Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Research Collection School Of Computing and Information Systems

Discipline
Keyword
Publication Year
File Type

Articles 5191 - 5220 of 6891

Full-Text Articles in Physical Sciences and Mathematics

Evaluating The Use Of A Mobile Annotation System For Geography Education, Dion Hoe-Lian Goh, Khasfariyati Razikin, Chei Sian Lee, Ee Peng Lim, Kalyani Chatterjea, Chew-Hung Chang Jan 2012

Evaluating The Use Of A Mobile Annotation System For Geography Education, Dion Hoe-Lian Goh, Khasfariyati Razikin, Chei Sian Lee, Ee Peng Lim, Kalyani Chatterjea, Chew-Hung Chang

Research Collection School Of Computing and Information Systems

Mobile devices used in educational settings are usually employed within a collaborative learning activity in which learning takes place in the form of social interactions between team members while performing a shared task. The authors aim to introduce MobiTOP (Mobile Tagging of Objects and People), a mobile annotation system that allows users to contribute and share geospatial multimedia annotations via mobile devices. Field observations and interviews were conducted. A group of trainee teachers involved in a geography field study were instructed to identify rock formations by collaborating with each other using the MobiTOP system. The trainee teachers who were in …


Who Is Retweeting The Tweeters? Modeling, Originating, And Promoting Behaviors In The Twitter Network, Achananuparp Palakorn, Ee Peng Lim, Jing Jiang, Tuan Anh Hoang Jan 2012

Who Is Retweeting The Tweeters? Modeling, Originating, And Promoting Behaviors In The Twitter Network, Achananuparp Palakorn, Ee Peng Lim, Jing Jiang, Tuan Anh Hoang

Research Collection School Of Computing and Information Systems

Real-time microblogging systems such as Twitter offer users an easy and lightweight means to exchange information. Instead of writing formal and lengthy messages, microbloggers prefer to frequently broadcast several short messages to be read by other users. Only when messages are interesting, are they propagated further by the readers. In this article, we examine user behavior relevant to information propagation through microblogging. We specifically use retweeting activities among Twitter users to define and model originating and promoting behavior. We propose a basic model for measuring the two behaviors, a mutual dependency model, which considers the mutual relationships between the two …


A New Efficient Optimistic Fair Exchange Protocol Without Random Oracles, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo Jan 2012

A New Efficient Optimistic Fair Exchange Protocol Without Random Oracles, Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo

Research Collection School Of Computing and Information Systems

Optimistic fair exchange (OFE) is a kind of protocols to solve the problem of fair exchange between two parties. Most of the previous work on this topic are provably secure in the random oracle model. In this work, we propose a new construction of OFE from another cryptographic primitive, called time capsule signature. The construction is efficient and brings almost no overhead other than the primitive itself. The security of our new construction is based on that of the underlying primitive without relying on the random oracle heuristic. Applying our generic construction to the time capsule signature scheme recently proposed …


An Improved K-Nearest-Neighbor Algorithm For Text Categorization, Shengyi Jiang, Guansong Pang, Meiling Wu, Limin Kuang Jan 2012

An Improved K-Nearest-Neighbor Algorithm For Text Categorization, Shengyi Jiang, Guansong Pang, Meiling Wu, Limin Kuang

Research Collection School Of Computing and Information Systems

Text categorization is a significant tool to manage and organize the surging text data. Many text categorization algorithms have been explored in previous literatures, such as KNN, Naive Bayes and Support Vector Machine. KNN text categorization is an effective but less efficient classification method. In this paper, we propose an improved KNN algorithm for text categorization, which builds the classification model by combining constrained one pass clustering algorithm and KNN text categorization. Empirical results on three benchmark corpora show that our algorithm can reduce the text similarity computation substantially and outperform the-state-of-the-art KNN, Naive Bayes and Support Vector Machine classifiers. …


Topic Based Query Suggestions For Video Search, Kong-Wah Wan, Ah-Hwee Tan, Joo-Hwee Lim, Liang-Tien Chia Jan 2012

