Managing Redundant Content in Bandwidth Constrained Wireless Networks Tuan Dao, Amit K. Roy- Chowdhury, Srikanth V. Krishnamurthy U.C. Riverside Harsha.

Slides:



Advertisements
Similar presentations
Distinctive Image Features from Scale-Invariant Keypoints David Lowe.
Advertisements

3D Model Matching with Viewpoint-Invariant Patches(VIP) Reporter :鄒嘉恆 Date : 10/06/2009.
Aggregating local image descriptors into compact codes
Presented by Xinyu Chang
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
A NOVEL LOCAL FEATURE DESCRIPTOR FOR IMAGE MATCHING Heng Yang, Qing Wang ICME 2008.
Query Specific Fusion for Image Retrieval
Yi Wang, Wenjie Hu, Yibo Wu and Guohong Cao
Lesson 1-Introducing Basic Network Concepts
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
Effective Image Database Search via Dimensionality Reduction Anders Bjorholm Dahl and Henrik Aanæs IEEE Computer Society Conference on Computer Vision.
Tour the World: building a web-scale landmark recognition engine ICCV 2009 Yan-Tao Zheng1, Ming Zhao2, Yang Song2, Hartwig Adam2 Ulrich Buddemeier2, Alessandro.
HCI Final Project Robust Real Time Face Detection Paul Viola, Michael Jones, Robust Real-Time Face Detetion, International Journal of Computer Vision,
Scaling Distributed Machine Learning with the BASED ON THE PAPER AND PRESENTATION: SCALING DISTRIBUTED MACHINE LEARNING WITH THE PARAMETER SERVER – GOOGLE,
Video Streaming in Flash CSCI 4220 – Network Programming Kacper Harabasz.
P2P Network for Very Large Virtual Environment Proceedings of the ACM symposium on virtual reality software and technology VRST '06.
© 2009 Research In Motion Limited Methods of application development for mobile devices.
UPM, Faculty of Computer Science & IT, A robust automated attendance system using face recognition techniques PhD proposal; May 2009 Gawed Nagi.
Feature extraction: Corners and blobs
Distinctive image features from scale-invariant keypoints. David G. Lowe, Int. Journal of Computer Vision, 60, 2 (2004), pp Presented by: Shalomi.
Scale Invariant Feature Transform (SIFT)
Blob detection.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
FLANN Fast Library for Approximate Nearest Neighbors
FlowSense: Monitoring Network Utilization with Zero Measurement Cost Curtis Yu 1, Cristian Lumezanu 2, Yueping Zhang 2, Vishal Singh 2, Guofei Jiang 2,
© 2013 IBM Corporation Efficient Multi-stage Image Classification for Mobile Sensing in Urban Environments Presented by Shashank Mujumdar IBM Research,
DVMM Lab, Columbia UniversityVideo Event Recognition Video Event Recognition: Multilevel Pyramid Matching Dong Xu and Shih-Fu Chang Digital Video and Multimedia.
Presented by Tao HUANG Lingzhi XU. Context Mobile devices need exploit variety of connectivity options as they travel. Operating systems manage wireless.
Mobile Sensor Application Group 4. Introduction Modern smartphones are often equipped with quite a large number of sensors. The sensors data can be used.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
SECURING NETWORKS USING SDN AND MACHINE LEARNING DRAGOS COMANECI –
Bag-of-Words based Image Classification Joost van de Weijer.
Computer vision.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Final Exam Review CS485/685 Computer Vision Prof. Bebis.
