 ."},{"key":"e_1_4_1_426_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2009.2030598"},{"key":"e_1_4_1_427_1","unstructured":"Z. Li E. Gavves M. Jain and C. G. Snoek. 2016c. Video LSTM convolves attends and flows for action recognition. arXiv:1607.01794. Z. Li E. Gavves M. Jain and C. G. Snoek. 2016c. Video LSTM convolves attends and flows for action recognition. arXiv:1607.01794 ."},{"key":"e_1_4_1_428_1","first-page":"3","volume-title":"Proceedings of ACM International Workshop on Emerging Multimedia Applications and Services for Smart Cities (EMASC)","author":"Liao C.","unstructured":"C. Liao , T. Hou , T. Lin , Y. Cheng , C. H. A. Erbad , and N. Venkatasubramania . 2014. SAIS: Smartphone augmented infrastructure sensing for public safety and sustainability in smart cities . In Proceedings of ACM International Workshop on Emerging Multimedia Applications and Services for Smart Cities (EMASC) , pp. 3 - 8 . C. Liao, T. Hou, T. Lin, Y. Cheng, C. H. A. Erbad, and N. Venkatasubramania. 2014. SAIS: Smartphone augmented infrastructure sensing for public safety and sustainability in smart cities. In Proceedings of ACM International Workshop on Emerging Multimedia Applications and Services for Smart Cities (EMASC), pp. 3-8."},{"key":"e_1_4_1_429_1","first-page":"347","volume-title":"Proceedings of the ACM International Conference on Multimedia, MM '14","author":"Lin L.","unstructured":"L. Lin , X. Liao , G. Tan , H. Jin , X. Yang , W. Zhang , and B. Li . 2014. LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming . In Proceedings of the ACM International Conference on Multimedia, MM '14 , pp. 347 - 356 . ACM, New York. L. Lin, X. Liao, G. Tan, H. Jin, X. Yang, W. Zhang, and B. Li. 2014. LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming. In Proceedings of the ACM International Conference on Multimedia, MM '14, pp. 347-356. ACM, New York."},{"key":"e_1_4_1_430_1","first-page":"111","volume-title":"Proceedings of IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","author":"Lin T.","unstructured":"T. Lin , T. Lin , C. Hsu , and C. King . 2013. Context-aware decision engine for mobile cloud offloading . In Proceedings of IEEE Wireless Communications and Networking Conference Workshops (WCNCW) , pp. 111 - 116 . T. Lin, T. Lin, C. Hsu, and C. King. 2013. Context-aware decision engine for mobile cloud offloading. In Proceedings of IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp. 111-116."},{"key":"e_1_4_1_431_1","first-page":"377","volume-title":"ACMMM","author":"Lingenfelser F.","unstructured":"F. Lingenfelser , J. Wagner , E. Andr\u00e9 , G. McKeown , and W. Curran . 2014. An event driven fusion approach for enjoyment recognition in real-time . In ACMMM , pp. 377 - 386 . F. Lingenfelser, J. Wagner, E. Andr\u00e9, G. McKeown, and W. Curran. 2014. An event driven fusion approach for enjoyment recognition in real-time. In ACMMM, pp. 377-386."},{"key":"e_1_4_1_432_1","first-page":"535","volume-title":"International Conference on Multimedia Modeling","author":"Lipczak M.","unstructured":"M. Lipczak , M. Trevisiol , and A. Jaimes . 2013. Analyzing favorite behavior in Flickr . In International Conference on Multimedia Modeling , pp. 535 - 545 . Springer. M. Lipczak, M. Trevisiol, and A. Jaimes. 2013. Analyzing favorite behavior in Flickr. In International Conference on Multimedia Modeling, pp. 535-545. Springer."},{"key":"e_1_4_1_433_1","first-page":"239","volume-title":"International Conference on Multimedia Modeling","author":"Liu S.","unstructured":"S. Liu , P. Cui , H. Luan , W. Zhu , S. Yang , and Q. Tian . 2013a. Social visual image ranking for web image search . In International Conference on Multimedia Modeling , pp. 239 - 249 . Springer. S. Liu, P. Cui, H. Luan, W. Zhu, S. Yang, and Q. Tian. 2013a. Social visual image ranking for web image search. In International Conference on Multimedia Modeling, pp. 239-249. Springer."},{"key":"e_1_4_1_434_1","first-page":"617","volume-title":"Proceedings of the 22nd ACM International Conference on Multimedia","author":"Liu S.","unstructured":"S. Liu , P. Cui , W. Zhu , S. Yang , and Q. Tian . 2014. Social embedding image distance learning . In Proceedings of the 22nd ACM International Conference on Multimedia , pp. 617 - 626 . ACM. S. Liu, P. Cui, W. Zhu, S. Yang, and Q. Tian. 2014. Social embedding image distance learning. In Proceedings of the 22nd ACM International Conference on Multimedia, pp. 617-626. ACM."},{"key":"e_1_4_1_435_1","first-page":"109","volume-title":"Proceedings of the 23rd ACM International conference on Multimedia","author":"Liu S.","unstructured":"S. Liu , P. Cui , W. Zhu , and S. Yang . 2015. Learning socially embedded visual representation from scratch . In Proceedings of the 23rd ACM International conference on Multimedia , pp. 109 - 118 . ACM. S. Liu, P. Cui, W. Zhu, and S. Yang. 2015. Learning socially embedded visual representation from scratch. In Proceedings of the 23rd ACM International conference on Multimedia, pp. 109-118. ACM."},{"key":"e_1_4_1_436_1","first-page":"626","volume-title":"Proceedings of the 27th Association for the Advancement of Artificial Intelligence (AAAI) Conference on Artificial Intelligence","author":"Liu X.","unstructured":"X. Liu , J. He , and B. Lang . July 2013b. Reciprocal hash tables for nearest neighbor search . In Proceedings of the 27th Association for the Advancement of Artificial Intelligence (AAAI) Conference on Artificial Intelligence , pp. 626 - 632 . X. Liu, J. He, and B. Lang. July 2013b. Reciprocal hash tables for nearest neighbor search. In Proceedings of the 27th Association for the Advancement of Artificial Intelligence (AAAI) Conference on Artificial Intelligence, pp. 626-632."},{"key":"e_1_4_1_437_1","first-page":"631","volume-title":"ACM Multimedia","author":"Liu Y.","unstructured":"Y. Liu and Z. Shi . 2016. Boosting video description generation by explicitly translating from frame-level captions . In ACM Multimedia , pp. 631 - 634 . Y. Liu and Z. Shi. 2016. Boosting video description generation by explicitly translating from frame-level captions. In ACM Multimedia, pp. 631-634."},{"key":"e_1_4_1_438_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-007-0006-y"},{"key":"e_1_4_1_439_1","first-page":"5","volume-title":"International Symposium on Music Information Retrieval","volume":"28","author":"B. Logan","year":"2000","unstructured":"B. Logan et al. 2000 . Mel frequency cepstral coefficients for music modeling . In International Symposium on Music Information Retrieval , volume 28 , p. 5 . B. Logan et al. 2000. Mel frequency cepstral coefficients for music modeling. In International Symposium on Music Information Retrieval, volume 28, p. 5."},{"key":"e_1_4_1_440_1","unstructured":"LogMeIn. July 2012. LogMeIn web page. http:\/\/secure.logmein.com\/. LogMeIn. July 2012. LogMeIn web page. http:\/\/secure.logmein.com\/."},{"key":"e_1_4_1_441_1","first-page":"3431","volume-title":"CVPR","author":"Long J.","unstructured":"J. Long , E. Shelhamer , and T. Darrell . 2015. Fully convolutional networks for semantic segmentation . In CVPR , p. 3431 - 3440 . J. Long, E. Shelhamer, and T. Darrell. 2015. Fully convolutional networks for semantic segmentation. In CVPR, p. 3431-3440."},{"key":"e_1_4_1_442_1","first-page":"245","volume-title":"ACM Multimedia Information Retrieval (MIR) Workshop","author":"Loui A.","unstructured":"A. Loui , J. Luo , S.-F. Chang , D. Ellis , W. Jiang , L. Kennedy , K. Lee , and A. Yanagawa . 2007. Kodak's consumer video benchmark data set: Concept definition and annotation . In ACM Multimedia Information Retrieval (MIR) Workshop , pp. 245 - 254 . A. Loui, J. Luo, S.-F. Chang, D. Ellis, W. Jiang, L. Kennedy, K. Lee, and A. Yanagawa. 2007. Kodak's consumer video benchmark data set: Concept definition and annotation. In ACM Multimedia Information Retrieval (MIR) Workshop, pp. 245-254."},{"key":"e_1_4_1_443_1","doi-asserted-by":"publisher","DOI":"10.1023\/b:visi.0000029664.99615.94"},{"key":"e_1_4_1_444_1","first-page":"7254","volume-title":"Proceedings of International Society for Optics and Photonics, SPIE, Media Forensics and Security","author":"Lu W.","unstructured":"W. Lu , A. Swaminathan , A. L. Varna , and M. Wu . 2009a. Enabling search over encrypted multimedia databases . Proceedings of International Society for Optics and Photonics, SPIE, Media Forensics and Security , pp. 7254 - 7318 . W. Lu, A. Swaminathan, A. L. Varna, and M. Wu. 2009a. Enabling search over encrypted multimedia databases. Proceedings of International Society for Optics and Photonics, SPIE, Media Forensics and Security, pp. 7254-7318."},{"key":"e_1_4_1_445_1","first-page":"1533","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Lu W.","unstructured":"W. Lu , A. L. Varna , A. Swaminathan , and M. Wu . 2009b. Secure image retrieval through feature protection . In IEEE International Conference on Acoustics, Speech and Signal Processing , pp. 1533 - 1536 . W. Lu, A. L. Varna, A. Swaminathan, and M. Wu. 2009b. Secure image retrieval through feature protection. In IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1533-1536."},{"key":"e_1_4_1_446_1","first-page":"2093","volume-title":"IEEE International Conference on Image Processing","author":"Lu W.","unstructured":"W. Lu , A. L. Varna , and M. Wu . 2010. Security analysis for privacy preserving search of multimedia . In IEEE International Conference on Image Processing , pp. 2093 - 2096 . W. Lu, A. L. Varna, and M. Wu. 2010. Security analysis for privacy preserving search of multimedia. In IEEE International Conference on Image Processing, pp. 2093-2096."},{"key":"e_1_4_1_447_1","first-page":"5856","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Lu W.","unstructured":"W. Lu , A. Varna , and M. Wu . 2011. Secure video processing: Problems and challenges . In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing , pp. 5856 - 5859 . W. Lu, A. Varna, and M. Wu. 2011. Secure video processing: Problems and challenges. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 5856-5859."},{"key":"e_1_4_1_448_1","first-page":"94","volume-title":"CVPR Workshops","author":"Lucey P.","unstructured":"P. Lucey , J. F. Cohn , T. Kanade , J. Saragih , Z. Ambadar , and I. Matthews . 2010. The extended Cohn-Kanade dataset (CK+): A complete dataset for action unit and emotion-specified expression . In CVPR Workshops , pp. 94 - 101 . P. Lucey, J. F. Cohn, T. Kanade, J. Saragih, Z. Ambadar, and I. Matthews. 2010. The extended Cohn-Kanade dataset (CK+): A complete dataset for action unit and emotion-specified expression. In CVPR Workshops, pp. 94-101."},{"key":"e_1_4_1_449_1","first-page":"83","volume-title":"Proceedings of IEEE International Conference on Multimedia and Expo","author":"Luo Y.","unstructured":"Y. Luo , S. Ye , and S. Cheung . 2010. Anonymous subject identification in privacy-aware video surveillance . In Proceedings of IEEE International Conference on Multimedia and Expo , pp. 83 - 88 . Y. Luo, S. Ye, and S. Cheung. 2010. Anonymous subject identification in privacy-aware video surveillance. In Proceedings of IEEE International Conference on Multimedia and Expo, pp. 83-88."},{"key":"e_1_4_1_450_1","first-page":"208","volume-title":"CIKM","author":"Lv Q.","unstructured":"Q. Lv , M. Charikar , and K. Li. Nov . 2004. Image similarity search with compact data structures . In CIKM , pp. 208 - 217 . Q. Lv, M. Charikar, and K. Li. Nov. 2004. Image similarity search with compact data structures. In CIKM, pp. 208-217."},{"key":"e_1_4_1_451_1","first-page":"950","volume-title":"Proceedings of the International Conference on Very Large Data Bases","author":"Lv Q.","unstructured":"Q. Lv , W. Josephson , Z. Wang , M. Charikar , and K. Li . 2007. Multi-probe LSH: Efficient indexing for high-dimensional similarity search . In Proceedings of the International Conference on Very Large Data Bases , pp. 950 - 961 . Q. Lv, W. Josephson, Z. Wang, M. Charikar, and K. Li. 2007. Multi-probe LSH: Efficient indexing for high-dimensional similarity search. In Proceedings of the International Conference on Very Large Data Bases, pp. 950-961."},{"key":"e_1_4_1_452_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03200792"},{"key":"e_1_4_1_453_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.408685"},{"key":"e_1_4_1_454_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2013.10.006"},{"key":"e_1_4_1_455_1","unstructured":"Y. A. Malkov and D. A. Yashunin. March 2016. Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs. arXiv:1603.09320. Y. A. Malkov and D. A. Yashunin. March 2016. Efficient and robust approximate nearest neighbor search using hierarchical navigable small world graphs. arXiv:1603.09320 ."},{"key":"e_1_4_1_456_1","first-page":"577","volume-title":"Proceedings ISMIR","author":"Mandel M.","year":"2008","unstructured":"M. Mandel and D. P. W. Ellis . Sept. 2008 . Multiple-instance learning for music information retrieval . In Proceedings ISMIR , pp. 577 - 582 . Philadelphia, PA. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/MandelE08-MImusic.pdf. M. Mandel and D. P. W. Ellis. Sept. 2008. Multiple-instance learning for music information retrieval. In Proceedings ISMIR, pp. 577-582. Philadelphia, PA. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/MandelE08-MImusic.pdf."},{"key":"e_1_4_1_457_1","first-page":"594","volume-title":"Proceedings International Conference on Music Information Retrieval ISMIR","author":"Mandel M. I.","year":"2005","unstructured":"M. I. Mandel and D. P.W. Ellis . Sept. 2005 . Song-level features and support vector machines for music classification . In Proceedings International Conference on Music Information Retrieval ISMIR , pp. 594 - 599 . London. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/ismir05-svm.pdf. M. I. Mandel and D. P.W. Ellis. Sept. 2005. Song-level features and support vector machines for music classification. In Proceedings International Conference on Music Information Retrieval ISMIR, pp. 594-599. London. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/ismir05-svm.pdf."},{"key":"e_1_4_1_458_1","doi-asserted-by":"crossref","unstructured":"C. D. Manning P. Raghavan and H. Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press. C. D. Manning P. Raghavan and H. Sch\u00fctze. 2008. Introduction to Information Retrieval . Cambridge University Press.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_4_1_459_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.873426"},{"key":"e_1_4_1_460_1","first-page":"570","volume-title":"Advances in Neural Information Processing Systems","author":"Maron O.","unstructured":"O. Maron and T. Lozano-Perez . 1998. A framework for multiple-instance learning . In Advances in Neural Information Processing Systems , pp. 570 - 576 . O. Maron and T. Lozano-Perez. 1998. A framework for multiple-instance learning. In Advances in Neural Information Processing Systems, pp. 570-576."},{"key":"e_1_4_1_461_1","doi-asserted-by":"crossref","unstructured":"M. Marszalek I. Laptev and C. Schmid. 2009. Actions in context. In CVPR. pp. 2929-2936. M. Marszalek I. Laptev and C. Schmid. 2009. Actions in context. In CVPR . pp. 2929-2936.","DOI":"10.1109\/CVPR.2009.5206557"},{"key":"e_1_4_1_462_1","unstructured":"J. Martinez H. H. Hoos and J. J. Little. 2014. Stacked quantizers for compositional vector compression. arXiv:1411.2173. J. Martinez H. H. Hoos and J. J. Little. 2014. Stacked quantizers for compositional vector compression. arXiv:1411.2173 ."},{"key":"e_1_4_1_463_1","first-page":"4","volume-title":"Proceedings of International Workshop on Image Analysis for Multimedia Interactive Services","author":"Mart\u00ednez-Ponte I.","year":"2005","unstructured":"I. Mart\u00ednez-Ponte , X. Desurmont , J. Meessen , and J.-F. Delaigle . 2005 . Robust human face hiding ensuring privacy . In Proceedings of International Workshop on Image Analysis for Multimedia Interactive Services , p. 4 . I. Mart\u00ednez-Ponte, X. Desurmont, J. Meessen, and J.-F. Delaigle. 2005. Robust human face hiding ensuring privacy. In Proceedings of International Workshop on Image Analysis for Multimedia Interactive Services, p. 4."},{"key":"e_1_4_1_464_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.148"},{"key":"e_1_4_1_465_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.pervasivehealth.2012.248689"},{"key":"e_1_4_1_466_1","first-page":"283","volume-title":"Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services","author":"Matviienko A.","unstructured":"A. Matviienko , A. L\u00f6cken , A. El Ali , W. Heuten , and S. Boll . 2016. NaviLight: Investigating ambient light displays for turn-by-turn navigation in cars . In Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services , pp. 283 - 294 . ACM. A. Matviienko, A. L\u00f6cken, A. El Ali, W. Heuten, and S. Boll. 2016. NaviLight: Investigating ambient light displays for turn-by-turn navigation in cars. In Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, pp. 283-294. ACM."},{"key":"e_1_4_1_467_1","doi-asserted-by":"publisher","DOI":"10.21236\/AD0677528"},{"key":"e_1_4_1_468_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"e_1_4_1_469_1","unstructured":"MediaEval. 2010. MediaEval's video CLEF-Placing task. http:\/\/www.multimediaeval.org\/placing\/placing.html. MediaEval. 2010. MediaEval's video CLEF-Placing task. http:\/\/www.multimediaeval.org\/placing\/placing.html."},{"key":"e_1_4_1_470_1","first-page":"340","volume-title":"2014 IEEE Conference on Computer Communications Workshops","author":"Meilander D.","unstructured":"D. Meilander , F. Glinka , S. Gorlatch , L. Lin , W. Zhang , X. Liao , and D. Meil . Apr . 2014. Bringing mobile online games to clouds . In 2014 IEEE Conference on Computer Communications Workshops , pp. 340 - 345 . D. Meilander, F. Glinka, S. Gorlatch, L. Lin, W. Zhang, X. Liao, and D. Meil. Apr. 2014. Bringing mobile online games to clouds. In 2014 IEEE Conference on Computer Communications Workshops, pp. 340-345."},{"key":"e_1_4_1_472_1","unstructured":"Merriam-Webster. 2003. Merriam-Webster's Collegiate Dictionary. Merriam-Webster. Merriam-Webster. 2003. Merriam-Webster's Collegiate Dictionary . Merriam-Webster."},{"key":"e_1_4_1_473_1","first-page":"446","volume-title":"Proceedings of the IEEE International Symposium on Multimedia","author":"Mertens R.","unstructured":"R. Mertens , P. S. Huang , L. Gottlieb , G. Friedland , and A. Divakarian . 2011a. On the applicability of speaker diarization to audio concept detection for multimedia retrieval . In Proceedings of the IEEE International Symposium on Multimedia , pp. 446 - 451 . R. Mertens, P. S. Huang, L. Gottlieb, G. Friedland, and A. Divakarian. 2011a. On the applicability of speaker diarization to audio concept detection for multimedia retrieval. In Proceedings of the IEEE International Symposium on Multimedia, pp. 446-451."},{"key":"e_1_4_1_474_1","first-page":"19","volume-title":"Proceedings of the Joint ACM Workshop on Modeling and Representing Events","author":"Mertens R.","unstructured":"R. Mertens , H. Lei , L. Gottlieb , G. Friedland , and A. Divakarian . 2011b. Acoustic super models for large scale video event detection . In Proceedings of the Joint ACM Workshop on Modeling and Representing Events , pp. 19 - 24 . R. Mertens, H. Lei, L. Gottlieb, G. Friedland, and A. Divakarian. 2011b. Acoustic super models for large scale video event detection. In Proceedings of the Joint ACM Workshop on Modeling and Representing Events, pp. 19-24."},{"key":"e_1_4_1_475_1","first-page":"105","volume-title":"Parental Descriptions of Child Personality: Developmental Antecedents of the Big Five","author":"Mervielde I.","unstructured":"I. Mervielde , F. De Fruyt , and S. Jarmuz . 1998. Linking openness and intellect in childhood and adulthood . In Parental Descriptions of Child Personality: Developmental Antecedents of the Big Five , pp. 105 - 126 . I. Mervielde, F. De Fruyt, and S. Jarmuz. 