Topic Based Query Suggestions For Video Search, Kong-Wah Wan, Ah-Hwee Tan, Joo-Hwee Lim, Liang-Tien Chia

Research Collection School Of Computing and Information Systems

Query suggestion is an assistive technology mechanism commonly used in search engines to enable a user to formulate their search queries by predicting or completing the next few query words that the user is likely to type. In most implementations, the suggestions are mined from query log and use some simple measure of query similarity such as query frequency or lexicographical matching. In this paper, we propose an alternative method of presenting query suggestions by their thematic topics. Our method adopts a document-centric approach to mine topics in the corpus, and does not require the availability of a query log. …


A Hybridized Lagrangian Relaxation And Simulated Annealing Method For The Course Timetabling Problem, Aldy Gunawan, Kim Leng Poh Jan 2012

A Hybridized Lagrangian Relaxation And Simulated Annealing Method For The Course Timetabling Problem, Aldy Gunawan, Kim Leng Poh

Research Collection School Of Computing and Information Systems

This paper describes a timetabling problem at universities, where a master course timetable is given extrinsically and conflicts due to students' course enrollment do not need to be considered. A solver for the problem, which integrates both teacher assignment and course scheduling, is described. An initial solution is obtained by a mathematical programming approach based on Lagrangian relaxation. This solution is further improved by a simulated annealing algorithm. The proposed method has been tested on instances from a university in Indonesia, as well as on several randomly generated datasets, and the corresponding computational results are reported.


A Sentiment Analysis Of Singapore Presidential Election 2011 Using Twitter Data With Census Correction, Murphy Junyu Choy, Michelle Lee Fong Cheong, Nang Laik Ma, Ping Shung Koo Jan 2012

A Sentiment Analysis Of Singapore Presidential Election 2011 Using Twitter Data With Census Correction, Murphy Junyu Choy, Michelle Lee Fong Cheong, Nang Laik Ma, Ping Shung Koo

Research Collection School Of Computing and Information Systems

Sentiment analysis is a new area in text analytics where it focuses on the analysis and understanding of the human emotions from the text patterns. This new form of analysis has been widely adopted in customer relationship management especially in the context of complaint management. However, sentiment analysis using Twitter data has remained extremely difficult to manage due to sampling biasness. In this paper, we will discuss about the application of reweighting techniques in conjunction with online sentiment divisions to predict the vote percentage that individual presidential candidate in Singapore will receive in the Presidential Election 2011. There will be …


A Survey On Privacy Frameworks For Rfid Authentication, Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou Jan 2012

A Survey On Privacy Frameworks For Rfid Authentication, Chunhua Su, Yingjiu Li, Yunlei Zhao, Robert H. Deng, Yiming Zhao, Jianying Zhou

Research Collection School Of Computing and Information Systems

Due to rapid growth of RFID system applications, the security and privacy problems become more and more important to guarantee the validity of RFID systems. Without introducing proper privacy protection mechanisms, widespread deployment of RFID could raise privacy concerns to both companies and individuals. As a fundamental issue for the design and analysis of secure RFID systems, some formal RFID privacy frameworks were proposed in recent years to give the principles for evaluating the security and privacy in RFID system. However, readers can be confused with so many proposed frameworks. In this paper, we make a comparative and survey study …


Road: A New Spatial Object Search Framework For Road Networks, Ken C. K. Lee, Wang-Chien Lee, Baihua Zheng, Yuan Tian Jan 2012

Road: A New Spatial Object Search Framework For Road Networks, Ken C. K. Lee, Wang-Chien Lee, Baihua Zheng, Yuan Tian

Research Collection School Of Computing and Information Systems

In this paper, we present a new system framework called ROAD for spatial object search on road networks. ROAD is extensible to diverse object types and efficient for processing various location-dependent spatial queries (LDSQs), as it maintains objects separately from a given network and adopts an effective search space pruning technique. Based on our analysis on the two essential operations for LDSQ processing, namely, network traversal and object lookup, ROAD organizes a large road network as a hierarchy of interconnected regional subnetworks (called Rnets). Each Rnet is augmented with 1) shortcuts and 2) object abstracts to accelerate network traversals and …


