Learn More
Image annotation has been an active research topic in recent years due to its potentially large impact on both image understanding and Web image search. In this paper, we target at solving the automatic image annotation problem in a novel <i>search</i> and <i>mining</i> framework. Given an uncaptioned image, first in the search stage, we perform(More)
Our shot boundary detection system mainly consists of three components: fade out/in(FOI)detector, cut(CUT)detector and gradual transition(GT)detector. The key technique of FOI detector is the recognition of monochrome frame. In CUT detector, second order derivative method is applied to get cut candidates,and then flashlight detector and other gradual(More)
Smart grid, as the next generation of power grid featured with efficient, reliable, and flexible characteristics, has received considerable attention in recent years. However, the full flourish of smart grid is still hindered by how to efficiently and effectively tackle with its security and privacy challenges. In this paper, we propose a privacy-preserving(More)
In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA) of the patient runs the PEC to collect the(More)
In recent years, social media has risen to prominence in China, with sites like Sina Weibo and Renren each boasting hundreds of millions of users. Social media in China plays a profound role as a platform for breaking news and political commentary that is not available in the state-sanctioned news media. However, like all websites in China, Chinese social(More)
Without direct path, information delivery in sparse delay tolerant networks (DTNs) typically relies on intermittent relays, making the transmission not only unreliable but also time consuming. To make the matter even worse, the source nodes may transmit some encrypted “junk” information, similar as the spam emails in current mail systems, to the(More)
In this article, we introduce a novel Remote Health Monitoring (RHM) system to enable high-quality pervasive healthcare services to users with low delivery delay and reduced costs. We define the RHM architecture and summarize the design considerations. We then present a promising commercialized solution, ViiCare, with system infrastructures and supporting(More)
In this article, we introduce a novel Remote Health Monitoring (RHM) system to enable high-quality pervasive healthcare services to users with low delivery delay and reduced costs. We define the RHM architecture and summarize the design considerations. We then present a promising commercialized solution, ViiCare, with system infrastructures and supporting(More)