1998. Linking openness and intellect in childhood and adulthood. In Parental Descriptions of Child Personality: Developmental Antecedents of the Big Five, pp. 105-126."},{"volume-title":"Visual Persuasion: The Role of Images in Advertising","author":"Messaris P.","key":"e_1_4_1_476_1","unstructured":"P. Messaris . 1996. Visual Persuasion: The Role of Images in Advertising . Sage Publications . P. Messaris. 1996. Visual Persuasion: The Role of Images in Advertising. Sage Publications."},{"key":"e_1_4_1_477_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1998.1577"},{"key":"e_1_4_1_478_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.20"},{"key":"e_1_4_1_479_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6295709"},{"key":"e_1_4_1_480_1","first-page":"1069","volume-title":"Proceedings of the 25th ACM International Conference on Information and Knowledge Management","author":"Mishra S.","unstructured":"S. Mishra , M.-A. Rizoiu , and L. Xie . 2016. Feature driven and point process approaches for popularity prediction . In Proceedings of the 25th ACM International Conference on Information and Knowledge Management , pp. 1069 - 1078 . S. Mishra, M.-A. Rizoiu, and L. Xie. 2016. Feature driven and point process approaches for popularity prediction. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management, pp. 1069-1078."},{"key":"e_1_4_1_481_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2396394"},{"key":"e_1_4_1_482_1","first-page":"1","volume-title":"IEEE International Conference on Multimedia and Expo","author":"Mohanty M.","unstructured":"M. Mohanty , W.-T. Tsang , and P. K. Atrey . 2013. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing . In IEEE International Conference on Multimedia and Expo , pp. 1 - 6 . M. Mohanty, W.-T. Tsang, and P. K. Atrey. 2013. Scale me, crop me, know me not: Supporting scaling and cropping in secret image sharing. In IEEE International Conference on Multimedia and Expo, pp. 1-6."},{"key":"e_1_4_1_483_1","first-page":"17","volume-title":"ICMR","author":"Moise D.","unstructured":"D. Moise , D. Shestakov , G. P. Gudmundsson , and L. Amsaleg . April 2013. Indexing and searching 100M images with Map-Reduce . In ICMR , pp. 17 - 24 . D. Moise, D. Shestakov, G. P. Gudmundsson, and L. Amsaleg. April 2013. Indexing and searching 100M images with Map-Reduce. In ICMR, pp. 17-24."},{"key":"e_1_4_1_484_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0001867800000392"},{"key":"e_1_4_1_485_1","first-page":"32","volume-title":"2007 IEEE Intelligence and Security Informatics","author":"Montanari M.","unstructured":"M. Montanari , S. Mehrotra , and N. Venkatasubramanian . 2007. Architecture for an automatic customized warning system . In 2007 IEEE Intelligence and Security Informatics , pp. 32 - 39 . IEEE. M. Montanari, S. Mehrotra, and N. Venkatasubramanian. 2007. Architecture for an automatic customized warning system. In 2007 IEEE Intelligence and Security Informatics, pp. 32-39. IEEE."},{"key":"e_1_4_1_487_1","unstructured":"N. Moray and T. Sheridan. 2004. Oil sont les neiges d'antan? In Human Performance Situation Awareness and Automation II. D. A. Vincenzi H. Mouloua and P. Hancock eds. Lawrence Erlbaum Associates Marwah NJ. N. Moray and T. Sheridan. 2004. Oil sont les neiges d'antan? In Human Performance Situation Awareness and Automation II . D. A. Vincenzi H. Mouloua and P. Hancock eds. Lawrence Erlbaum Associates Marwah NJ."},{"key":"e_1_4_1_488_1","first-page":"1344","volume-title":"2012 45th Hawaii International Conference on System Science (HICSS)","author":"Moreno C.","unstructured":"C. Moreno , N. Tizon , and M. Preda . 2012. Mobile cloud convergence in GaaS: A business model proposition . In 2012 45th Hawaii International Conference on System Science (HICSS) , pp. 1344 - 1352 . C. Moreno, N. Tizon, and M. Preda. 2012. Mobile cloud convergence in GaaS: A business model proposition. In 2012 45th Hawaii International Conference on System Science (HICSS), pp. 1344-1352."},{"key":"e_1_4_1_489_1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.923820"},{"key":"e_1_4_1_490_1","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/ICASSP.1996.543225","volume-title":"1996 IEEE International Conference on Acoustics, Speech, and Signal Processing","volume":"2","author":"Moreno P. J.","unstructured":"P. J. Moreno , B. Raj , and R. M. Stern . 1996. A vector taylor series approach for environment-independent speech recognition . In 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing , volume 2 , pp. 733 - 736 . IEEE. P. J. Moreno, B. Raj, and R. M. Stern. 1996. A vector taylor series approach for environment-independent speech recognition. In 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing, volume 2, pp. 733-736. IEEE."},{"key":"e_1_4_1_491_1","unstructured":"F. Morstatter J. Pfeffer H. Liu and K. M. Carley. 2013. Is the sample good enough? Comparing data from Twitter's streaming API with Twitter's firehose. http:\/\/scholar.google.de\/scholar.bib?q=info:NkS2afIrqyQJ:scholar.google.com\/&output=citation&hl=de&as_sdt=0 5&ct=citation&cd=0. F. Morstatter J. Pfeffer H. Liu and K. M. Carley. 2013. Is the sample good enough? Comparing data from Twitter's streaming API with Twitter's firehose. http:\/\/scholar.google.de\/scholar.bib?q=info:NkS2afIrqyQJ:scholar.google.com\/&output=citation&hl=de&as_sdt=0 5&ct=citation&cd=0."},{"key":"e_1_4_1_492_1","first-page":"331","volume-title":"VISAPP","author":"Muja M.","unstructured":"M. Muja and D. G. Lowe . February 2009. Fast approximate nearest neighbors with automatic algorithm configuration . In VISAPP , pp. 331 - 340 . M. Muja and D. G. Lowe. February 2009. Fast approximate nearest neighbors with automatic algorithm configuration. In VISAPP, pp. 331-340."},{"key":"e_1_4_1_493_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2321376"},{"key":"e_1_4_1_494_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2011.2112333"},{"key":"e_1_4_1_495_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.106"},{"key":"e_1_4_1_496_1","doi-asserted-by":"publisher","DOI":"10.1145\/344949.344959"},{"key":"e_1_4_1_497_1","first-page":"140","volume-title":"Proceedings of 9th International Conference on Latent Variable Analysis and Source Separation (LVA\/ICA)","author":"Mysore G.","unstructured":"G. Mysore , P. Smaragdis , and B. Raj . 2010. Non-negative hidden-Markov modeling of audio with application to source separation . In Proceedings of 9th International Conference on Latent Variable Analysis and Source Separation (LVA\/ICA) , pp. 140 - 148 . G. Mysore, P. Smaragdis, and B. Raj. 2010. Non-negative hidden-Markov modeling of audio with application to source separation. In Proceedings of 9th International Conference on Latent Variable Analysis and Source Separation (LVA\/ICA), pp. 140-148."},{"key":"e_1_4_1_498_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0538-7"},{"key":"e_1_4_1_499_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-007-0180-1"},{"key":"e_1_4_1_500_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20060695"},{"key":"e_1_4_1_501_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2050649"},{"key":"e_1_4_1_502_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.32"},{"key":"e_1_4_1_503_1","first-page":"1926","volume-title":"ICML","author":"Neyshabur B.","unstructured":"B. Neyshabur and N. Srebro . 2015. On symmetric and asymmetric LSHs for inner product search . In ICML , pp. 1926 - 1934 . B. Neyshabur and N. Srebro. 2015. On symmetric and asymmetric LSHs for inner product search. In ICML, pp. 1926-1934."},{"key":"e_1_4_1_504_1","first-page":"4694","volume-title":"CVPR","author":"Ng J. Y.-H.","unstructured":"J. Y.-H. Ng , M. Hausknecht , S. Vijayanarasimhan , O. Vinyals , R. Monga , and G. Toderici . 2015. Beyond short snippets: Deep networks for video classification . In CVPR , pp. 4694 - 4702 . J. Y.-H. Ng, M. Hausknecht, S. Vijayanarasimhan, O. Vinyals, R. Monga, and G. Toderici. 2015. Beyond short snippets: Deep networks for video classification. In CVPR, pp. 4694-4702."},{"key":"e_1_4_1_505_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2009.01.049"},{"key":"e_1_4_1_506_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0122-4"},{"key":"e_1_4_1_507_1","first-page":"392","volume-title":"ECCV","author":"Niebles J. C.","unstructured":"J. C. Niebles , C.-W. Chen , and L. Fei-Fei . 2010. Modeling temporal structure of decomposable motion segments for activity classification . In ECCV , pp. 392 - 405 . J. C. Niebles, C.-W. Chen, and L. Fei-Fei. 2010. Modeling temporal structure of decomposable motion segments for activity classification. In ECCV, pp. 392-405."},{"key":"e_1_4_1_508_1","first-page":"2161","volume-title":"CVPR","author":"Nist\u00e9r D.","unstructured":"D. Nist\u00e9r and H. Stew\u00e9nius . June 2006. Scalable recognition with a vocabulary tree . In CVPR , pp. 2161 - 2168 . D. Nist\u00e9r and H. Stew\u00e9nius. June 2006. Scalable recognition with a vocabulary tree. In CVPR, pp. 2161-2168."},{"key":"e_1_4_1_509_1","first-page":"3017","volume-title":"CVPR","author":"Norouzi M.","unstructured":"M. Norouzi and D. Fleet . June 2013. Cartesian k-means . In CVPR , pp. 3017 - 3024 . M. Norouzi and D. Fleet. June 2013. Cartesian k-means. In CVPR, pp. 3017-3024."},{"key":"e_1_4_1_510_1","first-page":"243","volume-title":"CCTV: A new battleground for privacy. Surveillance, closed-circuit television and social control","author":"Norris C.","year":"1998","unstructured":"C. Norris , J. Moran , and G. Armstrong (eds.). 1998 . CCTV: A new battleground for privacy. Surveillance, closed-circuit television and social control , pp. 243 - 254 . C. Norris, J. Moran, and G. Armstrong (eds.). 1998. CCTV: A new battleground for privacy. Surveillance, closed-circuit television and social control, pp. 243-254."},{"key":"e_1_4_1_511_1","doi-asserted-by":"crossref","unstructured":"M. Nouh A. Almaatouq A. Alabdulkareem V. K. Singh E. Shmueli M. Alsaleh A. Alarifi A. Alfaris and A. S. Pentland. 2014. Social information leakage: Effects of awareness and peer pressure on user behavior. In Human Aspects of Information Security Privacy and Trust pp. 352-360. Springer. M. Nouh A. Almaatouq A. Alabdulkareem V. K. Singh E. Shmueli M. Alsaleh A. Alarifi A. Alfaris and A. S. Pentland. 2014. Social information leakage: Effects of awareness and peer pressure on user behavior. In Human Aspects of Information Security Privacy and Trust pp. 352-360. Springer.","DOI":"10.1007\/978-3-319-07620-1_31"},{"key":"e_1_4_1_512_1","first-page":"490","article-title":"Sampling strategies for bag-of-features image classification","volume":"2006","author":"Nowak E.","year":"2006","unstructured":"E. Nowak , F. Jurie , and B. Triggs . 2006 . Sampling strategies for bag-of-features image classification . Computer Vision-ECCV 2006 , pp. 490 - 503 . E. Nowak, F. Jurie, and B. Triggs. 2006. Sampling strategies for bag-of-features image classification. Computer Vision-ECCV 2006, pp. 490-503.","journal-title":"Computer Vision-ECCV"},{"key":"e_1_4_1_513_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056305"},{"key":"e_1_4_1_514_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478560"},{"key":"e_1_4_1_515_1","doi-asserted-by":"publisher","DOI":"10.1029\/93GL02142"},{"key":"e_1_4_1_516_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.51"},{"key":"e_1_4_1_517_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"e_1_4_1_518_1","first-page":"1","volume-title":"ICCV","author":"Omercevic D.","unstructured":"D. Omercevic , O. Drbohlav , and A. Leonardis . October 2007. High-dimensional feature matching: employing the concept of meaningful nearest neighbors . In ICCV , pp. 1 - 8 D. Omercevic, O. Drbohlav, and A. Leonardis. October 2007. High-dimensional feature matching: employing the concept of meaningful nearest neighbors. In ICCV, pp. 1-8"},{"key":"e_1_4_1_519_1","unstructured":"OnLive. January 2015. OnLive web page. http:\/\/www.onlive.com\/. OnLive. January 2015. OnLive web page. http:\/\/www.onlive.com\/."},{"key":"e_1_4_1_520_1","first-page":"239","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Osadchy M.","unstructured":"M. Osadchy , B. Pinkas , A. Jarrous , and B. Moskovich . 2010. SCiFI--A system for secure face identification . In Proceedings of IEEE Symposium on Security and Privacy , pp. 239 - 254 . M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich. 2010. SCiFI--A system for secure face identification. In Proceedings of IEEE Symposium on Security and Privacy, pp. 239-254."},{"volume-title":"TRECVID 2014--An overview of the goals, tasks, data, evaluation mechanisms and metrics. In Proceedings of TRECVID 2014, National Institute of Standards and Technology (NIST).","author":"Over P.","key":"e_1_4_1_521_1","unstructured":"P. Over , G. Awad , M. Michel , J. Fiscus , G. Sanders , W. Kraaij , A. F. Smeaton , and G. Qu\u00e9enot . 2014 . TRECVID 2014--An overview of the goals, tasks, data, evaluation mechanisms and metrics. In Proceedings of TRECVID 2014, National Institute of Standards and Technology (NIST). P. Over, G. Awad, M. Michel, J. Fiscus, G. Sanders, W. Kraaij, A. F. Smeaton, and G. Qu\u00e9enot. 2014. TRECVID 2014--An overview of the goals, tasks, data, evaluation mechanisms and metrics. In Proceedings of TRECVID 2014, National Institute of Standards and Technology (NIST)."},{"volume-title":"TRECVID 2015--An overview of the goals, tasks, data, evaluation mechanisms and metrics. In Proceedings of TRECVID 2015, NIST.","author":"Over P.","key":"e_1_4_1_522_1","unstructured":"P. Over , G. Awad , M. Michel , J. Fiscus , W. Kraaij , A. F. Smeaton , G. Qu\u00e9enot , and R. Ordelman . 2015 . TRECVID 2015--An overview of the goals, tasks, data, evaluation mechanisms and metrics. In Proceedings of TRECVID 2015, NIST. P. Over, G. Awad, M. Michel, J. Fiscus, W. Kraaij, A. F. Smeaton, G. Qu\u00e9enot, and R. Ordelman. 2015. TRECVID 2015--An overview of the goals, tasks, data, evaluation mechanisms and metrics. In Proceedings of TRECVID 2015, NIST."},{"key":"e_1_4_1_523_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02480272"},{"key":"e_1_4_1_524_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_4_1_525_1","first-page":"717","volume-title":"Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval","author":"Pan Y.","unstructured":"Y. Pan , T. Yao , T. Mei , H. Li , C.-W. Ngo , and Y. Rui . 2014. Click-through-based crossview learning for image search . In Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval , pp. 717 - 726 . ACM. Y. Pan, T. Yao, T. Mei, H. Li, C.-W. Ngo, and Y. Rui. 2014. Click-through-based crossview learning for image search. In Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 717-726. ACM."},{"key":"e_1_4_1_526_1","first-page":"3832","volume-title":"International Joint Conference on Artificial Intelligence (IJCAI)","author":"Pan Y.","unstructured":"Y. Pan , Y. Li , T. Yao , T. Mei , H. Li , and Y. Rui . 2016a. Learning deep intrinsic video representation by exploring temporal coherence and graph structure . In International Joint Conference on Artificial Intelligence (IJCAI) , pp. 3832 - 3838 . Y. Pan, Y. Li, T. Yao, T. Mei, H. Li, and Y. Rui. 2016a. Learning deep intrinsic video representation by exploring temporal coherence and graph structure. In International Joint Conference on Artificial Intelligence (IJCAI), pp. 3832-3838."},{"key":"e_1_4_1_527_1","first-page":"4594","volume-title":"CVPR","author":"Pan Y.","unstructured":"Y. Pan , T. Mei , T. Yao , H. Li , and Y. Rui . 2016b. Jointly modeling embedding and translation to bridge video and language . In CVPR , pp. 4594 - 4602 . Y. Pan, T. Mei, T. Yao, H. Li, and Y. Rui. 2016b. Jointly modeling embedding and translation to bridge video and language. In CVPR, pp. 4594-4602."},{"key":"e_1_4_1_528_1","doi-asserted-by":"crossref","unstructured":"Y. Pan T. Yao H. Li and T. Mei. 2016c. Video captioning with transferred semantic attributes. arXiv:1611.07675. Y. Pan T. Yao H. Li and T. Mei. 2016c. Video captioning with transferred semantic attributes. arXiv:1611.07675 .","DOI":"10.1109\/CVPR.2017.111"},{"key":"e_1_4_1_529_1","first-page":"2105","volume-title":"Proceedings of Interspeech","author":"Pancoast S.","unstructured":"S. Pancoast and M. Akbacak . 2011. Bag-of-audio-words approach for multimedia event classification . In Proceedings of Interspeech , pp. 2105 - 2108 . S. Pancoast and M. Akbacak. 2011. Bag-of-audio-words approach for multimedia event classification. In Proceedings of Interspeech, pp. 2105-2108."},{"key":"e_1_4_1_530_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1951.230419"},{"key":"e_1_4_1_531_1","first-page":"669","volume-title":"ACMMM","author":"Pantic M.","unstructured":"M. Pantic , N. Sebe , J. F. Cohn , and T. Huang . 2005. Affective multimodal human-computer interaction . In ACMMM , pp. 669 - 676 . M. Pantic, N. Sebe, J. F. Cohn, and T. Huang. 2005. Affective multimodal human-computer interaction. In ACMMM, pp. 669-676."},{"key":"e_1_4_1_532_1","first-page":"361","volume-title":"ECCV","author":"Papadopoulos D. P.","unstructured":"D. P. Papadopoulos , A. D. F. Clarke , F. Keller , and V. Ferrari . 2014. Training object class detectors from eye tracking data . In ECCV , pp. 361 - 376 . D. P. Papadopoulos, A. D. F. Clarke, F. Keller, and V. Ferrari. 2014. Training object class detectors from eye tracking data. In ECCV, pp. 361-376."},{"key":"e_1_4_1_533_1","first-page":"311","volume-title":"ACL","author":"Papineni K.","year":"2002","unstructured":"K. Papineni , S. Roukos , T. Ward , and W.-J. Zhu . 2002 . Bleu: A method for automatic evaluation of machine translation . In ACL , pp. 311 - 318 . K. Papineni, S. Roukos, T. Ward, and W.-J. Zhu. 2002. Bleu: A method for automatic evaluation of machine translation. In ACL, pp. 311-318."},{"key":"e_1_4_1_534_1","first-page":"1427","volume-title":"2011 International Conference on Computer Vision","author":"Parkhi O. M.","unstructured":"O. M. Parkhi , A. Vedaldi , C. V. Jawahar , and A. Zisserman . 2011. The truth about cats and dogs . 2011 International Conference on Computer Vision , pp. 1427 - 1434 . O. M. Parkhi, A. Vedaldi, C. V. Jawahar, and A. Zisserman. 2011. The truth about cats and dogs. 2011 International Conference on Computer Vision, pp. 1427-1434."},{"key":"e_1_4_1_535_1","doi-asserted-by":"publisher","DOI":"10.1163\/15685680360511645"},{"volume-title":"Proceedings of International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 1(1-10)","author":"Patel P.","key":"e_1_4_1_536_1","unstructured":"P. Patel , A. Ranabahu , and A. Sheth . 2009. Service level agreement in cloud computing . In Proceedings of International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 1(1-10) . P. Patel, A. Ranabahu, and A. Sheth. 2009. Service level agreement in cloud computing. In Proceedings of International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), 1(1-10)."},{"key":"e_1_4_1_537_1","first-page":"1849","volume-title":"ICASSP","author":"Pathak M. A.","unstructured":"M. A. Pathak and B. Raj . March 2012. Privacy-preserving speaker verification as password matching . In ICASSP , pp. 1849 - 1852 . M. A. Pathak and B. Raj. March 2012. Privacy-preserving speaker verification as password matching. In ICASSP, pp. 1849-1852."},{"key":"e_1_4_1_538_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2215602"},{"key":"e_1_4_1_539_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2010.04.004"},{"key":"e_1_4_1_540_1","first-page":"473","volume-title":"ACM Conference on Human Factors in Computing Systems","author":"Peck E. M. M.","unstructured":"E. M. M. Peck , B. F. Yuksel , A. Ottley , R. J. Jacob , and R. Chang . 2013. Using fNIRS brain sensing to evaluate information visualization interfaces . In ACM Conference on Human Factors in Computing Systems , pp. 473 - 482 . E. M. M. Peck, B. F. Yuksel, A. Ottley, R. J. Jacob, and R. Chang. 2013. Using fNIRS brain sensing to evaluate information visualization interfaces. In ACM Conference on Human Factors in Computing Systems, pp. 473-482."