Tweets And Votes: A Study Of The 2011 Singapore General Election, Marko M. Skoric, Nathaniel D. Poor, Palakorn Achananuparp, Ee Peng Lim, Jing Jiang Jan 2012

Tweets And Votes: A Study Of The 2011 Singapore General Election, Marko M. Skoric, Nathaniel D. Poor, Palakorn Achananuparp, Ee Peng Lim, Jing Jiang

Research Collection School Of Computing and Information Systems

This study focuses on the uses of Twitter during the elections, examining whether the messages posted online are reflective of the climate of public opinion. Using Twitter data obtained during the official campaign period of the 2011 Singapore General Election, we test the predictive power of tweets in forecasting the election results. In line with some previous studies, we find that during the elections the Twitter sphere represents a rich source of data for gauging public opinion and that the frequency of tweets mentioning names of political parties, political candidates and contested constituencies could be used to make predictions about …


Dynamic Secure Cloud Storage With Provenance, Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng Jan 2012

Dynamic Secure Cloud Storage With Provenance, Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng

Research Collection School Of Computing and Information Systems

One concern in using cloud storage is that the sensitive data should be confidential to the servers which are outside the trust domain of data owners. Another issue is that the user may want to preserve his/her anonymity in the sharing or accessing of the data (such as in Web 2.0 applications). To fully enjoy the benefits of cloud storage, we need a confidential data sharing mechanism which is fine-grained (one can specify who can access which classes of his/her encrypted files), dynamic (the total number of users is not fixed in the setup, and any new user can decrypt …


Self‐Regulating Action Exploration In Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Yuan-Sin Tan Jan 2012

Self‐Regulating Action Exploration In Reinforcement Learning, Teck-Hou Teng, Ah-Hwee Tan, Yuan-Sin Tan

Research Collection School Of Computing and Information Systems

The basic tenet of a learning process is for an agent to learn for only as much and as long as it is necessary. With reinforcement learning, the learning process is divided between exploration and exploitation. Given the complexity of the problem domain and the randomness of the learning process, the exact duration of the reinforcement learning process can never be known with certainty. Using an inaccurate number of training iterations leads either to the non-convergence or the over-training of the learning agent. This work addresses such issues by proposing a technique to self-regulate the exploration rate and training duration …


Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne Dec 2011

Assessing The Impact Of Recommendation Agents On On-Line Consumer Unplanned Purchase Behavior, R. Eric Hostler, Victoria Y. Yoon, Zhiling Guo, Tor Guimaraes, Guisseppi Forgionne

Research Collection School Of Computing and Information Systems

Recommendation agents (RAs) have been used by many Internet businesses such as Amazon and Netflix. However, few authors have studied how consumer behavior is affected by those that make suggestions to online consumers based on their recent shopping behavior. Fewer still have examined the role that RAs play in influencing impulse purchasing decisions online. Our study developed a theoretical model to illustrate the impact of RAs on online consumer behavior. The model was tested through an online shopping simulation which used a collaborative filtering based product RA. Particular attention was paid to the effects of an RA on consumer behavior; …


Wsm 2011: Third Acm Workshop On Social Media, Steven C. H. Hoi, Michal Jacovi, Ioannis Kompatsiaris, Jiebo Luo, Konstantinos Tserpes Dec 2011

Wsm 2011: Third Acm Workshop On Social Media, Steven C. H. Hoi, Michal Jacovi, Ioannis Kompatsiaris, Jiebo Luo, Konstantinos Tserpes

Research Collection School Of Computing and Information Systems

The Third Workshop on Social Media (WSM2011) continues the series of Workshops on Social Media in 2009 and 2010 and has been established as a platform for the presentation and discussion of the latest, key research issues in social media analysis, exploration, search, mining, and emerging new social media applications. It is held in conjunction with the ACM International Multimedia Conference (MM'11) at Scottsdale, Arizona, USA, 2011 and has attracted contributions on various aspects of social media including data mining from social media, content organization, geo-localization, personalization, recommendation systems, user experience, machine learning and social media approaches and architectures for …