Internet-scale Imagery for Graphics and Vision James Hays cs195g Computational Photography Brown University, Spring 2010.
Min Xu1, Yunfeng Zhu2, Patrick P. C. Lee1, Yinlong Xu2
1 Mobility Aware Server Selection for Mobile Streaming Multimedia CDN Muhammad Mukarram Bin Tariq, Ravi Jain, Toshiro Kawahara {tariq, jain,
Wireless Networks Breakout Session Summary September 21, 2012.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching (Wide Area Networks)
POLICY ENGINE Research: Design & Language IRT Lab, Columbia University.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
A Two-level Pose Estimation Framework Using Majority Voting of Gabor Wavelets and Bunch Graph Analysis J. Wu, J. M. Pedersen, D. Putthividhya, D. Norgaard,
21 June 2009Robust Feature Matching in 2.3μs1 Simon Taylor Edward Rosten Tom Drummond University of Cambridge.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
RevDedup: A Reverse Deduplication Storage System Optimized for Reads to Latest Backups Chun-Ho Ng, Patrick P. C. Lee The Chinese University of Hong Kong.
Gang WangDerek HoiemDavid Forsyth. INTRODUCTION APROACH (implement detail) EXPERIMENTS CONCLUSION.
1 City With a Memory CSE 535: Mobile Computing Andreea Danielescu Andrew McCord Brandon Mechtley Shawn Nikkila.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
A Multiresolution Symbolic Representation of Time Series Vasileios Megalooikonomou Qiang Wang Guo Li Christos Faloutsos Presented by Rui Li.
CSE 185 Introduction to Computer Vision Feature Matching.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
MACHINE VISION GROUP MOBILE FEATURE-CLOUD PANORAMA CONSTRUCTION FOR IMAGE RECOGNITION APPLICATIONS Miguel Bordallo, Jari Hannuksela, Olli silvén Machine.
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
Eric Minner & James Pittman. Outline Project Statement / Motivation Concept overview Quick computer vision overview Demo Lessons Learned Future Work.
COMBINING TECHNOLOGIES. WHY COMBINED? Achieve a lot more by using them together Achieve a lot more by using them together.
HP Labs 1 IEEE Infocom 2003 End-to-End Congestion Control for InfiniBand Jose Renato Santos, Yoshio Turner, John Janakiraman HP Labs.
Multi-view Traffic Sign Detection, Recognition and 3D Localisation Radu Timofte, Karel Zimmermann, and Luc Van Gool.
SCREAM: Sketch Resource Allocation for Software-defined Measurement Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat (CoNEXT’15)
Cell Segmentation in Microscopy Imagery Using a Bag of Local Bayesian Classifiers Zhaozheng Yin RI/CMU, Fall 2009.
Nguyen Thi Thanh Nha HMCL by Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and Henri Bal MOBICASE 2010, LNICST 2012 Cuckoo: A Computation Offloading Framework.
ArrayTrack : A Fine-Grained Indoor Location System Jie Xiong, Kyle Jamieson USENIX NSDI ‘ Jungmin Yoo *some slides.
CSCI 631 – Foundations of Computer Vision March 15, 2016 Ashwini Imran Image Stitching.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
Face recognition using Histograms of Oriented Gradients
Scale Invariant Feature Transform (SIFT)
Efficient Image Classification on Vertically Decomposed Data
Efficient Image Classification on Vertically Decomposed Data
Leverage Consensus Partition for Domain-Specific Entity Coreference
Presentation transcript:

Managing Redundant Content in Bandwidth Constrained Wireless Networks Tuan Dao, Amit K. Roy- Chowdhury, Srikanth V. Krishnamurthy U.C. Riverside Harsha V. Madhyastha University of Michigan Tom La Porta Penn State University

Premise During natural disasters, people tend to upload redundant images. Strained wireless network becomes congested Suppressing redundant content helps reduce latency in uploading unique and critical content. 2

Redundancies in other scenarios Similar images also uploaded in other scenarios Examples: Concerts, sport events, etc. Redundant images can be lazily uploaded (when network is less congested) Reduce network load and speed up transfers 3

How we manage redundant content Uploads image metadata Server sends response Suppress/ Upload image? Key challenge: Trade-off between overhead and accuracy Uncoordinated clients Goal: Accurately and efficiently determine if an image to be uploaded has similar version(s) on server 4

Roadmap Introduction Detection of redundancies in images Evaluation Conclusions 5

Overview of our approach 3-phase hierarchical approach: Metadata overhead increases with every phase Proceed to next phase only if classification decision cannot be made 6

Phase 1: Use global color histogram Upload coarse-grained global feature of the new image Normalized 128- byte histogram Compare image global feature Send result Found match? Upload image Proceed to Phase 2 NO YES Fast and easy to calculate (low overhead) Effective in determining dissimilar images, but high false positive rate Candidate image set 7

Phase 2: Use local features Use image local features to reduce false positives Choosing local features: Trade-off between detection accuracy and overhead Compute and upload fine-grained local features Combine state-of-the-art vision approaches to derive high accuracy with low overhead Send result Found match? Move to phase 3 Suppress/def er upload NO YES 8

Using image key-points to detect similarity Key-points are distinctive patches (local features) Use ORB algorithm to extract image key-points Two orders of magnitude faster than SIFT Comparable results Data to store key-points larger than image content  Cannot compare image key-points directly 9 Image source:

Compact representation of local features Bag-of-word (BoW) representation: Represent each image as a histogram of visual words 10 Image source: DVMM Lab, Columbia University

Using min-hash to approximate similarity Min-hash function: hashes a BoW representation into 1 number Assign each visual word W a unique value h(W) Min-hash of image I : m( I ) = min { h(W), Wε I } If k equal min-hashes among n total generated min-hashes: similarity ( I, I’ ) ≈ k/n Embed geometric information (position in the image) of key-points to reduce false positive rate Fine-grained information sent to server in phase 2: k min-hash values geometric information of k corresponding key-points 11

Phase 3: Solicit user’s feedback Phase 2 helps achieve very low false positive rate Phase 3, which solicits user feedback, boosts true positive rate Return image thumbnails of top-k images User visually compares image thumbnails Send feedback Found match? Upload image Suppress/def er upload YESNO 12

Summary of approach ① Upload coarse-grained global features for quick assessment 128-byte color histogram ② Upload fine-grained local features to reduce false negatives 1024 bytes for 512 min-hash values For each min-hash, 1 byte for geo-information of the corresponding key-point ③ Solicit user feedback to improve true positives 5 * 15 KB per thumbnail 13

Roadmap Introduction Detection of redundancies in images Evaluation Conclusions 14

Evaluation overview Conducted experiments to demonstrate Detection accuracy: True Positive & False Positive rates Impact on network performance: reduction in delays and network load System setup: 20 Android phone testbed Phones connect to central server through shared WiFi network 15

Testing and Training datasets Two image datasets with ground-truth information University of Kentucky image set: 10,200 images, consists of 2,550 groups of similar images “US cities” image set: 5,000 images, each from a different US city Evaluation setup: Phones in testbed upload 1,000 images each from either dataset Remaining images are pre-uploaded to server One image group in the Kentucky dataset 16

Detection accuracy MethodTrue Positive rateFalse Positive rate 1 - Histogram matching 80%65% 2 - Local features matching 50%1% 3 – Feedback based on thumbnails 1 thumbnail 3 thumbnails 5 thumbnails 10 thumbnails 59% 64% 69% 71% 1% MethodTrue Positive rateFalse Positive rate 1 - Histogram matching 80%65% MethodTrue Positive rateFalse Positive rate 1 - Histogram matching 80%65% 2 - Local features matching 50%1% 17

Impact on network performance ~44% ~60% load True Positive rate: ~70%; 50% similar images 18

Overhead of generating thumbnails <10% of the link capacity Link capacity: 6 Mbps 19

Conclusions Framework for detection of similar images when uncoordinated set of clients uploading to common server Leverage, but intelligently combine, many state-of-the-art vision algorithms to effectively detect similar images Experiments on phone testbed (and using ns3 simulations) to demonstrate impact on increasing network performance Future work: Leverage device features (GPS location, camera orientation) Take into account image priority, e.g. resolution, coverage, etc. 20

Thank you! Tuan Dao -