},{"key":"e_1_4_1_541_1","first-page":"281","volume-title":"Big Five Assessment","author":"Perugini M.","unstructured":"M. Perugini and L. Di Blas . 2002. Analyzing personality-related adjectives from an eticemic perspective: The big five marker scale (BFMS) and the Italian AB5C taxonomy . Big Five Assessment , pp. 281 - 304 . M. Perugini and L. Di Blas. 2002. Analyzing personality-related adjectives from an eticemic perspective: The big five marker scale (BFMS) and the Italian AB5C taxonomy. Big Five Assessment, pp. 281-304."},{"key":"e_1_4_1_542_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2005.03.019"},{"key":"e_1_4_1_543_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2012.08.014"},{"key":"e_1_4_1_544_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.310"},{"key":"e_1_4_1_545_1","first-page":"1","volume-title":"CVPR","author":"Philbin J.","unstructured":"J. Philbin , O. Chum , M. Isard , J. Sivic , and A. Zisserman . June 2008. Lost in quantization: Improving particular object retrieval in large scale image databases . In CVPR , pp. 1 - 8 . J. Philbin, O. Chum, M. Isard, J. Sivic, and A. Zisserman. June 2008. Lost in quantization: Improving particular object retrieval in large scale image databases. In CVPR, pp. 1-8."},{"key":"e_1_4_1_546_1","first-page":"21","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Pikrakis A.","unstructured":"A. Pikrakis , T. Giannakopoulos , and S. Theodoridis . 2008. Gunshot detection in audio streams from movies by means of dynamic programming and Bayesian networks . In IEEE International Conference on Acoustics, Speech and Signal Processing , pp. 21 - 24 . IEEE. A. Pikrakis, T. Giannakopoulos, and S. Theodoridis. 2008. Gunshot detection in audio streams from movies by means of dynamic programming and Bayesian networks. In IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 21-24. IEEE."},{"key":"e_1_4_1_547_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.34"},{"key":"e_1_4_1_548_1","doi-asserted-by":"crossref","unstructured":"A. Piva and S. Katzenbeisser. 2008. Special issue on signal processing in the encrypted domain. Hindawi Publishing Corporation EURASIP Journal on Information Security (eds.) 2007. A. Piva and S. Katzenbeisser. 2008. Special issue on signal processing in the encrypted domain. Hindawi Publishing Corporation EURASIP Journal on Information Security (eds.) 2007.","DOI":"10.1186\/1687-417X-2007-082790"},{"key":"e_1_4_1_549_1","article-title":"A discriminative model for polyphonic piano transcription","volume":"2007","author":"Poliner G.","year":"2007","unstructured":"G. Poliner and D. P. W. Ellis . 2007 . A discriminative model for polyphonic piano transcription . EURASIP Journal on Advances in Signal Processing , 2007 (2007): 9 pages. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/PoliE06-piano.pdf. Special Issue on Music Signal Processing. G. Poliner and D. P. W. Ellis. 2007. A discriminative model for polyphonic piano transcription. EURASIP Journal on Advances in Signal Processing, 2007(2007): 9 pages. http:\/\/www.ee.columbia.edu\/~dpwe\/pubs\/PoliE06-piano.pdf. Special Issue on Music Signal Processing.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"e_1_4_1_550_1","first-page":"3","volume-title":"2013 ACM International Workshop on Personal Data Meets Distributed Multimedia. Association for Computing Machinery","author":"Pongpaichet S.","unstructured":"S. Pongpaichet , V. K. Singh , R. Jain , and A. P. Pentland . 2013. Situation fencing: making geo-fencing personal and dynamic . In 2013 ACM International Workshop on Personal Data Meets Distributed Multimedia. Association for Computing Machinery , pp. 3 - 10 . S. Pongpaichet, V. K. Singh, R. Jain, and A. P. Pentland. 2013. Situation fencing: making geo-fencing personal and dynamic. In 2013 ACM International Workshop on Personal Data Meets Distributed Multimedia. Association for Computing Machinery, pp. 3-10."},{"key":"e_1_4_1_551_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2009.11.014"},{"key":"e_1_4_1_552_1","unstructured":"D. A. Pospelov. 1986. Situational Control: Theory and Practice (in Russian). Nauka. D. A. Pospelov. 1986. Situational Control: Theory and Practice (in Russian). Nauka."},{"key":"e_1_4_1_553_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2014.01.001"},{"key":"e_1_4_1_554_1","first-page":"205","volume-title":"Proceedings of International Workshop on Peer-to-Peer Systems (IPTPS)","author":"Pouwelse J.","unstructured":"J. Pouwelse , P. Garbacki , D. Epema , and H. Sips . 2005. The Bittorrent P2P file-sharing system: Measurements and analysis . In Proceedings of International Workshop on Peer-to-Peer Systems (IPTPS) , pp. 205 - 216 . J. Pouwelse, P. Garbacki, D. Epema, and H. Sips. 2005. The Bittorrent P2P file-sharing system: Measurements and analysis. In Proceedings of International Workshop on Peer-to-Peer Systems (IPTPS), pp. 205-216."},{"key":"e_1_4_1_555_1","unstructured":"J. Prins Z. Erkin and R. L. Lagendijk. 2006. Literature study: Signal processing in the encrypted domain. Technical report Information and Communication Theory Group Delft University of Technology. J. Prins Z. Erkin and R. L. Lagendijk. 2006. Literature study: Signal processing in the encrypted domain. Technical report Information and Communication Theory Group Delft University of Technology."},{"key":"e_1_4_1_556_1","first-page":"2629","volume-title":"Proceedings of 19th IEEE International Conference on Image Processing","author":"Puech W.","unstructured":"W. Puech , Z. Erkin , M. Barni , S. Rane , and R. L. Lagendijk . 2012. Emerging cryptographic challenges in image and video processing . Proceedings of 19th IEEE International Conference on Image Processing , pp. 2629 - 2632 . W. Puech, Z. Erkin, M. Barni, S. Rane, and R. L. Lagendijk. 2012. Emerging cryptographic challenges in image and video processing. Proceedings of 19th IEEE International Conference on Image Processing, pp. 2629-2632."},{"key":"e_1_4_1_557_1","first-page":"497","volume-title":"Proceedings of the ACM International Conference on Multimedia","author":"Qin Z.","unstructured":"Z. Qin , J. Yan , K. Ren , C. W. Chen , and C. Wang . 2014. Towards efficient privacy-preserving image feature extraction in cloud computing . In Proceedings of the ACM International Conference on Multimedia , pp. 497 - 506 . ACM. Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang. 2014. Towards efficient privacy-preserving image feature extraction in cloud computing. In Proceedings of the ACM International Conference on Multimedia, pp. 497-506. ACM."},{"key":"e_1_4_1_558_1","first-page":"727","volume-title":"Proceedings of the 15th International Conference on World Wide Web","author":"Qiu F.","unstructured":"F. Qiu and J. Cho . 2006. Automatic identification of user interest for personalized search . In Proceedings of the 15th International Conference on World Wide Web , pp. 727 - 736 . ACM. F. Qiu and J. Cho. 2006. Automatic identification of user interest for personalized search. In Proceedings of the 15th International Conference on World Wide Web, pp. 727-736. ACM."},{"key":"e_1_4_1_559_1","doi-asserted-by":"crossref","unstructured":"Z. Qiu T. Yao and T. Mei. 2016. Deep quantization: Encoding convolutional activations with deep generative model. arXiv:1611.09502. Z. Qiu T. Yao and T. Mei. 2016. Deep quantization: Encoding convolutional activations with deep generative model. arXiv:1611.09502 .","DOI":"10.1109\/CVPR.2017.435"},{"key":"e_1_4_1_560_1","first-page":"1","volume-title":"ICPR","author":"Rabin J.","unstructured":"J. Rabin , J. Delon , and Y. Gousseau . Dec . 2008. A contrario matching of SIFT-like descriptors . In ICPR , pp. 1 - 4 . J. Rabin, J. Delon, and Y. Gousseau. Dec. 2008. A contrario matching of SIFT-like descriptors. In ICPR, pp. 1-4."},{"key":"e_1_4_1_561_1","doi-asserted-by":"publisher","DOI":"10.1137\/090751359"},{"key":"e_1_4_1_562_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953015"},{"key":"e_1_4_1_563_1","first-page":"1509","volume-title":"NIPS","author":"Raginsky M.","unstructured":"M. Raginsky and S. Lazebnik . 2010. Locality-sensitive binary codes from shift-invariant kernels . In NIPS , pp. 1509 - 1517 . M. Raginsky and S. Lazebnik. 2010. Locality-sensitive binary codes from shift-invariant kernels. In NIPS, pp. 1509-1517."},{"key":"e_1_4_1_564_1","first-page":"1177","volume-title":"NIPS","author":"Rahimi A.","unstructured":"A. Rahimi and B. Recht . 2007. Random features for large-scale kernel machines . In NIPS , pp. 1177 - 1184 . A. Rahimi and B. Recht. 2007. Random features for large-scale kernel machines. In NIPS, pp. 1177-1184."},{"key":"e_1_4_1_565_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1511828"},{"key":"e_1_4_1_566_1","first-page":"717","volume-title":"Proceedings of Interspeech","author":"Raj B.","unstructured":"B. Raj , T. Virtanen , S. Chaudhuri , and R. Singh . 2010a. Non-negative matrix factorization based compensation of music for automatic speech recognition . In Proceedings of Interspeech , pp. 717 - 720 . B. Raj, T. Virtanen, S. Chaudhuri, and R. Singh. 2010a. Non-negative matrix factorization based compensation of music for automatic speech recognition. In Proceedings of Interspeech, pp. 717-720."},{"key":"e_1_4_1_567_1","first-page":"330","volume-title":"Proceedings of Interspeech","author":"Raj B.","unstructured":"B. Raj , T. Virtanen , S. Chaudhuri , and R. Singh . 2010b. Ungrounded non-negative independent factor analysis . In Proceedings of Interspeech , pp. 330 - 333 . B. Raj, T. Virtanen, S. Chaudhuri, and R. Singh. 2010b. Ungrounded non-negative independent factor analysis. In Proceedings of Interspeech, pp. 330-333."},{"key":"e_1_4_1_568_1","first-page":"1217","volume-title":"Proceedings of Interspeech","author":"Raj B.","unstructured":"B. Raj , R. Singh , and T. Virtanen . 2011. Phoneme-dependent NMF for speech enhancement in monaural mixtures . In Proceedings of Interspeech , pp. 1217 - 1220 . B. Raj, R. Singh, and T. Virtanen. 2011. Phoneme-dependent NMF for speech enhancement in monaural mixtures. In Proceedings of Interspeech, pp. 1217-1220."},{"key":"e_1_4_1_569_1","first-page":"652","volume-title":"Asian Conference on Computer Vision (ACCV)","author":"Rajagopal A. K.","unstructured":"A. K. Rajagopal , R. Subramanian , R. L. Vieriu , E. Ricci , O. Lanz , K. Ramakrishnan , and N. Sebe . 2012. An adaptation framework for head-pose classification in dynamic multi-view scenarios . In Asian Conference on Computer Vision (ACCV) , pp. 652 - 666 . Springer Berlin Heidelberg. A. K. Rajagopal, R. Subramanian, R. L. Vieriu, E. Ricci, O. Lanz, K. Ramakrishnan, and N. Sebe. 2012. An adaptation framework for head-pose classification in dynamic multi-view scenarios. In Asian Conference on Computer Vision (ACCV), pp. 652-666. Springer Berlin Heidelberg."},{"key":"e_1_4_1_570_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0692-2"},{"key":"e_1_4_1_571_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.917218"},{"key":"e_1_4_1_572_1","first-page":"5848","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (co-chaired)","author":"Rane S.","unstructured":"S. Rane and M. Barni . 2011. Special session on secure signal processing . Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (co-chaired) , pp. 5848 - 5871 . S. Rane and M. Barni. 2011. Special session on secure signal processing. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (co-chaired), pp. 5848-5871."},{"key":"e_1_4_1_573_1","unstructured":"J. Rasmussen 2011. Temporal point processes: The conditional intensity function. http:\/\/people.math.aau.dk\/~jgr\/teaching\/punktproc11\/tpp.pdf. J. Rasmussen 2011. Temporal point processes: The conditional intensity function. http:\/\/people.math.aau.dk\/~jgr\/teaching\/punktproc11\/tpp.pdf."},{"key":"e_1_4_1_574_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11009-011-9272-5"},{"key":"e_1_4_1_575_1","first-page":"512","volume-title":"CVPR Workshop","author":"Razavian A. S.","unstructured":"A. S. Razavian , H. Azizpour , J. Sullivan , and S. Carlsson . 2014. CNN features off-the-shelf: An astounding baseline for recognition . In CVPR Workshop , pp. 512 - 519 . A. S. Razavian, H. Azizpour, J. Sullivan, and S. Carlsson. 2014. CNN features off-the-shelf: An astounding baseline for recognition. In CVPR Workshop, pp. 512-519."},{"volume-title":"Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems","author":"Reiter R.","key":"e_1_4_1_576_1","unstructured":"R. Reiter . 2001. Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems . MIT Press . R. Reiter. 2001. Knowledge in Action: Logical Foundations for Specifying and Implementing Dynamical Systems. MIT Press."},{"key":"e_1_4_1_577_1","doi-asserted-by":"publisher","DOI":"10.5555\/2478568.2479100"},{"key":"e_1_4_1_578_1","first-page":"4660","volume-title":"IEEE ICCV","author":"Ricci E.","unstructured":"E. Ricci , J. Varadarajan , R. Subramanian , S. Rota Bulo , N. Ahuja , and O. Lanz . 2015. Uncovering interactions and interactors: Joint estimation of head, body orientation and f-formations from surveillance videos . In IEEE ICCV , pp. 4660 - 4668 . E. Ricci, J. Varadarajan, R. Subramanian, S. Rota Bulo, N. Ahuja, and O. Lanz. 2015. Uncovering interactions and interactors: Joint estimation of head, body orientation and f-formations from surveillance videos. In IEEE ICCV, pp. 4660-4668."},{"key":"e_1_4_1_579_1","volume-title":"IADIS International Conference Game and Entertainment Technologies 2013 (GET","author":"Riungu-Kalliosaari L.","year":"2013","unstructured":"L. Riungu-Kalliosaari , J. Kasurinen , and K. Smolander . 2011. Cloud services and cloud gaming in game development . IADIS International Conference Game and Entertainment Technologies 2013 (GET 2013 ), (1). L. Riungu-Kalliosaari, J. Kasurinen, and K. Smolander. 2011. Cloud services and cloud gaming in game development. IADIS International Conference Game and Entertainment Technologies 2013 (GET 2013), (1)."},{"key":"e_1_4_1_580_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_4_1_581_1","first-page":"1","volume-title":"International Conference on World Wide Web","author":"Rizoiu M.-A.","year":"2017","unstructured":"M.-A. Rizoiu , L. Xie , S. Sanner , M. Cebrian , H. Yu , and P. Van Hentenryck . 2017. Expecting to be HIP: Hawkes intensity processes for social media popularity . In International Conference on World Wide Web 2017 , pp. 1 - 9 . Perth, Australia. http:\/\/arxiv.org\/abs\/1602.06033. M.-A. Rizoiu, L. Xie, S. Sanner, M. Cebrian, H. Yu, and P. Van Hentenryck. 2017. Expecting to be HIP: Hawkes intensity processes for social media popularity. In International Conference on World Wide Web 2017, pp. 1-9. Perth, Australia. http:\/\/arxiv.org\/abs\/1602.06033."},{"key":"e_1_4_1_582_1","first-page":"402","volume-title":"ECCV","author":"Robertson N.","unstructured":"N. Robertson and I. Reid . 2006. Estimating gaze direction from low-resolution faces in video . In ECCV , pp. 402 - 415 . N. Robertson and I. Reid. 2006. Estimating gaze direction from low-resolution faces in video. In ECCV, pp. 402-415."},{"key":"e_1_4_1_583_1","first-page":"184","volume-title":"GCPR","author":"Rohrbach A.","unstructured":"A. Rohrbach , M. Rohrbach , W. Qiu , A. Friedrich , M. Pinkal , and B. Schiele . 2014. Coherent multi-sentence video description with variable level of detail . In GCPR , pp. 184 - 195 . A. Rohrbach, M. Rohrbach, W. Qiu, A. Friedrich, M. Pinkal, and B. Schiele. 2014. Coherent multi-sentence video description with variable level of detail. In GCPR, pp. 184-195."},{"key":"e_1_4_1_584_1","first-page":"209","volume-title":"GCPR","author":"Rohrbach A.","unstructured":"A. Rohrbach , M. Rohrbach , and B. Schiele . 2015a. The long-short story of movie description . In GCPR , pp. 209 - 221 . A. Rohrbach, M. Rohrbach, and B. Schiele. 2015a. The long-short story of movie description. In GCPR, pp. 209-221."},{"key":"e_1_4_1_585_1","first-page":"3202","volume-title":"CVPR","author":"Rohrbach A.","unstructured":"A. Rohrbach , M. Rohrbach , N. Tandon , and B. Schiele . 2015b. A dataset for movie description . In CVPR , pp. 3202 - 3212 . A. Rohrbach, M. Rohrbach, N. Tandon, and B. Schiele. 2015b. A dataset for movie description. In CVPR, pp. 3202-3212."},{"key":"e_1_4_1_586_1","first-page":"433","volume-title":"ICCV","author":"Rohrbach M.","unstructured":"M. Rohrbach , W. Qiu , I. Titov , S. Thater , M. Pinkal , and B. Schiele . 2013. Translating video content to natural language descriptions . In ICCV , pp. 433 - 440 . M. Rohrbach, W. Qiu, I. Titov, S. Thater, M. Pinkal, and B. Schiele. 2013. Translating video content to natural language descriptions. In ICCV, pp. 433-440."},{"key":"e_1_4_1_587_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0851-8"},{"key":"e_1_4_1_588_1","first-page":"129","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing","author":"Rose R. C.","unstructured":"R. C. Rose and D. B. Paul . 1990. A hidden Markov model based keyword recognition system . In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing , pp. 129 - 132 . R. C. Rose and D. B. Paul. 1990. A hidden Markov model based keyword recognition system. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 129-132."},{"key":"e_1_4_1_589_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2009.4795441"},{"key":"e_1_4_1_590_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.655647"},{"key":"e_1_4_1_591_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.718510"},{"key":"e_1_4_1_592_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"e_1_4_1_593_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0090-8"},{"key":"e_1_4_1_594_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0077714"},{"key":"e_1_4_1_595_1","first-page":"2249","volume-title":"ICASSP","author":"Ryynanen M.","unstructured":"M. Ryynanen and A. Klapuri . April 2008. Query by humming of midi and audio using locality sensitive hashing . In ICASSP , pp. 2249 - 2252 . M. Ryynanen and A. Klapuri. April 2008. Query by humming of midi and audio using locality sensitive hashing. In ICASSP, pp. 2249-2252."},{"key":"e_1_4_1_596_1","doi-asserted-by":"crossref","unstructured":"A. Sablayrolles M. Douze N. Usunier and H. J\u00e9gou. 2016. How should we evaluate supervised hashing? arXiv:1609.06753. A. Sablayrolles M. Douze N. Usunier and H. J\u00e9gou. 2016. How should we evaluate supervised hashing? arXiv:1609.06753 .","DOI":"10.1109\/ICASSP.2017.7952453"},{"key":"e_1_4_1_597_1","doi-asserted-by":"crossref","unstructured":"A. R. Sadeghi T. Schneider and I. Wehrenberg . 2010 . Efficient privacy-preserving face recognition. In Proceedings of the 12th International Conference on Information Security and Cryptology volume 5984 of Lecture Notes in Computer Science pp. 229 - 244 . Springer . A. R. Sadeghi T. Schneider and I. Wehrenberg. 2010. Efficient privacy-preserving face recognition. In Proceedings of the 12 th International Conference on Information Security and Cryptology volume 5984 of Lecture Notes in Computer Science pp. 229-244. Springer.","DOI":"10.1007\/978-3-642-14423-3_16"},{"key":"e_1_4_1_598_1","article-title":"under review. Audio content descriptors","author":"Saeger S.","year":"2016","unstructured":"S. Saeger , B. Elizalde , C. Schulze , D. Borth , B. Raj , and I. Lane . 2016 , under review. Audio content descriptors . IEEE Transactions on Audio Speech and Language Processing. S. Saeger, B. Elizalde, C. Schulze, D. Borth, B. Raj, and I. Lane. 2016, under review. Audio content descriptors. IEEE Transactions on Audio Speech and Language Processing.","journal-title":"IEEE Transactions on Audio Speech and Language Processing."},{"key":"e_1_4_1_599_1","first-page":"253","volume-title":"Proceedings of the 19th IEEE International Conference on Image Processing","author":"Saghaian Nejad Esfahani M. S.","year":"2012","unstructured":"M. S. Saghaian Nejad Esfahani , Y. Luo , and S.-C. Sen . 