An Effective Approach For Topicspecific Opinion Summarization, Binyang Li, Lanjun Zhou, Wei Gao, Kam-Fai Wong, Zhongyu Wei Dec 2011

An Effective Approach For Topicspecific Opinion Summarization, Binyang Li, Lanjun Zhou, Wei Gao, Kam-Fai Wong, Zhongyu Wei

Research Collection School Of Computing and Information Systems

Topic-specific opinion summarization (TOS) plays an important role in helping users digest online opinions, which targets to extract a summary of opinion expressions specified by a query, i.e. topic-specific opinionated information (TOI). A fundamental problem in TOS is how to effectively represent the TOI of an opinion so that salient opinions can be summarized to meet user’s preference. Existing approaches for TOS are either limited by the mismatch between topic-specific information and its corresponding opinionated information or lack of ability to measure opinionated information associated with different topics, which in turn affect the performance seriously. In this paper, we represent …


Capir: Collaborative Action Planning With Intention Recognition, Nguyen T., Hsu D., Lee W., Tze-Yun Leong, Kaelbling L., Lozano-Perez T., Grant A. Dec 2011

Capir: Collaborative Action Planning With Intention Recognition, Nguyen T., Hsu D., Lee W., Tze-Yun Leong, Kaelbling L., Lozano-Perez T., Grant A.

Research Collection School Of Computing and Information Systems

We apply decision theoretic techniques to construct nonplayer characters that are able to assist a human player in collaborative games. The method is based on solving Markov decision processes, which can be difficult when the game state is described by many variables. To scale to more complex games, the method allows decomposition of a game task into subtasks, each of which can be modelled by a Markov decision process. Intention recognition is used to infer the subtask that the human is currently performing, allowing the helper to assist the human in performing the correct task. Experiments show that the method …


Discussion Of "Biomedical Ontologies: Toward Scientific Debate", Brochhausen M., Burgun A., Ceusters W., Hasman A., Tze-Yun Leong, Musen M., Oliveira J., Peleg M., Rector A., Schulz S. Dec 2011

Discussion Of "Biomedical Ontologies: Toward Scientific Debate", Brochhausen M., Burgun A., Ceusters W., Hasman A., Tze-Yun Leong, Musen M., Oliveira J., Peleg M., Rector A., Schulz S.

Research Collection School Of Computing and Information Systems

With these comments on the paper “Biomedical Ontologies: Toward scientific debate”, written by Victor Maojo et al., Methods of Information in Medicine wants to stimulate a discussion on advantages and challenges of biomedical ontologies. An international group of experts have been invited by the editor of Methods to comment on this paper. Each of the invited commentaries forms one section of this paper.


Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li Dec 2011

Tracking Web Video Topics: Discovery, Visualization, And Monitoring, Juan Cao, Chong-Wah Ngo, Yong-Dong Zhang, Jin-Tao Li

Research Collection School Of Computing and Information Systems

Despite the massive growth of web-shared videos in Internet, efficient organization and monitoring of videos remains a practical challenge. While nowadays broadcasting channels are keen to monitor online events, identifying topics of interest from huge volume of user uploaded videos and giving recommendation to emerging topics are by no means easy. Specifically, such process involves discovering of new topic, visualization of the topic content, and incremental monitoring of topic evolution. This paper studies the problem from three aspects. First, given a large set of videos collected over months, an efficient algorithm based on salient trajectory extraction on a topic evolution …


Galaxy Browser: Exploratory Search Of Web Videos, Lei Pang, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo Dec 2011

Galaxy Browser: Exploratory Search Of Web Videos, Lei Pang, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Most search engines return a ranked list of items in response to a query. The list however tells very little about the relationship among items. For videos especially, users often read to spend significant amount of time to navigate the search result. Exploratory search presents a new paradigm for browsing where the browser takes up the role of information exploring and presents a well-organized browsing structure for users to navigate. The proposed interface Galaxy Browser adopts the recent advances in near-duplicate detection and then synchronizes the detected near-duplicate information with comprehensive background knowledge derived from online external resources. The result …


