scispace - formally typeset

Author

Marco Furini

Bio: Marco Furini is an academic researcher from University of Modena and Reggio Emilia. The author has contributed to research in topic(s): The Internet & Mobile music. The author has an hindex of 20, co-authored 100 publication(s) receiving 3493 citation(s). Previous affiliations of Marco Furini include University of Eastern Piedmont & University of Bologna.


Papers
More filters
01 Jan 2010

2,172 citations

Journal ArticleDOI
TL;DR: STIMO is a summarization technique designed to produce on-the-fly video storyboards that produces still and moving storyboards and allows advanced users customization and is based on a fast clustering algorithm that selects the most representative video contents using HSV frame color distribution.
Abstract: In the current Web scenario a video browsing tool that produces on-the-fly storyboards is more and more a need. Video summary techniques can be helpful but, due to their long processing time, they are usually unsuitable for on-the-fly usage. Therefore, it is common to produce storyboards in advance, penalizing users customization. The lack of customization is more and more critical, as users have different demands and might access the Web with several different networking and device technologies. In this paper we propose STIMO, a summarization technique designed to produce on-the-fly video storyboards. STIMO produces still and moving storyboards and allows advanced users customization (e.g., users can select the storyboard length and the maximum time they are willing to wait to get the storyboard). STIMO is based on a fast clustering algorithm that selects the most representative video contents using HSV frame color distribution. Experimental results show that STIMO produces storyboards with good quality and in a time that makes on-the-fly usage possible.

221 citations

Journal ArticleDOI
TL;DR: This analysis shows four major issues that may limit the use of IoT (i.e., interoperability, security, privacy, and business models) and it highlights possible solutions to solve these problems.
Abstract: The number of physical objects connected to the Internet constantly grows and a common thought says the IoT scenario will change the way we live and work. Since IoT technologies have the potential to be pervasive in almost every aspect of a human life, in this paper, we deeply analyze the IoT scenario. First, we describe IoT in simple terms and then we investigate what current technologies can achieve. Our analysis shows four major issues that may limit the use of IoT (i.e., interoperability, security, privacy, and business models) and it highlights possible solutions to solve these problems. Finally, we provide a simulation analysis that emphasizes issues and suggests practical research directions.

64 citations

Journal ArticleDOI
TL;DR: Ass attitudes and behaviors of people toward a location-aware scenario are investigated; the amount of personal and sensitive data that can be extracted from contents publicly available in social platforms is shown; and users are asked for their opinions.
Abstract: The highavailability of geolocation technologies is changing the social media mobile scenario and is exposing users to privacy risks. Different studies have focused on location privacy in the mobile scenario, but the results are conflicting: some say that users are concerned about location privacy, others say they are not. In this paper, we initially investigate attitudes and behaviors of people toward a location-aware scenario; then, we show users the amount of personal and sensitive data that can be extracted from contents publicly available in social platforms, and finally we ask for their opinions about a location-aware scenario. Results show that people who were not initially concerned about privacy are the most worried about the location-aware scenario; conversely, people who were initially concerned are less worried about the location-aware scenario and find the scenario interesting. A deeper analysis of the obtained results allows us to draw guidelines that might be helpful to build an effective location-aware scenario.

52 citations

Journal ArticleDOI
TL;DR: It is believed that it is necessary to redesign the utilization paradigm of Web 2.0 and, in general, of the Internet in order to recycle unused parts of Web2.0 into altruistic bricks that could be appropriately rerouted and composed for alternative, unselfish employment.
Abstract: Web 2.0 is affecting the structure of our society by creating new spaces of freedom, giving voice to any opinion, easing interpersonal relationships, and encouraging the creation of collaborating collectivities. Technologies such as blog, podcasting, wiki, and news feeds have the power to transform every user from a mere information consumer to a potential producer, from a spectator to an actor. The success of YouTube, MySpace, Facebook, and Wikipedia is under everybody's eyes. Generally speaking, Web 2.0 is seen as a powerful tool that, by exploiting Internet technologies, supplies services to the society, helping the entire socio-cultural system to develop and to move toward a democratic direction. Unfortunately, this imagery is partially distorted: first, Web 2.0 and Internet technologies are differently accessible by different parts of the society and, second, as many sociologists pointed out, their applications often appeal to users' egoistic purposes and self-celebration spirit. Although we cannot dismiss the value of current Web 2.0 applications, we are convinced there is a much more valuable potential that has not been exploited yet. By comparing the immense benefits that Web 2.0 could bring to the whole society, with its factual employment, one could provocatively change the meaning of the acronym WWW into World Wide Waste. We are hence convinced that it is necessary to redesign the utilization paradigm of Web 2.0 and, in general, of the Internet in order to recycle unused parts of Web 2.0 into altruistic bricks that could be appropriately rerouted and composed for alternative, unselfish employment.

48 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

30,199 citations

01 Jul 2004
Abstract: Home PURPOSE OF THE CENTER: To develop the center to address state-of-the-art research, create innovating educational programs, and support technology transfers using commercially viable results to assist the Army Research Laboratory to develop the next generation Future Combat System in the telecommunications sector that assures prevention of perceived threats, and Non Line of Sight/Beyond Line of Sight lethal support.

1,604 citations

Journal ArticleDOI
01 Oct 1980

1,565 citations

Journal ArticleDOI
08 Apr 2005
TL;DR: This survey describes the current state-of-the-art in the development of automated visual surveillance systems to provide researchers in the field with a summary of progress achieved to date and to identify areas where further research is needed.
Abstract: This survey describes the current state-of-the-art in the development of automated visual surveillance systems so as to provide researchers in the field with a summary of progress achieved to date and to identify areas where further research is needed. The ability to recognise objects and humans, to describe their actions and interactions from information acquired by sensors is essential for automated visual surveillance. The increasing need for intelligent visual surveillance in commercial, law enforcement and military applications makes automated visual surveillance systems one of the main current application domains in computer vision. The emphasis of this review is on discussion of the creation of intelligent distributed automated surveillance systems. The survey concludes with a discussion of possible future directions.

688 citations

Journal ArticleDOI
TL;DR: VSUMM is presented, a methodology for the production of static video summaries that is based on color feature extraction from video frames and k-means clustering algorithm and develops a novel approach for the evaluation of video static summaries.
Abstract: The fast evolution of digital video has brought many new multimedia applications and, as a consequence, has increased the amount of research into new technologies that aim at improving the effectiveness and efficiency of video acquisition, archiving, cataloging and indexing, as well as increasing the usability of stored videos. Among possible research areas, video summarization is an important topic that potentially enables faster browsing of large video collections and also more efficient content indexing and access. Essentially, this research area consists of automatically generating a short summary of a video, which can either be a static summary or a dynamic summary. In this paper, we present VSUMM, a methodology for the production of static video summaries. The method is based on color feature extraction from video frames and k-means clustering algorithm. As an additional contribution, we also develop a novel approach for the evaluation of video static summaries. In this evaluation methodology, video summaries are manually created by users. Then, several user-created summaries are compared both to our approach and also to a number of different techniques in the literature. Experimental results show - with a confidence level of 98% - that the proposed solution provided static video summaries with superior quality relative to the approaches to which it was compared.

494 citations