2012 . Privacy protected image denoising with secret shares . In Proceedings of the 19th IEEE International Conference on Image Processing , pp. 253 - 256 . M. S. Saghaian Nejad Esfahani, Y. Luo, and S.-C. Sen. 2012. Privacy protected image denoising with secret shares. In Proceedings of the 19th IEEE International Conference on Image Processing, pp. 253-256."},{"issue":"17","key":"e_1_4_1_600_1","first-page":"135","article-title":"W3-Privacy: Understanding what, when, and where inference channels in multi-camera surveillance video","volume":"68","author":"Saini M.","year":"2012","unstructured":"M. Saini , P. K. Atrey , S. Mehrotra , and M. S. Kankanhalli . 2012 . W3-Privacy: Understanding what, when, and where inference channels in multi-camera surveillance video . Springer International Journal of Multimedia Tools and Applications , 68 ( 17 ): 135 - 158 . M. Saini, P. K. Atrey, S. Mehrotra, and M. S. Kankanhalli. 2012. W3-Privacy: Understanding what, when, and where inference channels in multi-camera surveillance video. Springer International Journal of Multimedia Tools and Applications, 68(17): 135-158.","journal-title":"Springer International Journal of Multimedia Tools and Applications"},{"issue":"1","key":"e_1_4_1_601_1","first-page":"23","article-title":"Privacy aware publication of surveillance video","volume":"1","author":"Saini M.","year":"2013","unstructured":"M. Saini , P. K. Atrey , S. Mehrotra , and M. S. Kankanhalli . 2013 . Privacy aware publication of surveillance video . Inderscience International Journal of Trust Management in Computing and Communications , 1 ( 1 ): 23 - 51 . M. Saini, P. K. Atrey, S. Mehrotra, and M. S. Kankanhalli. 2013. Privacy aware publication of surveillance video. Inderscience International Journal of Trust Management in Computing and Communications, 1(1): 23-51.","journal-title":"Inderscience International Journal of Trust Management in Computing and Communications"},{"volume-title":"Foundations of Multidimensional and Metric Data Structures","author":"Samet H.","key":"e_1_4_1_602_1","unstructured":"H. Samet . 2007. Foundations of Multidimensional and Metric Data Structures . Elsevier . H. Samet. 2007. Foundations of Multidimensional and Metric Data Structures. Elsevier."},{"key":"e_1_4_1_603_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-013-0636-x"},{"key":"e_1_4_1_604_1","doi-asserted-by":"crossref","unstructured":"T. Sander and C. Tschudin . 1998 . On software protection via function hiding. In Information Hiding volume 1525 of Lecture Notes in Computer Science pp. 111 - 123 . Springer . T. Sander and C. Tschudin. 1998. On software protection via function hiding. In Information Hiding volume 1525 of Lecture Notes in Computer Science pp. 111-123. Springer.","DOI":"10.1007\/3-540-49380-8_9"},{"key":"e_1_4_1_605_1","first-page":"1242","volume-title":"ICASSP, Signal Processing","author":"Sandhawalia H.","unstructured":"H. Sandhawalia and H. J\u00e9gou . March 2010. Searching with expectations . In ICASSP, Signal Processing , pp. 1242 - 1245 . H. Sandhawalia and H. J\u00e9gou. March 2010. Searching with expectations. In ICASSP, Signal Processing, pp. 1242-1245."},{"volume-title":"A survey of unsupervised grammar induction. Manuscript","author":"Sankaran B.","key":"e_1_4_1_606_1","unstructured":"B. Sankaran . 2010. A survey of unsupervised grammar induction. Manuscript , Simon Fraser University . B. Sankaran. 2010. A survey of unsupervised grammar induction. Manuscript, Simon Fraser University."},{"key":"e_1_4_1_607_1","first-page":"27","volume-title":"Symposium on Eye Tracking Research & Applications","author":"Santella A.","unstructured":"A. Santella and D. DeCarlo . 2004. Robust clustering of eye movement recordings for quantification of visual interest . In Symposium on Eye Tracking Research & Applications , pp. 27 - 34 . A. Santella and D. DeCarlo. 2004. Robust clustering of eye movement recordings for quantification of visual interest. In Symposium on Eye Tracking Research & Applications, pp. 27-34."},{"key":"e_1_4_1_608_1","first-page":"55","volume-title":"Proceedings of the 16th Annual USENIX Security Symposium","volume":"3","author":"Saponas T. S.","unstructured":"T. S. Saponas , J. Lester , C. Hartung , S. Agarwal , and T. Kohno . 2007. Devices that tell on you: Privacy trends in consumer ubiquitous computing . In Proceedings of the 16th Annual USENIX Security Symposium , volume 3 , pp. 55 - 70 . T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. 2007. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Proceedings of the 16th Annual USENIX Security Symposium, volume 3, pp. 55-70."},{"volume-title":"Volunteer computing. Technical report","author":"Sarmenta F.","key":"e_1_4_1_609_1","unstructured":"F. Sarmenta . 2001. Volunteer computing. Technical report , Massachusetts Institute of Technology . F. Sarmenta. 2001. Volunteer computing. Technical report, Massachusetts Institute of Technology."},{"key":"e_1_4_1_610_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327108ijap0101_4"},{"key":"e_1_4_1_611_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"e_1_4_1_612_1","first-page":"135","volume-title":"Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security","author":"Schneider M.","unstructured":"M. Schneider and T. Schneider . 2014. Notes on non-interactive secure comparison in image feature extraction in the encrypted domain with privacy-preserving SIFT . In Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security , pp. 135 - 140 . ACM. M. Schneider and T. Schneider. 2014. Notes on non-interactive secure comparison in image feature extraction in the encrypted domain with privacy-preserving SIFT. In Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, pp. 135-140. ACM."},{"key":"e_1_4_1_613_1","first-page":"32","volume-title":"ICPR","author":"Schuldt C.","unstructured":"C. Schuldt , I. Laptev , and B. Caputo . 2004. Recognizing human actions: A local SVM approach . In ICPR , pp. 32 - 36 . C. Schuldt, I. Laptev, and B. Caputo. 2004. Recognizing human actions: A local SVM approach. In ICPR, pp. 32-36."},{"key":"e_1_4_1_614_1","first-page":"1136","volume-title":"International Conference on Pattern Recognition","volume":"1","author":"Sebe N.","unstructured":"N. Sebe , I. Cohen , T. Gevers , and T. S. Huang . 2006. Emotion recognition based on joint visual and audio cues . In International Conference on Pattern Recognition , volume 1 , pp. 1136 - 1139 . N. Sebe, I. Cohen, T. Gevers, and T. S. Huang. 2006. Emotion recognition based on joint visual and audio cues. In International Conference on Pattern Recognition, volume 1, pp. 1136-1139."},{"key":"e_1_4_1_615_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2004.832988"},{"key":"e_1_4_1_616_1","unstructured":"A. Senior S. Pankanti A. Hampapur L. Brown Y.-L. Tian and A. Ekin. 2003. Blinkering surveillance: Enabling video privacy through computer vision. Technical report IBM. A. Senior S. Pankanti A. Hampapur L. Brown Y.-L. Tian and A. Ekin. 2003. Blinkering surveillance: Enabling video privacy through computer vision. Technical report IBM."},{"key":"e_1_4_1_617_1","first-page":"3547","volume-title":"Proceedings of the International Conference on Image Processing (ICIP)","author":"Setti F.","unstructured":"F. Setti , O. Lanz , R. Ferrario , V. Murino , and M. Cristani . 2013. Multi-scale F-formation discovery for group detection . In Proceedings of the International Conference on Image Processing (ICIP) , pp. 3547 - 3551 . F. Setti, O. Lanz, R. Ferrario, V. Murino, and M. Cristani. 2013. Multi-scale F-formation discovery for group detection. In Proceedings of the International Conference on Image Processing (ICIP), pp. 3547-3551."},{"key":"e_1_4_1_618_1","doi-asserted-by":"crossref","unstructured":"F. Setti C. Russell C. Bassetti and M. Cristani. 2015. F-formation detection: Individuating free-standing conversational groups in images. PloS ONE 10(5). F. Setti C. Russell C. Bassetti and M. Cristani. 2015. F-formation detection: Individuating free-standing conversational groups in images. PloS ONE 10(5).","DOI":"10.1371\/journal.pone.0123783"},{"key":"e_1_4_1_619_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9129-2"},{"key":"e_1_4_1_620_1","doi-asserted-by":"crossref","unstructured":"G. Shakhnarovich T. Darrell and P. Indyk. March 2006. Nearest-Neighbor Methods in Learning and Vision: Theory and Practice chapter 3. MIT Press. G. Shakhnarovich T. Darrell and P. Indyk. March 2006. Nearest-Neighbor Methods in Learning and Vision: Theory and Practice chapter 3. MIT Press.","DOI":"10.7551\/mitpress\/4908.001.0001"},{"key":"e_1_4_1_621_1","unstructured":"S. Sharma R. Kiros and R. Salakhutdinov. 2015. Action recognition using visual attention. arXiv:1511.04119. S. Sharma R. Kiros and R. Salakhutdinov. 2015. Action recognition using visual attention. arXiv:1511.04119 ."},{"key":"e_1_4_1_622_1","first-page":"1","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition","author":"Shashank J.","unstructured":"J. Shashank , P. Kowshik , K. Srinathan , and C. Jawahar . 2008. Private content based image retrieval . In IEEE Conference on Computer Vision and Pattern Recognition , pp. 1 - 8 . J. Shashank, P. Kowshik, K. Srinathan, and C. Jawahar. 2008. Private content based image retrieval. In IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-8."},{"key":"e_1_4_1_623_1","first-page":"1088","volume-title":"2006 IEEE International Conference on Acoustics, Speech and Signal Processing","volume":"3","author":"Shashanka M. V.","unstructured":"M. V. Shashanka and P. Smaragdis . 2006. Secure sound classification: Gaussian mixture models . In 2006 IEEE International Conference on Acoustics, Speech and Signal Processing , volume 3 , pp. 1088 - 1091 . IEEE. M. V. Shashanka and P. Smaragdis. 2006. Secure sound classification: Gaussian mixture models. In 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, volume 3, pp. 1088-1091. IEEE."},{"key":"e_1_4_1_624_1","doi-asserted-by":"crossref","unstructured":"M. Shashanka B. Raj and P. Smaragdis. May 2008. Probabilistic latent variable models as non-negative factorizations. Computational Intelligence and Neuroscience article 947438. M. Shashanka B. Raj and P. Smaragdis. May 2008. Probabilistic latent variable models as non-negative factorizations. Computational Intelligence and Neuroscience article 947438.","DOI":"10.1155\/2008\/947438"},{"key":"e_1_4_1_625_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6574660"},{"key":"e_1_4_1_626_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2450172"},{"volume-title":"Proceedings of the International Conference on Music Information Retrieval ISMIR-03","author":"Sheh A.","key":"e_1_4_1_627_1","unstructured":"A. Sheh and D. P. Ellis . 2003. Chord segmentation and recognition using EM-trained hidden Markov models . In Proceedings of the International Conference on Music Information Retrieval ISMIR-03 , A. Sheh and D. P. Ellis. 2003. Chord segmentation and recognition using EM-trained hidden Markov models. In Proceedings of the International Conference on Music Information Retrieval ISMIR-03,"},{"key":"e_1_4_1_628_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2002.1017732"},{"key":"e_1_4_1_629_1","first-page":"845","volume-title":"ACM Conference on Human Factors in Computing Systems","author":"Shenoy P.","unstructured":"P. Shenoy and D. S. Tan . 2008. Human-aided computing: Utilizing implicit human processing to classify images . In ACM Conference on Human Factors in Computing Systems , pp. 845 - 854 . P. Shenoy and D. S. Tan. 2008. Human-aided computing: Utilizing implicit human processing to classify images. In ACM Conference on Human Factors in Computing Systems, pp. 845-854."},{"key":"e_1_4_1_630_1","first-page":"34","article-title":"A trillion points of data","author":"Sheridan B.","year":"2009","unstructured":"B. Sheridan . March 9 , 2009 . A trillion points of data . Newsweek , 34 - 37 . B. Sheridan. March 9, 2009. A trillion points of data. Newsweek, 34-37.","journal-title":"Newsweek"},{"key":"e_1_4_1_631_1","first-page":"103","volume-title":"Proceedings of the 19th ACM International Conference on Multimedia","author":"Shi S.","unstructured":"S. Shi , C.-H. Hsu , K. Nahrstedt , and R. Campbell . 2011. Using graphics rendering contexts to enhance the real-time video coding for mobile cloud gaming . Proceedings of the 19th ACM International Conference on Multimedia , p. 103 . http:\/\/dl.acm.org\/citation.cfm?doid=2072298.2072313. S. Shi, C.-H. Hsu, K. Nahrstedt, and R. Campbell. 2011. Using graphics rendering contexts to enhance the real-time video coding for mobile cloud gaming. Proceedings of the 19th ACM International Conference on Multimedia, p. 103. http:\/\/dl.acm.org\/citation.cfm?doid=2072298.2072313."},{"key":"e_1_4_1_632_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2307438"},{"key":"e_1_4_1_633_1","first-page":"346","volume-title":"Proceedings of the 14th International Conference on Information Processing in Sensor Networks","author":"Shortell T.","unstructured":"T. Shortell and A. Shokoufandeh . 2015. Secure brightness\/contrast filter using fully homomorphic encryption . In Proceedings of the 14th International Conference on Information Processing in Sensor Networks , pp. 346 - 347 . ACM. T. Shortell and A. Shokoufandeh. 2015. Secure brightness\/contrast filter using fully homomorphic encryption. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks, pp. 346-347. ACM."},{"key":"e_1_4_1_634_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398381"},{"key":"e_1_4_1_635_1","first-page":"2321","volume-title":"NIPS","author":"Shrivastava A.","unstructured":"A. Shrivastava and P. Li . 2014. Asymmetric LSH for sublinear time maximum inner product search . In NIPS , pp. 2321 - 2329 . A. Shrivastava and P. Li. 2014. Asymmetric LSH for sublinear time maximum inner product search. In NIPS, pp. 2321-2329."},{"key":"e_1_4_1_636_1","doi-asserted-by":"publisher","DOI":"10.1016\/0893-9659(91)90080-F"},{"key":"e_1_4_1_637_1","first-page":"395","volume-title":"Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Siersdorfer S.","unstructured":"S. Siersdorfer , J. S. Pedro , and M. Sanderson . 2009. Automatic video tagging using content redundancy . In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval , pp. 395 - 402 . S. Siersdorfer, J. S. Pedro, and M. Sanderson. 2009. Automatic video tagging using content redundancy. In Proceedings of the International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 395-402."},{"key":"e_1_4_1_638_1","first-page":"568","article-title":"Two-stream convolutional networks for action recognition in videos","author":"Simonyan K.","year":"2014","unstructured":"K. Simonyan and A. Zisserman . 2014 . Two-stream convolutional networks for action recognition in videos . In NIPS , 568 - 576 . K. Simonyan and A. Zisserman. 2014. Two-stream convolutional networks for action recognition in videos. In NIPS, 568-576.","journal-title":"NIPS"},{"key":"e_1_4_1_639_1","first-page":"1","volume-title":"ICLR","author":"Simonyan K.","unstructured":"K. Simonyan and A. Zisserman . 2015. Very deep convolutional networks for large-scale image recognition . In ICLR , pp. 1 - 14 . K. Simonyan and A. Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. In ICLR, pp. 1-14."},{"key":"e_1_4_1_640_1","doi-asserted-by":"crossref","unstructured":"K. Simonyan A. Vedaldi and A. Zisserman. 2013. Learning local feature descriptors using convex optimisation. Technical report Department of Engineering Science University of Oxford. K. Simonyan A. Vedaldi and A. Zisserman. 2013. Learning local feature descriptors using convex optimisation. Technical report Department of Engineering Science University of Oxford.","DOI":"10.1109\/TPAMI.2014.2301163"},{"key":"e_1_4_1_641_1","first-page":"1914","volume-title":"Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)","author":"Singh R.","unstructured":"R. Singh , B. Raj , and P. Smaragdis . 2010a. Latent-variable decomposition based dereverberation of monaural and multi-channel signals . In Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP) , pp. 1914 - 1917 . R. Singh, B. Raj, and P. Smaragdis. 2010a. Latent-variable decomposition based dereverberation of monaural and multi-channel signals. In Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), pp. 1914-1917."},{"key":"e_1_4_1_642_1","first-page":"646","volume-title":"Proceedings of the ACM International Conference on Ubiquitous Computing","author":"Singh V.","unstructured":"V. Singh and R. Agarwal . 2016. Cooperative phoneotypes: Exploring phone-based behavioral markers of cooperation . In Proceedings of the ACM International Conference on Ubiquitous Computing , pp. 646 - 657 . V. Singh and R. Agarwal. 2016. Cooperative phoneotypes: Exploring phone-based behavioral markers of cooperation. In Proceedings of the ACM International Conference on Ubiquitous Computing, pp. 646-657."},{"key":"e_1_4_1_643_1","first-page":"1","volume-title":"Military Communications Conference (MILCOM)","author":"Singh V.","year":"2009","unstructured":"V. Singh and R. Jain . 2009b. Situation based control for cyber-physical environments . In Military Communications Conference (MILCOM) 2009 . IEEE, pp. 1 - 7 . V. Singh and R. Jain. 2009b. Situation based control for cyber-physical environments. In Military Communications Conference (MILCOM) 2009. IEEE, pp. 1-7."},{"key":"e_1_4_1_644_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0281-0"},{"key":"e_1_4_1_645_1","first-page":"1","volume-title":"Proceedings of the ACM Web Science Conference","author":"Singh V.","unstructured":"V. Singh , M. Gao , and R. Jain . 2010b. Event analytics on microblogs . In Proceedings of the ACM Web Science Conference , pp. 1 - 4 . ACM. V. Singh, M. Gao, and R. Jain. 2010b. Event analytics on microblogs. In Proceedings of the ACM Web Science Conference, pp. 1-4. ACM."},{"key":"e_1_4_1_646_1","first-page":"433","volume-title":"Proceedings of the International Conference on Multimedia Information Retrieval","author":"Singh V.","unstructured":"V. Singh , M. Gao , and R. Jain . 2010c. From microblogs to social images: Event analytics for situation assessment . In Proceedings of the International Conference on Multimedia Information Retrieval , pp. 433 - 436 . ACM. V. Singh, M. Gao, and R. Jain. 2010c. From microblogs to social images: Event analytics for situation assessment. In Proceedings of the International Conference on Multimedia Information Retrieval, pp. 433-436. ACM."},{"key":"e_1_4_1_647_1","doi-asserted-by":"crossref","unstructured":"V. K. Singh and R. Jain. 2016. Situation Recognition Using Eventshop. Springer. V. K. Singh and R. Jain. 2016. Situation Recognition Using Eventshop . Springer.","DOI":"10.1007\/978-3-319-30537-0"},{"key":"e_1_4_1_648_1","first-page":"11","volume-title":"Proceedings of the First SIGMM Workshop on Social Media","author":"Singh V. K.","unstructured":"V. K. Singh , R. Jain , and M. S. Kankanhalli . 2009b. Motivating contributors in social media networks . In Proceedings of the First SIGMM Workshop on Social Media , pp. 11 - 18 . ACM. V. K. Singh, R. Jain, and M. S. Kankanhalli. 2009b. Motivating contributors in social media networks. In Proceedings of the First SIGMM Workshop on Social Media, pp. 11-18. ACM."},{"key":"e_1_4_1_649_1","first-page":"1181","volume-title":"Proceedings of the 19th International Conference on World Wide Web","author":"Singh V. K.","unstructured":"V. K. Singh , M. Gao , and R. Jain . 2010d. Situation detection and control using spatio-temporal analysis of microblogs . In Proceedings of the 19th International Conference on World Wide Web , pp. 1181 - 1182 . ACM. V. K. Singh, M. Gao, and R. Jain. 2010d. Situation detection and control using spatio-temporal analysis of microblogs. In Proceedings of the 19th International Conference on World Wide Web, pp. 1181-1182. ACM."},{"key":"e_1_4_1_650_1","first-page":"481","volume-title":"Proceedings of the 18th ACM International Conference on Multimedia","author":"Singh V. K.","unstructured":"V. K. Singh , M. Gao , and R. Jain . 