Determination Of Sin2Θeff W Using Jet Charge Measurements In Hadronic Z Decays, D. Buskulic, M. Thulasidas Dec 2011

Determination Of Sin2Θeff W Using Jet Charge Measurements In Hadronic Z Decays, D. Buskulic, M. Thulasidas

Research Collection School Of Computing and Information Systems

The electroweak mixing angle is determined with high precision from measurements of the mean dierence between forward and backward hemisphere charges in hadronic decays of the Z. A data sample of 2:5 million hadronic Z decays recorded over the period 1990 to 1994 in the ALEPH detector at LEP is used. The mean charge separation between event hemispheres containing the original quark and antiquark is measured for b b and cc events in subsamples selected by their long lifetimes or using fast D 's. The corresponding average charge separation for light quarks is measured in an inclusive sample from the …


Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston Dec 2011

Content Contribution Under Revenue Sharing And Reputation Concern In Social Media: The Case Of Youtube, Qian Tang, Bin Gu, Andrew B. Whinston

Research Collection School Of Computing and Information Systems

A key feature of social media is that it allows individuals and businesses to contribute contents for public viewing. However, little is known about how content providers derive payoffs from such activities. In this study, we build a dynamic structural model to recover the utility function for content providers. Our model distinguishes short-term payoffs based on ad revenue sharing from long-term payoffs driven by content providers’ reputation. The model was estimated using a panel data of 914 top 1000 providers and 381 randomly selected providers on YouTube from Jun 7th, 2010, to Aug 7th, 2011. The two different sets of …


Sire: A Social Image Retrieval Engine, Steven C. H. Hoi, Pengcheng Wu Dec 2011

Sire: A Social Image Retrieval Engine, Steven C. H. Hoi, Pengcheng Wu

Research Collection School Of Computing and Information Systems

With the explosive growth of social media applications on the internet, billions of social images have been made available in many social media web sites nowadays. This has presented an open challenge of web-scale social image search. Unlike existing commercial web search engines that often adopt text based retrieval, in this demo, we present a novel web-based multimodal paradigm for large-scale social image retrieval, termed "Social Image Retrieval Engine" (SIRE), which effectively exploits both textual and visual contents to narrow down the semantic gap between high-level concepts and low-level visual features. A relevance feedback mechanism is also equipped to learn …


Case Study On Using A Programming Practice Tool For Evaluating University Applicants, Shannon Christopher Boesch, Kevin Steppe Dec 2011

Case Study On Using A Programming Practice Tool For Evaluating University Applicants, Shannon Christopher Boesch, Kevin Steppe

Research Collection School Of Computing and Information Systems

We used a programming practice tool to test basic programming skills of prospective students. A live competition was used to test those skills. Students who did well were asked for further interviews. Most students had no prior background and reported learning the basics of two programming languages within two weeks of self-study.


On Two Rfid Privacy Notions And Their Relations, Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma Dec 2011

On Two Rfid Privacy Notions And Their Relations, Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma

Research Collection School Of Computing and Information Systems

Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the unpredictability of the output of an RFID protocol, denoted as unp*-privacy. In this article, we first revisit the existing unpredictability-based RFID privacy models and point out their limitations. We then propose a new RFID privacy model, denoted as unp*-privacy, based on the indistinguishability of a real tag and a virtual tag. We formally clarify its relationship with the ind-privacy …


New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn Dec 2011

New Theories And Methods For Technology Adoption Research, Robert J. Kauffman, Angsana A. Techatassanasoontorn

Research Collection School Of Computing and Information Systems

This special issue includes six articles on different aspects of technology adoption that represent the development and application of different theoretical and methodological approaches to the business problems that they treat. In terms of theory, three of the articles use behavioral and organizational theories, including adaptive structuration theory, management fashion theory, the unified theory of technology acceptance, the technology acceptance model, and diffusion of innovation theory. The other two are based on economic theory, including network effects theory, and economic growth theory. The methods used are also dramatically different in each of the studies. Three studies use field research and …


