rutgers - cimc automatic manifestation of composite multimedia objects ahmed gomaa nabil adam vijay...

Post on 21-Dec-2015

225 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Rutgers - CIMC

Automatic Manifestation of Composite Multimedia Objects

Ahmed Gomaa

Nabil Adam

Vijay Atluri

Rutgers - CIMC 2

Outline• Motivating Example

• Introduction to CMO

• Types of constraints

• Universal Access

• Framework

– CMO specification

– Petri net layer

• MMCTPN

– SMIL layer

• Demo

• User Interaction

• Related work

• Future Work

Rutgers - CIMC 3

Current Situation

• What to do to select your business location?

Currently available on NJ commerce commission and partners sites

Rutgers - CIMC 4

Current Situation

• Easy to get lost between the different links.

•Inserts the profile several times because dealing with different web sites ( state /realtors).

Rutgers - CIMC 5

Composite multimedia Object (CMO)

Rutgers - CIMC 6

Composite multimedia Object (CMO)

– Comprised of different media component such as text, image, video, audio, shape files,...

– Variety of relationships among components.

– different types of constraints that must be adhered to when rendering it.

• (e.g., Fidelity >= 640*480).

– Associated with each component is a set of parameters.

• (e.g., Fidelity = 800*600).

Rutgers - CIMC 7

Types of Constraints

• Synchronization constraints– Map must appears in sync.with

Text 1

• Fidelity Constraints– Map must be displayed at a

resolution of at least 640*480

• Spatial Constraints– Fly by is above Text

• Security Constraints– Sales representative audio and

video are accessed by subscribers only.

Rutgers - CIMC 8

CMO

Over Any Network

To Any One with varying expertise, capabilities, and preferences

To Any Device

Universal Access

• Need to facilitate access to desired CMO according to the various user’s:

• Capabilities ( e.g, devices)

• Characteristics (e.g, expertise)

• Credentials (e.g, subscribers)

• When a subject requests a CMO, he may not be able to view the entire CMO.

– For example, due to the limitations of his appliances, or due to lack of his credentials to satisfy the security requirements.

Rutgers - CIMC 9

Framework• CMO layer

– Comprises of the formal specification of the CMO, such that specifying each components in the CMO along with its associated constraints.

• Petri Net layer

– Formal model that can describe,visualize and validate the CMO constraints.

– Conceptual tool .

• SMIL layer– Implementation and automatic

rendering purpose.

Rutgers - CIMC 10

CMO specification

• CMO = ({c 1 ...,c n}, S ):

– Each c i is component of CMO

– S is a set of synchronization,spatial,fidelity, and security constraints.

• Each component c i in turn,is a tuple c =(ml,fd,pd):

– ml represents the modality– fd represents the fidelity– pd represents the playback duration

Rutgers - CIMC 11

Constraints• Synchronization Constraints

– We only need 3 from the 7

temporal relations

– Meets: video meets image

– Sync: video sync text

Before:

video imagevideo image

video

text

video1 video2

Rutgers - CIMC 12

Constraints

• Fidelity Constraints

– A set of fidelity constraints for modality ml .

– FD (ml )is set of fidelity ranges fd

– for example >= 640 * 480 is to specify that the

resolution be at least 640 *480 to view the object.

• Spatial Constraints– Where to place the components on the screen

Rutgers - CIMC 13

Constraints

• Security Constraints

• Let CR = {cr 1, cr 2 ... }denote the set of all distinct

credentials relevant to the multimedia object.

• Each subject S possesses set of credentials denoted

as s CR

• A security constraint can be:

– (1)Each component c i of the multimedia object

is associated with set of credentials,denoted c i CR

.

– (2)A set of components (c i c j ,...)is associated

with a set of credentials,denoted (c i c j ,...)CR .

• E.g., video2 ( v2) need subscription credentials so,

C i CR = V 2 subscription

C i CR = V 2

subscription

Rutgers - CIMC 14

Petri net layer• Token• Place

– A marking is an arrangement of tokens in places, representing state

• Arc

– An arc connects a place and a transition

• Transition– Inter-object sync.

– A transition is enabled if there is at least one token at each of its input places

• Firing rule– the activity may take place if

transition enabled.

t1

t0

p0

t2

p1 p2

p3 p4

Rutgers - CIMC 15

Colored Petri Nets (CPN)

Before firing:

After firing with substitution {a|x, b|y, c|z}:

Execution

1. p1 loses 2 tokens of x;2. p2 loses <x,y> and <y,z>;3. p3 gets <x, z>;4. p4 get e (constant).

Initial marking:

1. p1 has 4 tokens, 2 a’s and 2 d’s;

2. p2 has 6 tokens, <a,b>, <b,c>, <d,a>;

3. p3 and p4 has no tokens.