2010e. Social pixels: Genesis and evaluation . In Proceedings of the 18th ACM International Conference on Multimedia , pp. 481 - 490 . ACM. V. K. Singh, M. Gao, and R. Jain. 2010e. Social pixels: Genesis and evaluation. In Proceedings of the 18th ACM International Conference on Multimedia, pp. 481-490. ACM."},{"key":"e_1_4_1_651_1","first-page":"1209","volume-title":"Proceedings of the 20th ACM International Conference on Multimedia","author":"Singh V. K.","unstructured":"V. K. Singh , M. Gao , and R. Jain . 2012. Situation recognition: An evolving problem for heterogeneous dynamic big multimedia data . In Proceedings of the 20th ACM International Conference on Multimedia , pp. 1209 - 1218 . ACM. V. K. Singh, M. Gao, and R. Jain. 2012. Situation recognition: An evolving problem for heterogeneous dynamic big multimedia data. In Proceedings of the 20th ACM International Conference on Multimedia, pp. 1209-1218. ACM."},{"key":"e_1_4_1_652_1","first-page":"1105","volume-title":"Proceedings of the 21st ACM International Conference on Multimedia","author":"Singh V. K.","unstructured":"V. K. Singh , T.-S. Chua , R. Jain , and A. S. Pentland . 2013. Summary abstract for the 1st ACM international workshop on personal data meets distributed multimedia . In Proceedings of the 21st ACM International Conference on Multimedia , pp. 1105 - 1106 . ACM. V. K. Singh, T.-S. Chua, R. Jain, and A. S. Pentland. 2013. Summary abstract for the 1st ACM international workshop on personal data meets distributed multimedia. In Proceedings of the 21st ACM International Conference on Multimedia, pp. 1105- 1106. ACM."},{"key":"e_1_4_1_653_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2363986"},{"key":"e_1_4_1_654_1","first-page":"1","volume-title":"Proceedings of the 2016 ACM International Conference on Multimedia Retrieval","author":"Singh V. K.","unstructured":"V. K. Singh , S. Pongpaichet , and R. Jain . 2016. Situation recognition from multimodal data . In Proceedings of the 2016 ACM International Conference on Multimedia Retrieval , pp. 1 - 2 . ACM. V. K. Singh, S. Pongpaichet, and R. Jain. 2016. Situation recognition from multimodal data. In Proceedings of the 2016 ACM International Conference on Multimedia Retrieval, pp. 1-2. ACM."},{"key":"e_1_4_1_655_1","first-page":"1470","volume-title":"ICCV","author":"Sivic J.","unstructured":"J. Sivic and A. Zisserman . Oct . 2003. Video Google: A text retrieval approach to object matching in videos . In ICCV , pp. 1470 - 1477 . J. Sivic and A. Zisserman. Oct. 2003. Video Google: A text retrieval approach to object matching in videos. In ICCV, pp. 1470-1477."},{"key":"e_1_4_1_656_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2193849"},{"key":"e_1_4_1_657_1","first-page":"1","volume-title":"2014 13th Annual Workshop on Network and Systems Support for Games (NetGames)","author":"Slivar I.","unstructured":"I. Slivar , M. Suznjevic , L. Skorin-Kapov , and M. Matijasevic . Dec . 2014. Empirical QoE study of in-home streaming of online games . In 2014 13th Annual Workshop on Network and Systems Support for Games (NetGames) , pp. 1 - 6 . I. Slivar, M. Suznjevic, L. Skorin-Kapov, and M. Matijasevic. Dec. 2014. Empirical QoE study of in-home streaming of online games. In 2014 13th Annual Workshop on Network and Systems Support for Games (NetGames), pp. 1-6."},{"key":"e_1_4_1_658_1","first-page":"213","article-title":"Public privacy: Camera surveillance of public places and the right to anonymity","volume":"72","author":"Slobogin C.","year":"2002","unstructured":"C. Slobogin . 2002 . Public privacy: Camera surveillance of public places and the right to anonymity . Mississippi Law Journal , 72 : 213 - 301 . C. Slobogin. 2002. Public privacy: Camera surveillance of public places and the right to anonymity. Mississippi Law Journal, 72: 213-301.","journal-title":"Mississippi Law Journal"},{"key":"e_1_4_1_659_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(98)00047-2"},{"key":"e_1_4_1_660_1","first-page":"214","volume-title":"IEEE Workshop on Machine Learning for Signal Processing (MLSP)","author":"Smaragdis P.","unstructured":"P. Smaragdis and B. Raj . 2010. The Markov selection model for concurrent speech recognition . In IEEE Workshop on Machine Learning for Signal Processing (MLSP) , pp. 214 - 219 . P. Smaragdis and B. Raj. 2010. The Markov selection model for concurrent speech recognition. In IEEE Workshop on Machine Learning for Signal Processing (MLSP), pp. 214-219."},{"key":"e_1_4_1_661_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-010-0512-7"},{"key":"e_1_4_1_662_1","doi-asserted-by":"publisher","DOI":"10.5555\/2770421.2770436"},{"key":"e_1_4_1_663_1","first-page":"1","volume-title":"IEEE International Workshop for Machine Learning in Signal Processing","author":"Smaragdis P.","unstructured":"P. Smaragdis , B. Raj , and M. Shashanka . 2009a. Missing data imputation for spectral audio signals . In IEEE International Workshop for Machine Learning in Signal Processing , pp. 1 - 6 . P. Smaragdis, B. Raj, and M. Shashanka. 2009a. Missing data imputation for spectral audio signals. In IEEE International Workshop for Machine Learning in Signal Processing, pp. 1-6."},{"key":"e_1_4_1_664_1","first-page":"1705","volume-title":"Proceedings of Neural Information Processing Systems (NIPS)","author":"Smaragdis P.","unstructured":"P. Smaragdis , M. Shashanka , and B. Raj . 2009b. A sparse non-parametric approach for single channel separation of known sounds . In Proceedings of Neural Information Processing Systems (NIPS) , pp. 1705 - 1713 . P. Smaragdis, M. Shashanka, and B. Raj. 2009b. A sparse non-parametric approach for single channel separation of known sounds. In Proceedings of Neural Information Processing Systems (NIPS), pp. 1705-1713."},{"key":"e_1_4_1_665_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.895972"},{"key":"e_1_4_1_666_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049444"},{"key":"e_1_4_1_667_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.259"},{"key":"e_1_4_1_668_1","doi-asserted-by":"crossref","unstructured":"H. Sohn K. Plataniotis and Y. Ro . 2010 . Privacy-preserving watch list screening in video surveillance system. In Proceedings of the 11th Pacific Rim Conference on Multimedia Advances in Multimedia Information Processing volume 6297 of Lecture Notes in Computer Science pp. 622 - 632 . Springer . H. Sohn K. Plataniotis and Y. Ro. 2010. Privacy-preserving watch list screening in video surveillance system. In Proceedings of the 11 th Pacific Rim Conference on Multimedia Advances in Multimedia Information Processing volume 6297 of Lecture Notes in Computer Science pp. 622-632. Springer.","DOI":"10.1007\/978-3-642-15702-8_57"},{"key":"e_1_4_1_669_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2011.25"},{"key":"e_1_4_1_670_1","unstructured":"O. Soliman A. Rezgui H. Soliman and N. Manea . 2013 . Mobile cloud gaming: Issues and challenges. In F. Daniel G. Papadopoulos and P. Thiran eds. Mobile Web Information Systems SE - 10 volume 8093 of Lecture Notes in Computer Science pp. 121 - 128 . Springer Berlin Heidelberg . ISBN 978-3-642-40275-3. O. Soliman A. Rezgui H. Soliman and N. Manea. 2013. Mobile cloud gaming: Issues and challenges. In F. Daniel G. Papadopoulos and P. Thiran eds. Mobile Web Information Systems SE - 10 volume 8093 of Lecture Notes in Computer Science pp. 121-128. Springer Berlin Heidelberg. ISBN 978-3-642-40275-3."},{"key":"e_1_4_1_671_1","first-page":"2193","volume-title":"ACM Conference on Human Factors in Computing Systems","author":"Solovey E.","unstructured":"E. Solovey , P. Schermerhorn , M. Scheutz , A. Sassaroli , S. Fantini , and R. Jacob . 2012. Brainput: Enhancing interactive systems with streaming fNIRS brain input . In ACM Conference on Human Factors in Computing Systems , pp. 2193 - 2202 . E. Solovey, P. Schermerhorn, M. Scheutz, A. Sassaroli, S. Fantini, and R. Jacob. 2012. Brainput: Enhancing interactive systems with streaming fNIRS brain input. In ACM Conference on Human Factors in Computing Systems, pp. 2193-2202."},{"key":"e_1_4_1_672_1","first-page":"44","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Song D.","unstructured":"D. Song , D. Wagner , and A. Perig . 2000. Practical techniques for searches on encrypted data . In Proceedings of IEEE Symposium on Security and Privacy , pp. 44 - 55 . D. Song, D. Wagner, and A. Perig. 2000. Practical techniques for searches on encrypted data. In Proceedings of IEEE Symposium on Security and Privacy, pp. 44-55."},{"key":"e_1_4_1_673_1","first-page":"27","volume-title":"ICMI","author":"Song Y.","unstructured":"Y. Song , L.-P. Morency , and R. Davis . 2012. Multimodal human behavior analysis: Learning correlation and interaction across modalities . In ICMI , pp. 27 - 30 . Y. Song, L.-P. Morency, and R. Davis. 2012. Multimodal human behavior analysis: Learning correlation and interaction across modalities. In ICMI, pp. 27-30."},{"key":"e_1_4_1_674_1","unstructured":"Sony-Gaikai. July 2012. Cloud gaming adoption is accelerating... and fast! http:\/\/www.nttcom.tv\/2012\/07\/09\/cloud-gaming-adoption-is-acceleratingand-fast\/. Sony-Gaikai. July 2012. Cloud gaming adoption is accelerating... and fast! http:\/\/www.nttcom.tv\/2012\/07\/09\/cloud-gaming-adoption-is-acceleratingand-fast\/."},{"key":"e_1_4_1_675_1","unstructured":"K. Soomro A. R. Zamir and M. Shah. 2012. UCF101: A dataset of 101 human actions classes from videos in the wild. Computing Research Repository. http:\/\/arxiv.org\/corr\/home. K. Soomro A. R. Zamir and M. Shah. 2012. UCF101: A dataset of 101 human actions classes from videos in the wild. Computing Research Repository. http:\/\/arxiv.org\/corr\/home."},{"key":"e_1_4_1_676_1","doi-asserted-by":"crossref","unstructured":"T. Spindler C. Wartmann L. Hovestadt D. Roth L. V. Gool and A. Steffen. 2008. Privacy in video surveilled spaces. Journal of Computer Security IOS Press 16(2): 199-222. T. Spindler C. Wartmann L. Hovestadt D. Roth L. V. Gool and A. Steffen. 2008. Privacy in video surveilled spaces. Journal of Computer Security IOS Press 16(2): 199-222.","DOI":"10.3233\/JCS-2008-16205"},{"key":"e_1_4_1_677_1","first-page":"843","volume-title":"ICML","author":"Srivastava N.","unstructured":"N. Srivastava , E. Mansimov , and R. Salakhutdinov . 2015. Unsupervised learning of video representations using LSTMs . In ICML , pp. 843 - 852 . N. Srivastava, E. Mansimov, and R. Salakhutdinov. 2015. Unsupervised learning of video representations using LSTMs. In ICML, pp. 843-852."},{"key":"e_1_4_1_678_1","first-page":"741","volume-title":"Designing Interactive Systems","author":"Staiano J.","unstructured":"J. Staiano , M. Men\u00e9ndez , A. Battocchi , A. De Angeli , and N. Sebe . 2012. UX_Mate: From facial expressions to UX evaluation . In Designing Interactive Systems , pp. 741 - 750 . J. Staiano, M. Men\u00e9ndez, A. Battocchi, A. De Angeli, and N. Sebe. 2012. UX_Mate: From facial expressions to UX evaluation. In Designing Interactive Systems, pp. 741-750."},{"key":"e_1_4_1_679_1","doi-asserted-by":"crossref","unstructured":"A. Steinberg C. Bowman and F. White. 1999. Revisions to the JDL data fusion model. Technical report DTIC Document. A. Steinberg C. Bowman and F. White. 1999. Revisions to the JDL data fusion model. Technical report DTIC Document.","DOI":"10.21236\/ADA389851"},{"key":"e_1_4_1_680_1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(92)90025-K"},{"key":"e_1_4_1_681_1","volume-title":"Cloud gaming to reach inflection point","author":"Analytics Strategy","year":"2015","unstructured":"Strategy Analytics . November 2014. Cloud gaming to reach inflection point in 2015 . http:\/\/tinyurl.com\/p3z9hs2. Strategy Analytics. November 2014. Cloud gaming to reach inflection point in 2015. http:\/\/tinyurl.com\/p3z9hs2."},{"key":"e_1_4_1_682_1","unstructured":"StreamMyGame. July 2012. StreamMyGame web page. http:\/\/streammygame.com\/. StreamMyGame. July 2012. StreamMyGame web page. http:\/\/streammygame.com\/."},{"key":"e_1_4_1_683_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.103"},{"key":"e_1_4_1_684_1","first-page":"30","volume-title":"ECCV","author":"Subramanian R.","year":"2010","unstructured":"R. Subramanian , H. Katti , N. Sebe , M. Kankanhalli , and T.-S. Chua . 2010 . An eye fixation database for saliency detection in images . In ECCV , pp. 30 - 43 . R. Subramanian, H. Katti, N. Sebe, M. Kankanhalli, and T.-S. Chua. 2010. An eye fixation database for saliency detection in images. In ECCV, pp. 30-43."},{"key":"e_1_4_1_685_1","first-page":"33","volume-title":"ACM Multimedia","author":"Subramanian R.","unstructured":"R. Subramanian , V. Yanulevskaya , and N. Sebe . 2011. Can computers learn from humans to see better?: Inferring scene semantics from viewers' eye movements . In ACM Multimedia , pp. 33 - 42 . R. Subramanian, V. Yanulevskaya, and N. Sebe. 2011. Can computers learn from humans to see better?: Inferring scene semantics from viewers' eye movements. In ACM Multimedia, pp. 33-42."},{"key":"e_1_4_1_686_1","doi-asserted-by":"crossref","unstructured":"R. Subramanian Y. Yan J. Staiano O. Lanz and N. Sebe. 2013. On the relationship between head pose social attention and personality prediction for unstructured and dynamic group interactions. In Int'l Conference on Multimodal Interaction pp. 3-10. R. Subramanian Y. Yan J. Staiano O. Lanz and N. Sebe. 2013. On the relationship between head pose social attention and personality prediction for unstructured and dynamic group interactions. In Int'l Conference on Multimodal Interaction pp. 3-10.","DOI":"10.1145\/2522848.2522862"},{"key":"e_1_4_1_687_1","doi-asserted-by":"publisher","DOI":"10.1167\/14.3.31"},{"key":"e_1_4_1_688_1","article-title":"ASCERTAIN: Emotion and personality recognition using commercial sensors","author":"Subramanian R.","year":"2016","unstructured":"R. Subramanian , J. Wache , M. Abadi , R. Vieriu , S. Winkler , and N. Sebe . 2016 . ASCERTAIN: Emotion and personality recognition using commercial sensors . IEEE Transactions on Affective Computing, issue 99. R. Subramanian, J. Wache, M. Abadi, R. Vieriu, S. Winkler, and N. Sebe. 2016. ASCERTAIN: Emotion and personality recognition using commercial sensors. IEEE Transactions on Affective Computing, issue 99.","journal-title":"IEEE Transactions on Affective Computing, issue 99."},{"key":"e_1_4_1_689_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465780.2465784"},{"key":"e_1_4_1_690_1","first-page":"4597","volume-title":"CVPR","author":"Sun L.","unstructured":"L. Sun , K. Jia , D.-Y. Yeung , and B. E. Shi . 2015. Human action recognition using factorized spatio-temporal convolutional networks . In CVPR , pp. 4597 - 4605 . L. Sun, K. Jia, D.-Y. Yeung, and B. E. Shi. 2015. Human action recognition using factorized spatio-temporal convolutional networks. In CVPR, pp. 4597-4605."},{"key":"e_1_4_1_691_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902022"},{"key":"e_1_4_1_692_1","first-page":"3104","volume-title":"NIPS","author":"Sutskever I.","unstructured":"I. Sutskever , O. Vinyals , and Q. V. Le . 2014. Sequence to sequence learning with neural networks . In NIPS , pp. 3104 - 3112 . I. Sutskever, O. Vinyals, and Q. V. Le. 2014. Sequence to sequence learning with neural networks. In NIPS, pp. 3104-3112."},{"key":"e_1_4_1_693_1","first-page":"7","volume-title":"Proceedings of the ACM Workshop on Storage Security and Survivability","author":"Swaminathan A.","unstructured":"A. Swaminathan , Y. Mao , G.-M. Su , H. Gou , A. L. Varna , S. He , M. Wu , and D.W. Oard . 2007. Confidentiality-preserving rank-ordered search . In Proceedings of the ACM Workshop on Storage Security and Survivability , pp. 7 - 12 . A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A. L. Varna, S. He, M. Wu, and D.W. Oard. 2007. Confidentiality-preserving rank-ordered search. In Proceedings of the ACM Workshop on Storage Security and Survivability, pp. 7-12."},{"key":"e_1_4_1_694_1","first-page":"253","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Szajda D.","unstructured":"D. Szajda , M. Pohl , J. Owen , B. G. Lawson , and V. Richmond . 2006. Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm . In Network and Distributed System Security Symposium (NDSS) , pp. 253 - 265 . D. Szajda, M. Pohl, J. Owen, B. G. Lawson, and V. Richmond. 2006. Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm. In Network and Distributed System Security Symposium (NDSS), pp. 253-265."},{"key":"e_1_4_1_695_1","first-page":"1","volume-title":"CVPR","author":"Szegedy C.","unstructured":"C. Szegedy , W. Liu , Y. Jia , P. Sermanet , S. Reed , D. Anguelov , D. Erhan , V. Vanhoucke , and A. Rabinovich . 2015a. Going deeper with convolutions . In CVPR , pp. 1 - 9 . C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. 2015a. Going deeper with convolutions. In CVPR, pp. 1-9."},{"key":"e_1_4_1_696_1","doi-asserted-by":"crossref","unstructured":"C. Szegedy V. Vanhoucke S. Ioffe J. Shlens and Z. Wojna. 2015b. Rethinking the inception architecture for computer vision. arXiv:1512.00567. C. Szegedy V. Vanhoucke S. Ioffe J. Shlens and Z. Wojna. 2015b. Rethinking the inception architecture for computer vision. arXiv:1512.00567 .","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_4_1_697_1","first-page":"4278","volume-title":"AAAI","author":"Szegedy C.","unstructured":"C. Szegedy , S. Ioffe , and V. Vanhoucke . 2017. Inception-v4, Inception-ResNet and the impact of residual connections on learning . In AAAI , pp. 4278 - 4284 . C. Szegedy, S. Ioffe, and V. Vanhoucke. 2017. Inception-v4, Inception-ResNet and the impact of residual connections on learning. In AAAI, pp. 4278-4284."},{"key":"e_1_4_1_698_1","first-page":"160","volume-title":"International Conference on Multimedia and Ubiquitous Engineering","author":"Takata K.","unstructured":"K. Takata , J. Ma , B. Apduhan , R. Huang , and N. Shiratori . 2008. Lifelog image analysis based on activity situation models using contexts from wearable multi sensors . In International Conference on Multimedia and Ubiquitous Engineering , pp. 160 - 163 . IEEE. K. Takata, J. Ma, B. Apduhan, R. Huang, and N. Shiratori. 2008. Lifelog image analysis based on activity situation models using contexts from wearable multi sensors. In International Conference on Multimedia and Ubiquitous Engineering, pp. 160- 163. IEEE."},{"key":"e_1_4_1_699_1","first-page":"655","article-title":"Towards textually describing complex video contents with audio-visual concept classifiers","author":"Tan C.-C.","year":"2011","unstructured":"C.-C. Tan , Y.-G. Jiang , and C.-W. Ngo . 2011 . Towards textually describing complex video contents with audio-visual concept classifiers . In ACM Multimedia , 655 - 658 . C.-C. Tan, Y.-G. Jiang, and C.-W. Ngo. 2011. Towards textually describing complex video contents with audio-visual concept classifiers. In ACM Multimedia, 655-658.","journal-title":"ACM Multimedia"},{"key":"e_1_4_1_700_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631272.1631305"},{"key":"e_1_4_1_701_1","first-page":"1","volume-title":"2015 IEEE International Conference on Multimedia and Expo (ICME)","author":"Tang M.","unstructured":"M. Tang , P. Agrawal , S. Pongpaichet , and R. Jain . 2015. Geospatial interpolation analytics for data streams in EventShop . In 2015 IEEE International Conference on Multimedia and Expo (ICME) , pp. 1 - 6 . IEEE. M. Tang, P. Agrawal, S. Pongpaichet, and R. Jain. 2015. Geospatial interpolation analytics for data streams in EventShop. In 2015 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6. IEEE."},{"key":"e_1_4_1_702_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0138198"},{"key":"e_1_4_1_703_1","first-page":"140","volume-title":"ECCV","author":"Taylor G. W.","unstructured":"G. W. Taylor , R. Fergus , Y. LeCun , and C. Bregler . 