Vireo@Trecvid 2011: Instance Search, Semantic Indexing, Multimedia Event Detection And Known-Item Search, Chong-Wah Ngo, Shi-Ai Zhu, Wei Zhang, Chun-Chet Tan, Ting Yao, Lei Pang, Hung-Khoon Tan Dec 2011

Vireo@Trecvid 2011: Instance Search, Semantic Indexing, Multimedia Event Detection And Known-Item Search, Chong-Wah Ngo, Shi-Ai Zhu, Wei Zhang, Chun-Chet Tan, Ting Yao, Lei Pang, Hung-Khoon Tan

Research Collection School Of Computing and Information Systems

The vireo group participated in four tasks: instance search, semantic indexing, multimedia event detection and known-item search. In this paper,we will present our approaches and discuss the evaluation results.


Understanding And Protecting Privacy: Formal Semantics And Principled Audit Mechanisms, Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry Deyoung, Deepak Garg, Limin Jia, Dilsun Kaynar, Arunesh Sinha Dec 2011

Understanding And Protecting Privacy: Formal Semantics And Principled Audit Mechanisms, Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry Deyoung, Deepak Garg, Limin Jia, Dilsun Kaynar, Arunesh Sinha

Research Collection School Of Computing and Information Systems

Privacy has become a significant concern in modern society as personal information about individuals is increasingly collected, used, and shared, often using digital technologies, by a wide range of organizations. Certain information handling practices of organizations that monitor individuals’ activities on the Web, data aggregation companies that compile massive databases of personal information, cell phone companies that collect and use location data about individuals, online social networks and search engines—while enabling useful services—have aroused much indignation and protest in the name of privacy. Similarly, as healthcare organizations are embracing electronic health record systems and patient portals to enable patients, employees, …


Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West Dec 2011

Four Perspectives On Architectural Strategy, C. Jason Woodard, Joel West

Research Collection School Of Computing and Information Systems

A recurring theme in the literature on technology and organizations is the concept of mirroring, which posits a duality between technological and organizational design decisions. In this paper we highlight a second, orthogonal duality between components and interfaces: designers of both products and organizations must decide what information to hide within component boundaries and what to expose to other designers. Although the component-interface duality appears in many settings, it presents especially vexing strategic challenges in the design and production of complex digital artifacts. We present a typology of four interlinked perspectives on these kinds of strategic design problems, and discuss …


Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu Dec 2011

Retrieval-Based Face Annotation By Weak Label Regularized Local Coordinate Coding, Dayong Wang, Steven C. H. Hoi, Ying He, Jianke Zhu

Research Collection School Of Computing and Information Systems

Retrieval-based face annotation is a promising paradigm in mining massive web facial images for automated face annotation. Such an annotation paradigm usually encounters two key challenges. The first challenge is how to efficiently retrieve a short list of most similar facial images from facial image databases, and the second challenge is how to effectively perform annotation by exploiting these similar facial images and their weak labels which are often noisy and incomplete. In this paper, we mainly focus on tackling the second challenge of the retrieval-based face annotation paradigm. In particular, we propose an effective Weak Label Regularized Local Coordinate …


Modeling 3d Articulated Motions With Conformal Geometry Videos (Cgvs), Dao T. P. Quynh, Ying He, Xiaoming Chen, Jiazhi Xia, Qian Sun, Steven C. H. Hoi Dec 2011

Modeling 3d Articulated Motions With Conformal Geometry Videos (Cgvs), Dao T. P. Quynh, Ying He, Xiaoming Chen, Jiazhi Xia, Qian Sun, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

3D articulated motions are widely used in entertainment, sports, military, and medical applications. Among various techniques for modeling 3D motions, geometry videos (GVs) are a compact representation in that each frame is parameterized to a 2D domain, which captures the 3D geometry (x, y, z) to a pixel (r, g, b) in the image domain. As a result, the widely studied image/video processing techniques can be directly borrowed for 3D motion. This paper presents conformal geometry videos (CGVs), a novel extension of the traditional geometry videos by taking into the consideration of the isometric nature of 3D articulated motions. We …