2010. Convolutional learning of spatio-temporal features . In ECCV , pp. 140 - 153 . G. W. Taylor, R. Fergus, Y. LeCun, and C. Bregler. 2010. Convolutional learning of spatio-temporal features. In ECCV, pp. 140-153."},{"key":"e_1_4_1_704_1","unstructured":"TeamViewer. July 2012. TeamViewer web page. http:\/\/www.teamviewer.com. TeamViewer. July 2012. TeamViewer web page. http:\/\/www.teamviewer.com."},{"key":"e_1_4_1_705_1","first-page":"449","volume-title":"Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Teevan J.","unstructured":"J. Teevan , S. T. Dumais , and E. Horvitz . 2005. Personalizing search via automated analysis of interests and activities . In Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval , pp. 449 - 456 . ACM. J. Teevan, S. T. Dumais, and E. Horvitz. 2005. Personalizing search via automated analysis of interests and activities. In Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 449-456. ACM."},{"key":"e_1_4_1_706_1","first-page":"163","volume-title":"Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Teevan J.","unstructured":"J. Teevan , S. T. Dumais , and D. J. Liebling . 2008. To personalize or not to personalize: modeling queries with variation in user intent . In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval , pp. 163 - 170 . ACM. J. Teevan, S. T. Dumais, and D. J. Liebling. 2008. To personalize or not to personalize: modeling queries with variation in user intent. In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 163-170. ACM."},{"key":"e_1_4_1_707_1","unstructured":"A. Temko R. Malkin C. Zieger D. Macho C. Nadeu and M. Omologo. 2006. Acoustic event detection and classification in smart-room environments: Evaluation of CHIL project systems. IV Jornadas en Tecnologia del Habla 65(48): 5. A. Temko R. Malkin C. Zieger D. Macho C. Nadeu and M. Omologo. 2006. Acoustic event detection and classification in smart-room environments: Evaluation of CHIL project systems. IV Jornadas en Tecnologia del Habla 65(48): 5."},{"key":"e_1_4_1_708_1","first-page":"1218","volume-title":"Proceedings of the 25th International Conference on Computational Linguistics","author":"Thomason J.","unstructured":"J. Thomason , S. Venugopalan , S. Guadarrama , K. Saenko , and R. Mooney . 2014. Integrating language and vision to generate natural language descriptions of videos in the wild . In Proceedings of the 25th International Conference on Computational Linguistics , pp. 1218 - 1227 . J. Thomason, S. Venugopalan, S. Guadarrama, K. Saenko, and R. Mooney. 2014. Integrating language and vision to generate natural language descriptions of videos in the wild. In Proceedings of the 25th International Conference on Computational Linguistics, pp. 1218-1227."},{"key":"e_1_4_1_709_1","doi-asserted-by":"publisher","DOI":"10.1145\/2812802"},{"key":"e_1_4_1_710_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.188"},{"key":"e_1_4_1_711_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2010.04.020"},{"key":"e_1_4_1_712_1","unstructured":"I. M. Toke. 2011. An introduction to Hawkes processes with applications to finance. Lectures Notes from Ecole Centrale Paris BNP Paribas Chair of Quantitative Finance. I. M. Toke. 2011. An introduction to Hawkes processes with applications to finance. Lectures Notes from Ecole Centrale Paris BNP Paribas Chair of Quantitative Finance."},{"key":"e_1_4_1_713_1","unstructured":"A. Torabi C. Pal H. Larochelle and A. Courville. 2015. Using descriptive video services to create a large data source for video annotation research. arXiv:1503.01070. A. Torabi C. Pal H. Larochelle and A. Courville. 2015. Using descriptive video services to create a large data source for video annotation research. arXiv:1503.01070 ."},{"key":"e_1_4_1_714_1","first-page":"1","volume-title":"2008 IEEE Conference on Computer Vision and Pattern Recognition","author":"Torralba A.","unstructured":"A. Torralba , R. Fergus , and Y. Weiss . June 2008. Small codes and large databases for recognition . In 2008 IEEE Conference on Computer Vision and Pattern Recognition , pp. 1 - 8 . A. Torralba, R. Fergus, and Y. Weiss. June 2008. Small codes and large databases for recognition. In 2008 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-8."},{"key":"e_1_4_1_715_1","first-page":"152","volume-title":"Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services","author":"Torres W. A. A.","unstructured":"W. A. A. Torres , N. Bhattacharjee , and B. Srinivasan . 2014. Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data . In Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services , pp. 152 - 158 . ACM. W. A. A. Torres, N. Bhattacharjee, and B. Srinivasan. 2014. Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data. In Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, pp. 152-158. ACM."},{"issue":"7","key":"e_1_4_1_716_1","first-page":"8","article-title":"C3D: Generic features for video analysis","volume":"2","author":"Tran D.","year":"2015","unstructured":"D. Tran , L. D. Bourdev , R. Fergus , L. Torresani , and M. Paluri . 2015 . C3D: Generic features for video analysis . In ICCV , 2 ( 7 ): 8 . D. Tran, L. D. Bourdev, R. Fergus, L. Torresani, and M. Paluri. 2015. C3D: Generic features for video analysis. In ICCV, 2(7): 8.","journal-title":"ICCV"},{"key":"e_1_4_1_717_1","first-page":"519","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","author":"Troncoso-Pastoriza J. R.","unstructured":"J. R. Troncoso-Pastoriza , S. Katzenbeisser , and M. Celik . 2007. Privacy preserving error resilient DNA searching through oblivious automata . In Proceedings of the 14th ACM Conference on Computer and Communications Security , pp. 519 - 528 . ACM. J. R. Troncoso-Pastoriza, S. Katzenbeisser, and M. Celik. 2007. Privacy preserving error resilient DNA searching through oblivious automata. In Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 519-528. ACM."},{"key":"e_1_4_1_718_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2004.1261105"},{"key":"e_1_4_1_719_1","first-page":"2204","volume-title":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","author":"Tudor V.","unstructured":"V. Tudor , M. Almgren , and M. Papatriantafilou . 2015. Harnessing the unknown in advanced metering infrastructure traffic . In Proceedings of the 30th Annual ACM Symposium on Applied Computing , pp. 2204 - 2211 . ACM. V. Tudor, M. Almgren, and M. Papatriantafilou. 2015. Harnessing the unknown in advanced metering infrastructure traffic. In Proceedings of the 30th Annual ACM Symposium on Applied Computing, pp. 2204-2211. ACM."},{"key":"e_1_4_1_720_1","first-page":"2396","volume-title":"CVPR","author":"Tulyakov S.","unstructured":"S. Tulyakov , X. Alameda-Pineda , E. Ricci , L. Yin , J. F. Cohn , and N. Sebe . 2016. Self-adaptive matrix completion for heart rate estimation from face videos under realistic conditions . In CVPR , pp. 2396 - 2404 . S. Tulyakov, X. Alameda-Pineda, E. Ricci, L. Yin, J. F. Cohn, and N. Sebe. 2016. Self-adaptive matrix completion for heart rate estimation from face videos under realistic conditions. In CVPR, pp. 2396-2404."},{"issue":"11","key":"e_1_4_1_721_1","first-page":"1473","article-title":"Machine recognition of human activities: A survey","volume":"18","author":"Turaga P.","year":"2008","unstructured":"P. Turaga , R. Chellappa , V. S. Subrahmanian , and O. Udrea . 2008 . Machine recognition of human activities: A survey . IEEE TPAMI , 18 ( 11 ): 1473 - 1488 . P. Turaga, R. Chellappa, V. S. Subrahmanian, and O. Udrea. 2008. Machine recognition of human activities: A survey. IEEE TPAMI, 18(11): 1473-1488.","journal-title":"IEEE TPAMI"},{"key":"e_1_4_1_722_1","first-page":"1","volume-title":"ICCV","author":"Tuytelaars T.","unstructured":"T. Tuytelaars and C. Schmid . Oct . 2007. Vector quantizing feature space with a regular lattice . In ICCV , pp. 1 - 8 . T. Tuytelaars and C. Schmid. Oct. 2007. Vector quantizing feature space with a regular lattice. In ICCV, pp. 1-8."},{"key":"e_1_4_1_723_1","doi-asserted-by":"crossref","unstructured":"G. Tzanetakis and P. Cook. 2002. Musical genre classification of audio signals. IEEE transactions on Speech and Audio Processing 10(5): 293-302. G. Tzanetakis and P. Cook. 2002. Musical genre classification of audio signals. IEEE transactions on Speech and Audio Processing 10(5): 293-302.","DOI":"10.1109\/TSA.2002.800560"},{"key":"e_1_4_1_724_1","unstructured":"Ubitus. January 2015. Ubitus web page. http:\/\/www.ubitus.net. Ubitus. January 2015. Ubitus web page. http:\/\/www.ubitus.net."},{"key":"e_1_4_1_725_1","first-page":"24","volume-title":"Proceedings of the 2nd ACM International Conference on Multimedia Retrieval","author":"Ulges A.","unstructured":"A. Ulges , M. Koch , and D. Borth . 2012. Linking visual concept detection with viewer demographics . In Proceedings of the 2nd ACM International Conference on Multimedia Retrieval , p. 24 . ACM. A. Ulges, M. Koch, and D. Borth. 2012. Linking visual concept detection with viewer demographics. In Proceedings of the 2nd ACM International Conference on Multimedia Retrieval, p. 24. ACM."},{"volume-title":"Principles of database systems","author":"Ullman J.","key":"e_1_4_1_726_1","unstructured":"J. Ullman . 1983. Principles of database systems . W.H. Freeman & Co. New York . J. Ullman. 1983. Principles of database systems. W.H. Freeman & Co. New York."},{"key":"e_1_4_1_727_1","unstructured":"UltraVNC. July 2012. UltraVNC web page. http:\/\/www.uvnc.com\/. UltraVNC. July 2012. UltraVNC web page. http:\/\/www.uvnc.com\/."},{"key":"e_1_4_1_728_1","unstructured":"M. Upmanyu. 2010. Efficient Privacy Preserving Protocols for Visual Computation. Master's thesis IIIT Hyderabad India. M. Upmanyu. 2010. Efficient Privacy Preserving Protocols for Visual Computation . Master's thesis IIIT Hyderabad India."},{"key":"e_1_4_1_729_1","first-page":"1639","volume-title":"Proceedings of IEEE 12th International Conference on Computer Vision","author":"Upmanyu M.","unstructured":"M. Upmanyu , A. M. Namboodiri , K. Srinathan , and C. V. Jawahar . 2009. Efficient privacy preserving video surveillance . In Proceedings of IEEE 12th International Conference on Computer Vision , pp. 1639 - 1646 . M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar. 2009. Efficient privacy preserving video surveillance. In Proceedings of IEEE 12th International Conference on Computer Vision, pp. 1639-1646."},{"key":"e_1_4_1_730_1","first-page":"2185","volume-title":"ICCV","author":"Valenti R.","unstructured":"R. Valenti , N. Sebe , and T. Gevers . 2009. Image saliency by isocentric curvedness and color . In ICCV , pp. 2185 - 2192 . R. Valenti, N. Sebe, and T. Gevers. 2009. Image saliency by isocentric curvedness and color. In ICCV, pp. 2185-2192."},{"key":"e_1_4_1_731_1","first-page":"21","volume-title":"IEEE Conference on Advanced Video and Signal Based Surveillance","author":"Valenzise G.","unstructured":"G. Valenzise , L. Gerosa , M. Tagliasacchi , F. Antonacci , and A. Sarti . 2007. Scream and gunshot detection and localization for audio-surveillance systems . In IEEE Conference on Advanced Video and Signal Based Surveillance , pp. 21 - 26 . IEEE. G. Valenzise, L. Gerosa, M. Tagliasacchi, F. Antonacci, and A. Sarti. 2007. Scream and gunshot detection and localization for audio-surveillance systems. In IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 21-26. IEEE."},{"key":"e_1_4_1_732_1","first-page":"357","volume-title":"Proceedings of IEEE International Conference on Computer and Information Technology (CIT)","author":"Van H.","unstructured":"H. Van , F. Tran , and J. Menaud . 2009. SLA-aware virtual resource management for cloud infrastructures . In Proceedings of IEEE International Conference on Computer and Information Technology (CIT) , pp. 357 - 362 . H. Van, F. Tran, and J. Menaud. 2009. SLA-aware virtual resource management for cloud infrastructures. In Proceedings of IEEE International Conference on Computer and Information Technology (CIT), pp. 357-362."},{"key":"e_1_4_1_733_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"e_1_4_1_734_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243466"},{"key":"e_1_4_1_735_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.153"},{"key":"e_1_4_1_736_1","first-page":"4566","volume-title":"CVPR","author":"Vedantam R.","unstructured":"R. Vedantam , C. Lawrence Zitnick , and D. Parikh . 2015. CIDEr: Consensus-based image description evaluation . In CVPR , pp. 4566 - 4575 . R. Vedantam, C. Lawrence Zitnick, and D. Parikh. 2015. CIDEr: Consensus-based image description evaluation. In CVPR, pp. 4566-4575."},{"key":"e_1_4_1_737_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214508000000148"},{"key":"e_1_4_1_738_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.460"},{"key":"e_1_4_1_739_1","first-page":"4534","volume-title":"ICCV","author":"Venugopalan S.","unstructured":"S. Venugopalan , M. Rohrbach , J. Donahue , R. Mooney , T. Darrell , and K. Saenko . 2015a. Sequence to sequence--video to text . In ICCV , pp. 4534 - 4542 . S. Venugopalan, M. Rohrbach, J. Donahue, R. Mooney, T. Darrell, and K. Saenko. 2015a. Sequence to sequence--video to text. In ICCV, pp. 4534-4542."},{"key":"e_1_4_1_740_1","first-page":"1494","volume-title":"Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics-Human Language Technologies (NAACL HLT)","author":"Venugopalan S.","unstructured":"S. Venugopalan , H. Xu , J. Donahue , M. Rohrbach , R. Mooney , and K. Saenko . 2015b. Translating videos to natural language using deep recurrent neural networks . In Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics-Human Language Technologies (NAACL HLT) , pp. 1494 - 1504 . S. Venugopalan, H. Xu, J. Donahue, M. Rohrbach, R. Mooney, and K. Saenko. 2015b. Translating videos to natural language using deep recurrent neural networks. In Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics-Human Language Technologies (NAACL HLT), pp. 1494-1504."},{"key":"e_1_4_1_741_1","doi-asserted-by":"crossref","unstructured":"S. Venugopalan L. A. Hendricks R. Mooney and K. Saenko. 2016. Improving LSTM-based video description with linguistic knowledge mined from text. arXiv:1604.01729. S. Venugopalan L. A. Hendricks R. Mooney and K. Saenko. 2016. Improving LSTM-based video description with linguistic knowledge mined from text. arXiv:1604.01729 .","DOI":"10.18653\/v1\/D16-1204"},{"key":"e_1_4_1_742_1","first-page":"29","volume-title":"Proceedings of ACM Workshop on Mobile Cloud Computing and Services (MCS)","author":"Verbelen T.","unstructured":"T. Verbelen , S. Pieter , T. Filip , and D. Bart . 2012. Cloudlets: Bringing the cloud to the mobile user . In Proceedings of ACM Workshop on Mobile Cloud Computing and Services (MCS) , pp. 29 - 36 . T. Verbelen, S. Pieter, T. Filip, and D. Bart. 2012. Cloudlets: Bringing the cloud to the mobile user. In Proceedings of ACM Workshop on Mobile Cloud Computing and Services (MCS), pp. 29-36."},{"key":"e_1_4_1_743_1","first-page":"667","volume-title":"Proceedings of IEEE Sixth International Conference on Data Mining","author":"Verscheure O.","unstructured":"O. Verscheure , M. Vlachos , A. Anagnostopoulos , P. Frossard , E. Bouillet , and P. S. Yu . 2006. Finding \"who is talking to whom\" in VoiP networks via progressive stream clustering . In Proceedings of IEEE Sixth International Conference on Data Mining , pp. 667 - 677 . O. Verscheure, M. Vlachos, A. Anagnostopoulos, P. Frossard, E. Bouillet, and P. S. Yu. 2006. Finding \"who is talking to whom\" in VoiP networks via progressive stream clustering. In Proceedings of IEEE Sixth International Conference on Data Mining, pp. 667-677."},{"key":"e_1_4_1_744_1","unstructured":"VideoLAN. VLC media player. Official page for VLC media player the Open Source video framework. http:\/\/www.videolan.org\/vlc\/. VideoLAN. VLC media player. Official page for VLC media player the Open Source video framework. http:\/\/www.videolan.org\/vlc\/."},{"key":"e_1_4_1_745_1","unstructured":"C. Viedma. 2010. Mobile web mashups. www.mobilemashups.com C. Viedma. 2010. Mobile web mashups. www.mobilemashups.com"},{"key":"e_1_4_1_746_1","first-page":"1","volume-title":"Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ICACII)","author":"Vinciarelli A.","year":"2009","unstructured":"A. Vinciarelli , A. Dielmann , S. Favre , and H. Salamin . 2009. Canal9: A database of political debates for analysis of social interactions . In Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ICACII) , September 2009 , pp. 1 - 4 . A. Vinciarelli, A. Dielmann, S. Favre, and H. Salamin. 2009. Canal9: A database of political debates for analysis of social interactions. In Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ICACII), September 2009, pp. 1-4."},{"key":"e_1_4_1_747_1","first-page":"3156","volume-title":"CVPR","author":"Vinyals O.","unstructured":"O. Vinyals , A. Toshev , S. Bengio , and D. Erhan . 2015. Show and tell: A neural image caption generator . In CVPR , pp. 3156 - 3164 . O. Vinyals, A. Toshev, S. Bengio, and D. Erhan. 2015. Show and tell: A neural image caption generator. In CVPR, pp. 3156-3164."},{"key":"e_1_4_1_748_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"e_1_4_1_749_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2288990"},{"key":"e_1_4_1_750_1","doi-asserted-by":"crossref","unstructured":"M. Voit and R. Stiefelhagen. 2010. 3D user-perspective voxel-based estimation of visual focus of attention in dynamic meeting scenarios. In ICMI M. Voit and R. Stiefelhagen. 2010. 3D user-perspective voxel-based estimation of visual focus of attention in dynamic meeting scenarios. In ICMI","DOI":"10.1145\/1891903.1891966"},{"key":"e_1_4_1_751_1","first-page":"319","volume-title":"ACM Conference on Human Factors in Computing Systems","author":"von Ahn L.","unstructured":"L. von Ahn and L. Dabbish . 2004. Labeling images with a computer game . In ACM Conference on Human Factors in Computing Systems , pp. 319 - 326 . L. von Ahn and L. Dabbish. 2004. Labeling images with a computer game. In ACM Conference on Human Factors in Computing Systems, pp. 319-326."},{"key":"e_1_4_1_752_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.71"},{"key":"e_1_4_1_753_1","doi-asserted-by":"crossref","unstructured":"J. Wache R. Subramanian M. K. Abadi R. L. Vieriu S. Winkler and N. Sebe. 2015. Implicit Personality Profiling Based on Psycho-Physiological Responses to Emotional Videos. In Int'l Conference on Multimodal Interaction pp. 239-246. J. Wache R. Subramanian M. K. Abadi R. L. Vieriu S. Winkler and N. Sebe. 2015. Implicit Personality Profiling Based on Psycho-Physiological Responses to Emotional Videos. In Int'l Conference on Multimodal Interaction pp. 239-246.","DOI":"10.1145\/2818346.2820736"},{"key":"e_1_4_1_754_1","doi-asserted-by":"publisher","DOI":"10.5555\/3114195.3114663"},{"key":"e_1_4_1_755_1","doi-asserted-by":"crossref","unstructured":"K. Walby. 2005. Open-street camera surveillance and governance in Canada. Canadian Journal of Criminology and Criminal Justice\/La Revue canadienne de criminologie et de justice p\u00e9nale 47(4): 655-684. K. Walby. 2005. Open-street camera surveillance and governance in Canada. Canadian Journal of Criminology and Criminal Justice\/La Revue canadienne de criminologie et de justice p\u00e9nale 47(4): 655-684.","DOI":"10.3138\/cjccj.47.4.655"},{"volume-title":"Proceedings of IEEE International Conference on Robotics and Automation (ICRA) Workshop on Autonomous Learning.","author":"Walter O.","key":"e_1_4_1_756_1","unstructured":"O. Walter , R. Haeb-Umbach , S. Chaudhuri , and B. Raj . 2013. Unsupervised word discovery from phonetic input using nested Pitman-Yor language modeling . In Proceedings of IEEE International Conference on Robotics and Automation (ICRA) Workshop on Autonomous Learning. O. Walter, R. Haeb-Umbach, S. Chaudhuri, and B. Raj. 2013. Unsupervised word discovery from phonetic input using nested Pitman-Yor language modeling. In Proceedings of IEEE International Conference on Robotics and Automation (ICRA) Workshop on Autonomous Learning."},{"issue":"3","key":"e_1_4_1_757_1","first-page":"1058","article-title":"Regularization of neural networks using DropConnect","volume":"28","author":"Wan L.","year":"2013","unstructured":"L. Wan , M. Zeiler , S. Zhang , Y. L. Cun , and R. Fergus . 2013 . Regularization of neural networks using DropConnect . In ICML , 28 ( 3 ): 1058 - 1066 . L. Wan, M. Zeiler, S. Zhang, Y. L. Cun, and R. Fergus. 2013. Regularization of neural networks using DropConnect. In ICML, 28(3): 1058-1066.","journal-title":"ICML"},{"key":"e_1_4_1_758_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510914"},{"key":"e_1_4_1_759_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"e_1_4_1_760_1","unstructured":"D. Wang and G. J. Brown (eds.). 2006. Computational Auditory Scene Analysis: Principles Algorithms and Applications volume 147. Wiley Interscience. D. Wang and G. J. Brown (eds.). 2006. Computational Auditory Scene Analysis: Principles Algorithms and Applications volume 147. Wiley Interscience."},{"key":"e_1_4_1_761_1","first-page":"3551","volume-title":"ICCV","author":"Wang H.","unstructured":"H. Wang and C. Schmid . 2013. Action recognition with improved trajectories . In ICCV , pp. 3551 - 3558 . H. Wang and C. Schmid. 2013. Action recognition with improved trajectories. In ICCV, pp. 3551-3558."},{"key":"e_1_4_1_762_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.48"},{"key":"e_1_4_1_763_1","unstructured":"J. Wang H. T. Shen J. Song and J. Ji. 2014. Hashing for similarity search: A survey. arXiv:1408.2927. J. Wang H. T. Shen J. Song and J. Ji. 2014. Hashing for similarity search: A survey. arXiv:1408.2927 ."},{"key":"e_1_4_1_764_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2487976"},{"key":"e_1_4_1_765_1","first-page":"4305","volume-title":"CVPR","author":"Wang L.","unstructured":"L. Wang , Y. Qiao , and X. Tang . 2015. Action recognition with trajectory-pooled deep-convolutional descriptors . In CVPR , pp. 4305 - 4314 . L. Wang, Y. Qiao, and X. Tang. 2015. Action recognition with trajectory-pooled deep-convolutional descriptors. In CVPR, pp. 4305-4314."},{"key":"e_1_4_1_766_1","first-page":"20","volume-title":"ECCV","author":"Wang L.","unstructured":"L. Wang , Y. Xiong , Z. Wang , Y. Qiao , D. Lin , X. Tang , and L. Van Gool . 2016b. Temporal segment networks: Towards good practices for deep action recognition . In ECCV , pp. 20 - 36 . L. Wang, Y. Xiong, Z. Wang, Y. Qiao, D. Lin, X. Tang, and L. Van Gool. 2016b. Temporal segment networks: Towards good practices for deep action recognition. In ECCV, pp. 20-36."},{"key":"e_1_4_1_767_1","first-page":"1","volume-title":"Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE","author":"Wang S.","unstructured":"S. Wang and S. Dey . Nov . 2009. Modeling and characterizing user experience in a cloud server based mobile gaming approach . In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE , pp. 1 - 7 . http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5425784. S. Wang and S. Dey. Nov. 2009. Modeling and characterizing user experience in a cloud server based mobile gaming approach. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, pp. 1-7. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5425784."},{"volume-title":"2010 IEEE Wireless Communication and Networking Conference, 5: 1-6. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5506572","author":"Wang S.","key":"e_1_4_1_768_1","unstructured":"S. Wang and S. Dey . Apr . 2010a. Addressing response time and video quality in remote server based internet mobile gaming . 2010 IEEE Wireless Communication and Networking Conference, 5: 1-6. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5506572 . S. Wang and S. Dey. Apr. 2010a. Addressing response time and video quality in remote server based internet mobile gaming. 2010 IEEE Wireless Communication and Networking Conference, 5: 1-6. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5506572."},{"key":"e_1_4_1_769_1","first-page":"1","volume-title":"Global Telecommunications Conference (GLOBECOM","author":"Wang S.","year":"2010","unstructured":"S. Wang and S. Dey . Dec . 2010b. Rendering adaptation to address communication and computation constraints in cloud mobile gaming . In Global Telecommunications Conference (GLOBECOM 2010 ), IEEE, pp. 1 - 6 . http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5684144. S. Wang and S. Dey. Dec. 2010b. Rendering adaptation to address communication and computation constraints in cloud mobile gaming. In Global Telecommunications Conference (GLOBECOM 2010), IEEE, pp. 1-6. http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5684144."},{"key":"e_1_4_1_770_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2240674"},{"key":"e_1_4_1_771_1","first-page":"81","volume-title":"Proceedings of the ACM 12th Conference on Computer and Communications Security","author":"Wang X.","unstructured":"X. Wang , S. Chen , and S. Jajodia . 2005. Tracking anonymous peer-to-peer VoiP calls on the internet . In Proceedings of the ACM 12th Conference on Computer and Communications Security , pp. 81 - 91 . X. Wang, S. Chen, and S. Jajodia. 2005. Tracking anonymous peer-to-peer VoiP calls on the internet. In Proceedings of the ACM 12th Conference on Computer and Communications Security, pp. 81-91."},{"key":"e_1_4_1_772_1","first-page":"2658","volume-title":"CVPR","author":"Wang X.","unstructured":"X. Wang , A. Farhadi , and A. Gupta . 2016c. Actions - transformations . In CVPR , pp. 2658 - 2667 . X. Wang, A. Farhadi, and A. Gupta. 2016c. Actions - transformations. In CVPR, pp. 2658-2667."},{"key":"e_1_4_1_773_1","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986551"},{"key":"e_1_4_1_774_1","first-page":"1231","volume-title":"Proceedings of the 24th International Conference on World Wide Web","author":"Wang Y.","unstructured":"Y. Wang and M. S. Kankanhalli . 2015. Tweeting cameras for event detection . In Proceedings of the 24th International Conference on World Wide Web , pp. 1231 - 1241 . ACM. Y. Wang and M. S. Kankanhalli. 2015. Tweeting cameras for event detection. In Proceedings of the 24th International Conference on World Wide Web, pp. 1231-1241. ACM."},{"key":"e_1_4_1_775_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.43"},{"key":"e_1_4_1_776_1","first-page":"14","volume-title":"2016 IEEE International Symposium on Multimedia (ISM)","author":"Wang Y.","unstructured":"Y. Wang , C. von der Weth, Y. Zhang, K. H. Low, V. K. Singh, and M. Kankanhalli. 2016d. Concept based hybrid fusion of multimodal event signals . In 2016 IEEE International Symposium on Multimedia (ISM) , pp. 14 - 19 . IEEE. Y. Wang, C. von der Weth, Y. Zhang, K. H. Low, V. K. Singh, and M. Kankanhalli. 2016d. Concept based hybrid fusion of multimodal event signals. In 2016 IEEE International Symposium on Multimedia (ISM), pp. 14-19. IEEE."},{"key":"e_1_4_1_777_1","first-page":"29","volume-title":"Proceedings of the 20th ACM International Conference on Multimedia","author":"Wang Z.","unstructured":"Z. Wang , L. Sun , X. Chen , W. Zhu , J. Liu , M. Chen , and S. Yang . 2012b. Propagation-based social-aware replication for social video contents . In Proceedings of the 20th ACM International Conference on Multimedia , pp. 29 - 38 . ACM. Z. Wang, L. Sun, X. Chen, W. Zhu, J. Liu, M. Chen, and S. Yang. 2012b. Propagation-based social-aware replication for social video contents. In Proceedings of the 20th ACM International Conference on Multimedia, pp. 29-38. ACM."},{"key":"e_1_4_1_778_1","unstructured":"R. Weber and H. Blott. 1997. An approximation based data structure for similarity search. Technical report ESPRIT Project HERMES. R. Weber and H. Blott. 1997. An approximation based data structure for similarity search. Technical report ESPRIT Project HERMES."},{"key":"e_1_4_1_779_1","first-page":"194","volume-title":"Proceedings of the International Conference on Very Large DataBases","author":"Weber R.","unstructured":"R. Weber , H.-J. Schek , and S. Blott . 1998. A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces . In Proceedings of the International Conference on Very Large DataBases , pp. 194 - 205 . R. Weber, H.-J. Schek, and S. Blott. 1998. A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In Proceedings of the International Conference on Very Large DataBases, pp. 194-205."},{"key":"e_1_4_1_780_1","unstructured":"WebM. April 2013. The WebM project web page. http:\/\/www.webmproject.org. WebM. April 2013. The WebM project web page. http:\/\/www.webmproject.org."},{"key":"e_1_4_1_781_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1577078"},{"key":"e_1_4_1_782_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-009-0071-2"},{"key":"e_1_4_1_784_1","first-page":"1753","volume-title":"NIPS","author":"Weiss Y.","unstructured":"Y. Weiss , A. Torralba , and R. Fergus . Dec . 2009. Spectral hashing . In NIPS , pp. 1753 - 1760 . Y. Weiss, A. Torralba, and R. Fergus. Dec. 2009. Spectral hashing. In NIPS, pp. 1753-1760."},{"key":"e_1_4_1_785_1","first-page":"435","volume-title":"2001 IEEE Fourth Workshop on Multimedia Signal Processing","author":"Wen J.","unstructured":"J. Wen , M. Severa , W. Zeng , M. Luttrell , and W. Jin . 2001. A format-compliant configurable encryption framework for access control of multimedia . In 2001 IEEE Fourth Workshop on Multimedia Signal Processing , pp. 435 - 440 . J. Wen, M. Severa, W. Zeng, M. Luttrell, and W. Jin. 2001. A format-compliant configurable encryption framework for access control of multimedia. In 2001 IEEE Fourth Workshop on Multimedia Signal Processing, pp. 435-440."},{"key":"e_1_4_1_786_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2002.800321"},{"key":"e_1_4_1_787_1","first-page":"2027","volume-title":"CVPR","author":"Wieschollek P.","unstructured":"P. Wieschollek , O. Wang , and A. Sorkine-Hornung . June 2016. Efficient large-scale approximate nearest neighbor search on the GPU . In CVPR , pp. 2027 - 2035 . P. Wieschollek, O. Wang, and A. Sorkine-Hornung. June 2016. Efficient large-scale approximate nearest neighbor search on the GPU. In CVPR, pp. 2027-2035."},{"key":"e_1_4_1_788_1","first-page":"43","volume-title":"Proceedings of ACM SIGCOMM Workshop on Distributed Cloud Computing (DCC)","author":"Willis D.","unstructured":"D. Willis , A. Dasgupta , and S. Banerjee . 2014. ParaDrop: A multi-tenant platform for dynamically installed third party services on home gateways . In Proceedings of ACM SIGCOMM Workshop on Distributed Cloud Computing (DCC) , pp. 43 - 48 . D. Willis, A. Dasgupta, and S. Banerjee. 2014. ParaDrop: A multi-tenant platform for dynamically installed third party services on home gateways. In Proceedings of ACM SIGCOMM Workshop on Distributed Cloud Computing (DCC), pp. 43-48."},{"key":"e_1_4_1_789_1","doi-asserted-by":"publisher","DOI":"10.1109\/29.103088"},{"key":"e_1_4_1_790_1","first-page":"1938","volume-title":"ICASSP","author":"Wilson K. W.","unstructured":"K. W. Wilson and B. Raj . 2010. Spectrogram dimensionality reduction with independence constraints . In ICASSP , pp. 1938 - 1941 . K. W. Wilson and B. Raj. 2010. Spectrogram dimensionality reduction with independence constraints. In ICASSP, pp. 1938-1941."},{"key":"e_1_4_1_791_1","first-page":"4029","volume-title":"ICASSP","author":"Wilson K. W.","unstructured":"K. W. Wilson , B. Raj , P. Smaragdis , and A. Divakaran . 2008. Speech denoising using nonnegative matrix factorization with priors . In ICASSP , pp. 4029 - 4032 . K. W. Wilson, B. Raj, P. Smaragdis, and A. Divakaran. 2008. Speech denoising using nonnegative matrix factorization with priors. In ICASSP, pp. 4029-4032."},{"key":"e_1_4_1_792_1","first-page":"1","volume-title":"Proceedings of the 16th USENIX Security Symposium","author":"Wright C. V.","unstructured":"C. V. Wright , L. Ballard , F. Monrose , and G. M. Masson . 2007. Language identification of encrypted VoiP traffic: Alejandra y Roberto or Alice and Bob . In Proceedings of the 16th USENIX Security Symposium , pp. 1 - 12 . C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson. 2007. Language identification of encrypted VoiP traffic: Alejandra y Roberto or Alice and Bob. In Proceedings of the 16th USENIX Security Symposium, pp. 1-12."},{"key":"e_1_4_1_793_1","first-page":"35","volume-title":"IEEE Symposium on Security and Privacy","author":"Wright C. V.","unstructured":"C. V. Wright , L. Ballard , S. E. Coull , F. Monrose , and G. M. Masson . 2008. Spot me if you can: Uncovering spoken phrases in encrypted VoiP conversations . In IEEE Symposium on Security and Privacy , pp. 35 - 49 . C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. 2008. Spot me if you can: Uncovering spoken phrases in encrypted VoiP conversations. In IEEE Symposium on Security and Privacy, pp. 35-49."},{"key":"e_1_4_1_794_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.01.022"},{"volume-title":"PNAS '07","author":"Wu F.","key":"e_1_4_1_795_1","unstructured":"F. Wu and B. A. Huberman . Nov . 2007. Novelty and collective attention . PNAS '07 , 104(45): 17599-17601. http:\/\/www.pnas.org\/content\/104\/45\/17599.abstract. F. Wu and B. A. Huberman. Nov. 2007. Novelty and collective attention. PNAS '07, 104(45): 17599-17601. http:\/\/www.pnas.org\/content\/104\/45\/17599.abstract."},{"key":"e_1_4_1_796_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2441412"},{"key":"e_1_4_1_797_1","first-page":"195","volume-title":"Proceedings of IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)","author":"Wu L.","unstructured":"L. Wu , S. Garg , and R. Buyya . 2011. SLA-based resource allocation for Software as a Service Provider (SaaS) in cloud computing environments . In Proceedings of IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) , pp. 195 - 204 . L. Wu, S. Garg, and R. Buyya. 2011. SLA-based resource allocation for Software as a Service Provider (SaaS) in cloud computing environments. In Proceedings of IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 195-204."},{"key":"e_1_4_1_798_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.124"},{"key":"e_1_4_1_799_1","first-page":"1","volume-title":"Interactive Multimedia Conference","author":"Wu Z.","year":"2014","unstructured":"Z. Wu . 2014 . Gaming in the cloud: One of the future entertainment . In Interactive Multimedia Conference , pp. 1 - 6 . Z. Wu. 2014. Gaming in the cloud: One of the future entertainment. In Interactive Multimedia Conference, pp. 1-6."},{"key":"e_1_4_1_800_1","first-page":"461","volume-title":"ACM Multimedia","author":"Wu Z.","unstructured":"Z. Wu , X. Wang , Y.-G. Jiang , H. Ye , and X. Xue . 2015c. Modeling spatial-temporal clues in a hybrid deep learning framework for video classification . In ACM Multimedia , pp. 461 - 470 . Z. Wu, X. Wang, Y.-G. Jiang, H. Ye, and X. Xue. 2015c. Modeling spatial-temporal clues in a hybrid deep learning framework for video classification. In ACM Multimedia, pp. 461-470."},{"key":"e_1_4_1_801_1","first-page":"791","volume-title":"ACM Multimedia","author":"Wu Z.","unstructured":"Z. Wu , Y.-G. Jiang , X. Wang , H. Ye , and X. Xue . 2016. Multi-stream multi-class fusion of deep networks for video classification . In ACM Multimedia , pp. 791 - 800 . Z. Wu, Y.-G. Jiang, X. Wang, H. Ye, and X. Xue. 2016. Multi-stream multi-class fusion of deep networks for video classification. In ACM Multimedia, pp. 791-800."},{"key":"e_1_4_1_802_1","unstructured":"x264. July 2012. x264 web page. http:\/\/www.videolan.org\/developers\/x264.html. x264. July 2012. x264 web page. http:\/\/www.videolan.org\/developers\/x264.html."},{"key":"e_1_4_1_803_1","first-page":"53","volume-title":"Proceedings of the 19th ACM International Conference on Multimedia","author":"Xie L.","unstructured":"L. Xie , A. Natsev , J. R. Kender , M. Hill , and J. R. Smith . 2011. Visual memes in social media: Tracking real-world news in YouTube videos . In Proceedings of the 19th ACM International Conference on Multimedia , pp. 53 - 62 . ACM. L. Xie, A. Natsev, J. R. Kender, M. Hill, and J. R. Smith. 2011. Visual memes in social media: Tracking real-world news in YouTube videos. In Proceedings of the 19th ACM International Conference on Multimedia, pp. 53-62. ACM."},{"key":"e_1_4_1_804_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055065"},{"key":"e_1_4_1_805_1","first-page":"532","volume-title":"CVPR","author":"Xiong X.","unstructured":"X. Xiong and F. De La Torre. 2013. Supervised descent method and its applications to face alignment . In CVPR , pp. 532 - 539 . X. Xiong and F. De La Torre. 2013. Supervised descent method and its applications to face alignment. In CVPR, pp. 532-539."},{"key":"e_1_4_1_806_1","first-page":"5","volume-title":"Proceedings of the 2003 International Conference on Image Processing","volume":"1","author":"Xiong Z.","unstructured":"Z. Xiong , R. Radhakrishnan , and A. Divakaran . 2003. Generation of sports highlights using motion activity in combination with a common audio feature extraction framework . In Proceedings of the 2003 International Conference on Image Processing , volume 1 , pp. I- 5 . IEEE. Z. Xiong, R. Radhakrishnan, and A. Divakaran. 2003. Generation of sports highlights using motion activity in combination with a common audio feature extraction framework. In Proceedings of the 2003 International Conference on Image Processing, volume 1, pp. I-5. IEEE."},{"key":"e_1_4_1_807_1","first-page":"1631","volume-title":"ICCV","author":"Xu H.","unstructured":"H. Xu , J. Wang , Z. Li , G. Zeng , S. Li , and N. Yu . November 2011. Complementary hashing for approximate nearest neighbor search . In ICCV , pp. 1631 - 1638 . H. Xu, J. Wang, Z. Li, G. Zeng, S. Li, and N. Yu. November 2011. Complementary hashing for approximate nearest neighbor search. In ICCV, pp. 1631-1638."},{"key":"e_1_4_1_808_1","unstructured":"H. Xu S. Venugopalan V. Ramanishka M. Rohrbach and K. Saenko. 2015a. A multi-scale multiple instance video description network. arXiv:1505.05914. H. Xu S. Venugopalan V. Ramanishka M. Rohrbach and K. Saenko. 2015a. A multi-scale multiple instance video description network. arXiv:1505.05914 ."},{"key":"e_1_4_1_809_1","first-page":"195","volume-title":"Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security","author":"Xu J.","unstructured":"J. Xu , E.-C. Chang , and J. Zhou . 2013. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage . In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security , pp. 195 - 206 . ACM. J. Xu, E.-C. Chang, and J. Zhou. 2013. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 195-206. ACM."},{"key":"e_1_4_1_810_1","first-page":"5288","volume-title":"CVPR","author":"Xu J.","unstructured":"J. Xu , T. Mei , T. Yao , and Y. Rui . 2016. MSR-VTT: A large video description dataset for bridging video and language . In CVPR , pp. 5288 - 5296 . J. Xu, T. Mei, T. Yao, and Y. Rui. 2016. MSR-VTT: A large video description dataset for bridging video and language. In CVPR, pp. 5288-5296."},{"key":"e_1_4_1_811_1","first-page":"1","volume-title":"Proceedings of IEEE International Symposium on IT in Medicine and Education (ITIME)","author":"Xu K.","unstructured":"K. Xu , M. Song , X. Zhang , and J. Song . 2009. A cloud computing platform based on P2P . In Proceedings of IEEE International Symposium on IT in Medicine and Education (ITIME) , pp. 1 - 4 . K. Xu, M. Song, X. Zhang, and J. Song. 2009. A cloud computing platform based on P2P. In Proceedings of IEEE International Symposium on IT in Medicine and Education (ITIME), pp. 1-4."},{"key":"e_1_4_1_812_1","first-page":"1","volume-title":"2014 IEEE International Conference on Multimedia and Expo (ICME)","author":"Xu L.","unstructured":"L. Xu , X. Guo , Y. Lu , S. Li , O. C. Au , and L. Fang . Jul . 2014. A low latency cloud gaming system using edge preserved image homography . In 2014 IEEE International Conference on Multimedia and Expo (ICME) , pp. 1 - 6 . L. Xu, X. Guo, Y. Lu, S. Li, O. C. Au, and L. Fang. Jul. 2014. A low latency cloud gaming system using edge preserved image homography. In 2014 IEEE International Conference on Multimedia and Expo (ICME), pp. 1-6."},{"key":"e_1_4_1_813_1","first-page":"II-281","volume-title":"Proceedings of the 2003 International Conference on Multimedia and Expo","volume":"2","author":"Xu M.","unstructured":"M. Xu , N. Maddage , C. Xu , M. Kankanhalli , and Q. Tian . 2003. Creating audio keywords for event detection in soccer video . In Proceedings of the 2003 International Conference on Multimedia and Expo , volume 2 , pp. II-281 . IEEE. M. Xu, N. Maddage, C. Xu, M. Kankanhalli, and Q. Tian. 2003. Creating audio keywords for event detection in soccer video. In Proceedings of the 2003 International Conference on Multimedia and Expo, volume 2, pp. II-281. IEEE."},{"key":"e_1_4_1_814_1","first-page":"2346","volume-title":"AAAI","author":"Xu R.","unstructured":"R. Xu , C. Xiong , W. Chen , and J. J. Corso . 2015b. Jointly modeling deep video and compositional text to bridge vision and language in a unified framework . In AAAI , pp. 2346 - 2352 . R. Xu, C. Xiong, W. Chen, and J. J. Corso. 2015b. Jointly modeling deep video and compositional text to bridge vision and language in a unified framework. In AAAI, pp. 2346-2352."},{"key":"e_1_4_1_815_1","first-page":"1798","volume-title":"CVPR","author":"Xu Z.","unstructured":"Z. Xu , Y. Yang , and A. G. Hauptmann . 2015c. A discriminative CNN video representation for event detection . In CVPR , pp. 1798 - 1807 . Z. Xu, Y. Yang, and A. G. Hauptmann. 2015c. A discriminative CNN video representation for event detection. In CVPR, pp. 1798-1807."},{"key":"e_1_4_1_816_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2282128"},{"key":"e_1_4_1_817_1","first-page":"39","volume-title":"10th Annual Symposium on Information Assurance (ASIA '15)","author":"Yakubu M. A.","unstructured":"M. A. Yakubu , P. K. Atrey , and N. C. Maddage . 2015. Secure audio reverberation over cloud . In 10th Annual Symposium on Information Assurance (ASIA '15) , p. 39 . M. A. Yakubu, P. K. Atrey, and N. C. Maddage. 2015. Secure audio reverberation over cloud. In 10th Annual Symposium on Information Assurance (ASIA '15), p. 39."},{"key":"e_1_4_1_818_1","first-page":"1177","volume-title":"IEEE ICCV","author":"Yan Y.","unstructured":"Y. Yan , E. Ricci , R. Subramanian , O. Lanz , and N. Sebe . 2013. No matter where you are: Flexible graph-guided multi-task learning for multi-view head pose classification under target motion . In IEEE ICCV , pp. 1177 - 1184 . Y. Yan, E. Ricci, R. Subramanian, O. Lanz, and N. Sebe. 2013. No matter where you are: Flexible graph-guided multi-task learning for multi-view head pose classification under target motion. In IEEE ICCV, pp. 1177-1184."},{"key":"e_1_4_1_819_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2365699"},{"key":"e_1_4_1_820_1","first-page":"1794","article-title":"Linear spatial pyramid matching using sparse coding for image classification","author":"Yang J.","year":"2009","unstructured":"J. Yang , K. Yu , Y. Gong , and T. Huang . 2009 . Linear spatial pyramid matching using sparse coding for image classification . In CVPR , 1794 - 1801 . J. Yang, K. Yu, Y. Gong, and T. Huang. 2009. Linear spatial pyramid matching using sparse coding for image classification. In CVPR, 1794-1801.","journal-title":"CVPR"},{"issue":"2","key":"e_1_4_1_821_1","first-page":"78","article-title":"Distance metric learning: A comprehensive survey","volume":"2","author":"Yang L.","year":"2006","unstructured":"L. Yang and R. Jin . 2006 . Distance metric learning: A comprehensive survey . Michigan State University , 2 ( 2 ): 78 . L. Yang and R. Jin. 2006. Distance metric learning: A comprehensive survey. Michigan State University, 2(2): 78.","journal-title":"Michigan State University"},{"key":"e_1_4_1_822_1","first-page":"2198","volume-title":"Proceedings of the 24th International Conference on Artificial Intelligence","author":"Yang Q.","unstructured":"Q. Yang , M. J. Wooldridge , and H. Zha . 2015. Trailer generation via a point process-based visual attractiveness model . In Proceedings of the 24th International Conference on Artificial Intelligence , pp. 2198 - 2204 . AAAI Press. ISBN 9781577357384. Q. Yang, M. J. Wooldridge, and H. Zha. 2015. Trailer generation via a point process-based visual attractiveness model. In Proceedings of the 24th International Conference on Artificial Intelligence, pp. 2198-2204. AAAI Press. ISBN 9781577357384."},{"key":"e_1_4_1_823_1","first-page":"785","volume-title":"Proceedings of the 21st ACM International Conference on Multimedia","author":"Yang Y.","unstructured":"Y. Yang , P. Cui , W. Zhu , and S. Yang . 2013. User interest and social influence based emotion prediction for individuals . In Proceedings of the 21st ACM International Conference on Multimedia , pp. 785 - 788 . ACM. Y. Yang, P. Cui, W. Zhu, and S. Yang. 2013. User interest and social influence based emotion prediction for individuals. In Proceedings of the 21st ACM International Conference on Multimedia, pp. 785-788. ACM."},{"key":"e_1_4_1_824_1","doi-asserted-by":"publisher","DOI":"10.1145\/322261.322274"},{"key":"e_1_4_1_825_1","first-page":"4507","volume-title":"ICCV","author":"Yao L.","unstructured":"L. Yao , A. Torabi , K. Cho , N. Ballas , C. Pal , H. Larochelle , and A. Courville . 2015a. Describing videos by exploiting temporal structure . In ICCV , pp. 4507 - 4515 . L. Yao, A. Torabi, K. Cho, N. Ballas, C. Pal, H. Larochelle, and A. Courville. 2015a. Describing videos by exploiting temporal structure. In ICCV, pp. 4507-4515."},{"key":"e_1_4_1_826_1","first-page":"821","volume-title":"ACM Multimedia","author":"Yao T.","unstructured":"T. Yao , C.-W. Ngo , and S. Zhu . 2012. Predicting domain adaptivity: Redo or recycle ? In ACM Multimedia , pp. 821 - 824 . T. Yao, C.-W. Ngo, and S. Zhu. 2012. Predicting domain adaptivity: Redo or recycle? In ACM Multimedia, pp. 821-824."},{"key":"e_1_4_1_827_1","first-page":"977","volume-title":"ACM Multimedia","author":"Yao T.","unstructured":"T. Yao , T. Mei , C.-W. Ngo , and S. Li . 2013. Annotation for free: Video tagging by mining user search behavior . In ACM Multimedia , pp. 977 - 986 . T. Yao, T. Mei, C.-W. Ngo, and S. Li. 2013. Annotation for free: Video tagging by mining user search behavior. In ACM Multimedia, pp. 977-986."},{"key":"e_1_4_1_828_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.12"},{"key":"e_1_4_1_829_1","first-page":"2142","volume-title":"CVPR","author":"Yao T.","unstructured":"T. Yao , Y. Pan , C.-W. Ngo , H. Li , and T. Mei . 2015c. Semi-supervised domain adaptation with subspace learning for visual recognition . In CVPR , pp. 2142 - 2150 . T. Yao, Y. Pan, C.-W. Ngo, H. Li, and T. Mei. 2015c. Semi-supervised domain adaptation with subspace learning for visual recognition. In CVPR, pp. 2142-2150."},{"key":"e_1_4_1_830_1","doi-asserted-by":"crossref","unstructured":"T. Yao Y. Pan Y. Li Z. Qiu and T. Mei. 2016. Boosting image captioning with attributes. arXiv:1611.01646. T. Yao Y. Pan Y. Li Z. Qiu and T. Mei. 2016. Boosting image captioning with attributes. arXiv:1611.01646 .","DOI":"10.1109\/ICCV.2017.524"},{"key":"e_1_4_1_831_1","first-page":"341","volume-title":"Proceedings of the ACM Conference on Ubiquitous Computing","author":"Yatani K.","unstructured":"K. Yatani and K. N. Truong . 2012. Bodyscope: A wearable acoustic sensor for activity recognition . In Proceedings of the ACM Conference on Ubiquitous Computing , pp. 341 - 350 . ACM. K. Yatani and K. N. Truong. 2012. Bodyscope: A wearable acoustic sensor for activity recognition. In Proceedings of the ACM Conference on Ubiquitous Computing, pp. 341-350. ACM."},{"key":"e_1_4_1_832_1","first-page":"5","volume-title":"The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2006, and the 2006 Second International Workshop on Collaborative Computing, Integration, and Assurance","author":"Yau S.","unstructured":"S. Yau and J. Liu . 2006. Hierarchical situation modeling and reasoning for pervasive computing . In The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2006, and the 2006 Second International Workshop on Collaborative Computing, Integration, and Assurance , pp. 5 - 10 . IEEE. S. Yau and J. Liu. 2006. Hierarchical situation modeling and reasoning for pervasive computing. In The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2006, and the 2006 Second International Workshop on Collaborative Computing, Integration, and Assurance, pp. 5-10. IEEE."},{"key":"e_1_4_1_833_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806221"},{"key":"e_1_4_1_834_1","first-page":"435","volume-title":"ACM ICMR","author":"Ye H.","unstructured":"H. Ye , Z. Wu , R.-W. Zhao , X. Wang , Y.-G. Jiang , and X. Xue . 2015b. Evaluating two-stream CNN for video classification . In ACM ICMR , pp. 435 - 442 . H. Ye, Z. Wu, R.-W. Zhao, X. Wang, Y.-G. Jiang, and X. Xue. 2015b. Evaluating two-stream CNN for video classification. In ACM ICMR, pp. 435-442."},{"key":"e_1_4_1_835_1","first-page":"73","volume-title":"Proceedings of IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb)","author":"Yi S.","unstructured":"S. Yi , Z. Hao , Z. Qin , and Q. Li . 2015. Fog computing: Platform and applications . In Proceedings of IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb) , pp. 73 - 78 . S. Yi, Z. Hao, Z. Qin, and Q. Li. 2015. Fog computing: Platform and applications. In Proceedings of IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), pp. 73-78."},{"key":"e_1_4_1_836_1","first-page":"83","volume-title":"Proceedings of the IEEE Transactions on Affective Computing","author":"Yogachandran R.","unstructured":"R. Yogachandran , R. Phan , J. Chambers , and D. Parish . 2012. Facial expression recognition in the encrypted domain based on local Fisher discriminant analysis . In Proceedings of the IEEE Transactions on Affective Computing , pp. 83 - 92 . R. Yogachandran, R. Phan, J. Chambers, and D. Parish. 2012. Facial expression recognition in the encrypted domain based on local Fisher discriminant analysis. In Proceedings of the IEEE Transactions on Affective Computing, pp. 83-92."},{"key":"e_1_4_1_837_1","first-page":"4584","volume-title":"CVPR","author":"Yu H.","unstructured":"H. Yu , J. Wang , Z. Huang , Y. Yang , and W. Xu . 2016. Video paragraph captioning using hierarchical recurrent neural networks . In CVPR , pp. 4584 - 4593 . H. Yu, J. Wang, Z. Huang, Y. Yang, and W. Xu. 2016. Video paragraph captioning using hierarchical recurrent neural networks. In CVPR, pp. 4584-4593."},{"key":"e_1_4_1_838_1","first-page":"253","volume-title":"Proceedings of the 21st ACM International Conference on Multimedia","author":"Yuan Z.","unstructured":"Z. Yuan , J. Sang , Y. Liu , and C. Xu . 2013. Latent feature learning in social media network . In Proceedings of the 21st ACM International Conference on Multimedia , pp. 253 - 262 . ACM. Z. Yuan, J. Sang, Y. Liu, and C. Xu. 2013. Latent feature learning in social media network. In Proceedings of the 21st ACM International Conference on Multimedia, pp. 253-262. ACM."},{"key":"e_1_4_1_839_1","first-page":"739","volume-title":"Proceedings of IEEE International Conference on Social Computing (SocialCom)","author":"Yuen M.","unstructured":"M. Yuen , I. King , and K. Leung . 2011. A survey of crowdsourcing systems . In Proceedings of IEEE International Conference on Social Computing (SocialCom) , pp. 739 - 773 . M. Yuen, I. King, and K. Leung. 2011. A survey of crowdsourcing systems. In Proceedings of IEEE International Conference on Social Computing (SocialCom), pp. 739-773."},{"key":"e_1_4_1_840_1","first-page":"739","volume-title":"CVPR","author":"Yun K.","unstructured":"K. Yun , Y. Peng , D. Samaras , G. J. Zelinsky , and T. L. Berg . 2013. Studying relationships between human gaze, description, and computer vision . In CVPR , pp. 739 - 746 . K. Yun, Y. Peng, D. Samaras, G. J. Zelinsky, and T. L. Berg. 2013. Studying relationships between human gaze, description, and computer vision. In CVPR, pp. 739-746."},{"key":"e_1_4_1_841_1","first-page":"37","volume-title":"ACM International Workshop on Multimodal Pervasive Video Analysis","author":"Zen G.","unstructured":"G. Zen , B. Lepri , E. Ricci , and O. Lanz . 2010. Space speaks: Towards socially and personality aware visual surveillance . In ACM International Workshop on Multimodal Pervasive Video Analysis , pp. 37 - 42 . G. Zen, B. Lepri, E. Ricci, and O. Lanz. 2010. Space speaks: Towards socially and personality aware visual surveillance. In ACM International Workshop on Multimodal Pervasive Video Analysis, pp. 37-42."},{"key":"e_1_4_1_842_1","first-page":"285","volume-title":"Proceedings of the Seventh ACM International Conference on Multimedia (Part 1)","author":"Zeng W.","unstructured":"W. Zeng and S. Lei . 1999. Efficient frequency domain video scrambling for content access control . In Proceedings of the Seventh ACM International Conference on Multimedia (Part 1) , pp. 285 - 294 . W. Zeng and S. Lei. 1999. Efficient frequency domain video scrambling for content access control. In Proceedings of the Seventh ACM International Conference on Multimedia (Part 1), pp. 285-294."},{"key":"e_1_4_1_843_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.808817"},{"key":"e_1_4_1_844_1","first-page":"1","article-title":"Exploiting image-trained CNN architectures for unconstrained video classification","volume":"60","author":"Zha S.","year":"2015","unstructured":"S. Zha , F. Luisier , W. Andrews , N. Srivastava , and R. Salakhutdinov . 2015 . Exploiting image-trained CNN architectures for unconstrained video classification . In BMVC , 60 : 1 - 13 . S. Zha, F. Luisier, W. Andrews, N. Srivastava, and R. Salakhutdinov. 2015. Exploiting image-trained CNN architectures for unconstrained video classification. In BMVC, 60: 1-13.","journal-title":"BMVC"},{"key":"e_1_4_1_845_1","first-page":"2718","volume-title":"CVPR","author":"Zhang B.","unstructured":"B. Zhang , L. Wang , Z. Wang , Y. Qiao , and H. Wang . 2016. Real-time action recognition with enhanced motion vector CNNs . In CVPR , pp. 2718 - 2726 . B. Zhang, L. Wang, Z. Wang, Y. Qiao, and H. Wang. 2016. Real-time action recognition with enhanced motion vector CNNs. In CVPR, pp. 2718-2726."},{"key":"e_1_4_1_846_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2393365"},{"key":"e_1_4_1_847_1","doi-asserted-by":"publisher","DOI":"10.1109\/89.917689"},{"key":"e_1_4_1_848_1","first-page":"838","volume-title":"ICML","author":"Zhang T.","unstructured":"T. Zhang , C. Du , and J. Wang . June 2014. Composite quantization for approximate nearest neighbor search . In ICML , pp. 838 - 846 . T. Zhang, C. Du, and J. Wang. June 2014. Composite quantization for approximate nearest neighbor search. In ICML, pp. 838-846."},{"key":"e_1_4_1_849_1","first-page":"4548","volume-title":"CVPR","author":"Zhang T.","unstructured":"T. Zhang , G.-J. Qi , J. Tang , and J. Wang . June 2015a. Sparse composite quantization . In CVPR , pp. 4548 - 4556 . T. Zhang, G.-J. Qi, J. Tang, and J. Wang. June 2015a. Sparse composite quantization. In CVPR, pp. 4548-4556."},{"key":"e_1_4_1_850_1","first-page":"61","volume-title":"Transfer Components Between Subjects for EEG-based Driving Fatigue Detection","author":"Zhang Y.-Q.","unstructured":"Y.-Q. Zhang , W.-L. Zheng , and B.-L. Lu. 2015b. Transfer Components Between Subjects for EEG-based Driving Fatigue Detection , pp. 61 - 68 . Springer . Y.-Q. Zhang, W.-L. Zheng, and B.-L. Lu. 2015b. Transfer Components Between Subjects for EEG-based Driving Fatigue Detection, pp. 61-68. Springer."},{"key":"e_1_4_1_851_1","first-page":"23","volume-title":"Proceedings of the 3rd Workshop on Scientific Cloud Computing, ScienceCloud '12","author":"Zhao Z.","unstructured":"Z. Zhao , K. Hwang , and J. Villeta . 2012. Game cloud design with virtualized CPU\/GPU servers and initial performance results . In Proceedings of the 3rd Workshop on Scientific Cloud Computing, ScienceCloud '12 , pp. 23 - 30 . ACM, New York. Z. Zhao, K. Hwang, and J. Villeta. 2012. Game cloud design with virtualized CPU\/GPU servers and initial performance results. In Proceedings of the 3rd Workshop on Scientific Cloud Computing, ScienceCloud '12, pp. 23-30. ACM, New York."},{"key":"e_1_4_1_852_1","first-page":"63","volume-title":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","author":"Zheng Y.","unstructured":"Y. Zheng , X. Yuan , X. Wang , J. Jiang , C. Wang , and X. Gui . 2015. Enabling encrypted cloud media center with secure deduplication . In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security , pp. 63 - 72 . ACM. Y. Zheng, X. Yuan, X. Wang, J. Jiang, C. Wang, and X. Gui. 2015. Enabling encrypted cloud media center with secure deduplication. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 63-72. ACM."},{"key":"e_1_4_1_853_1","first-page":"823","volume-title":"Pervasive and Mobile Computing","author":"Zhong E.","unstructured":"E. Zhong , B. Tan , K. Mo , and Q. Yang . 2013. User demographics prediction based on mobile data . Pervasive and Mobile Computing , pp. 823 - 837 . E. Zhong, B. Tan, K. Mo, and Q. Yang. 2013. User demographics prediction based on mobile data. Pervasive and Mobile Computing, pp. 823-837."},{"key":"e_1_4_1_854_1","first-page":"105","volume-title":"Proceedings of IEEE International Conference on Semantics Knowledge and Grid (SKG)","author":"Zhou M.","unstructured":"M. Zhou , R. Zhang , W. Xie , W. Qian , and A. Zhou . 2010. Security and privacy in cloud computing: A survey . In Proceedings of IEEE International Conference on Semantics Knowledge and Grid (SKG) , pp. 105 - 112 . M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou. 2010. Security and privacy in cloud computing: A survey. In Proceedings of IEEE International Conference on Semantics Knowledge and Grid (SKG), pp. 105-112."},{"key":"e_1_4_1_855_1","doi-asserted-by":"publisher","DOI":"10.1145\/279232.279236"},{"key":"e_1_4_1_856_1","first-page":"1991","volume-title":"CVPR","author":"Zhu W.","unstructured":"W. Zhu , J. Hu , G. Sun , X. Cao , and Y. Qiao . 2016. A key volume mining deep framework for action recognition . In CVPR , pp. 1991 - 1999 . W. Zhu, J. Hu, G. Sun, X. Cao, and Y. Qiao. 2016. A key volume mining deep framework for action recognition. In CVPR, pp. 1991-1999."},{"key":"e_1_4_1_857_1","doi-asserted-by":"crossref","unstructured":"X. Zhu and A. B. Goldberg. 2009. Introduction to semi-supervised learning. Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan and Claypool Publishers. X. Zhu and A. B. Goldberg. 2009. Introduction to semi-supervised learning. Synthesis Lectures on Artificial Intelligence and Machine Learning . Morgan and Claypool Publishers.","DOI":"10.1007\/978-3-031-01548-9"},{"key":"e_1_4_1_858_1","first-page":"2089","volume-title":"Proceedings of Interspeech","author":"Zhuang X.","unstructured":"X. Zhuang , S. Tsakalidis , S. Wu , P. Natarajan , R. Prasad , and P. Natarajan . 2011. Compact audio representation for event detection in consumer media . In Proceedings of Interspeech , pp. 2089 - 2092 . X. Zhuang, S. Tsakalidis, S. Wu, P. Natarajan, R. Prasad, and P. Natarajan. 2011. Compact audio representation for event detection in consumer media. In Proceedings of Interspeech, pp. 2089-2092."},{"key":"e_1_4_1_859_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956792515000492"}],"container-title":["Frontiers of Multimedia Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3122865.3122868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3122865.3122868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T19:02:56Z","timestamp":1751396576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3122865.3122868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,19]]},"ISBN":["9781970001075"],"references-count":851,"alternative-id":["10.1145\/3122865.3122868","10.1145\/3122865"],"URL":"https:\/\/doi.org\/10.1145\/3122865.3122868","relation":{},"subject":[],"published":{"date-parts":[[2017,12,19]]},"assertion":[{"value":"2017-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}