Rutgers - CIMC 16

MMCTPN Model for a CMO plan

• MMCTPN (Multimedia color-time Petri-Net) consists of

– Color-time Petri-Net

– Tokens: Color sets that represent:• Types of Fidelity (e.g.,the resolution of the MM component)

– Absence of fidelity capabilities is represented as Holes

• Types of credentials (e.g., credentials for researchers)– Absence of credentials of the subject requesting the object is represented as Holes

• Types of Modality (e.g., image, video,text, audio)– Absence of modality capabilities is represented as Holes

– Places:• Includes the length of time the multimedia component is played.

• A color set that is needed to activate/ play the component.

• Null place in each subMMCTPN (A part of the net between two subsequent transitions)

Rutgers - CIMC 17

MMCTPN

• Credentials and capabilities are represented as tokens and absence of them are represented as holes.

• Author rules are represented as doted holes.

• The initial place is marked with these tokens to start with.

• Tokens are said to be available if it remains in a place for their specified duration.

• Transitions are enabled once any token or hole are available in all input places.

tt

Before FiringPa , dur:10Pa , dur:10 Pb , dur:15Pb , dur:15

After Firing

Pa , dur:10Pa , dur:10 Pb , dur:15Pb , dur:15

t = 0t = 0

Rutgers - CIMC 18

MMCTPN – Object Manifestation

 

 

 

  

Dur = 10 S

AA CC

 

Dur = 0 S

BB

Rutgers - CIMC 19

P2

P1

Ps Pf

P5

P3

null

P9

P6

null

P4

P8

P7

null

<or,gy,br> dur :40s

<all> dur :40s

<bl,gy,br> dur :40s

<re,bc,br> dur :15s <ye,bc,br> dur :10s

<bl,wh,pp> dur :15s

<all> dur :15s

<bl,wh,pp> dur :15s

<gr,br,aq> dur :15s

<re,gy,br,aq> dur :15s

<bl,wh,br> dur :15s

<all> dur :15s

CMO Plan

Rutgers - CIMC 20

MMCTPN execution

<or,gy,br> dur :40s

P2

P1

Ps Pf

P5

P3

null

P9

P6

null

P4

P8

P7

null

<all> dur :40s

<bl,gy,br> dur :40s

<re,bc,br> dur :15s <ye,bc,br> dur :10s

<bl,wh,pp> dur :15s

<all> dur :15s

<bl,wh,pp> dur :15s

<gr,br,aq> dur :15s

<re,gy,br,aq> dur :15s

<bl,wh,br> dur :15s

<all> dur :15s

Rutgers - CIMC 21

Modified CMO Plan

P2

Ps Pf

P5

null

P9

P6

null

P4

null

<all> dur :40s

<bl,gy,br> dur :40s

<ye,bc,br> dur :10s

<bl,wh,pp> dur :15s

<all> dur :15s

<bl,wh,pp> dur :15s

<gr,br,aq> dur :15s

<bl,wh,br> dur :15s

<all> dur :15s

Rutgers - CIMC 22

Petri Net To SMIL

Equals ( SYNC):

<par dur="30s">

<img id="foo" src="a.jpg"/>

<text  src="text.html" />  

<audio src="audio.au" />

</par>

|------------| image

|------------| text

|------------| Audio

30s

After ( Before):

<seq>

<img src="a.gif" dur="6s" />

<img src="b.gif" dur="4s" begin="1s" />

</seq>

|----------|

6 sec |---------|

4sec

|--------------------------|

11 seconds

Rutgers - CIMC 23

SMIL layer

• SMIL-based rich multimedia presentations integrate several types of media.

• SMIL is XML-based, thus flexible and extensible.

• SMIL is W3C supported, thus enjoys cross industry support.

• SMIL is supported by readily available tools and parsers.

Rutgers - CIMC 24

Demo

http://cimic.rutgers.edu/~ahgomaa/ua/presentations/demo3/egov.smil

http://cimic.rutgers.edu/~ahgomaa/ua/presentations/demo3/egov-adj.smil

Rutgers - CIMC 25

SMIL 2.0 Implementation

we have adopted the security model and the language (XACL) in specifying the security constraints on the multimedia object. We have used the XACL visual tool,tool from IBM XML Security Suite.

Rutgers - CIMC 26

Incorporating User interactivity

• Identify and model the different types of user interactions.

• Make sure that different constraints are still valid.

• Visualize and analyze the effect of the user interaction on different constraints.

Rutgers - CIMC 27

User interaction categories• Temporal Interaction:

– continuous component, ( ex. video )• ''play'', '‘fast forward''

– non-continuous component(ex. image) • "begin", "end", "pause".

• Spatial interaction:• "move “, "Zoom" ,” maximize”, "change font".

• Undo – Redo

• The user may want to interact with the CMO as one object, e.g., pause , begin,…

Rutgers - CIMC 28

User Interaction example

• If a user wants to stop the fly by video, what will be the effect on the following text? (rendering)

– Appear immediately after stop.

– Appear after a defined amount of time.

• If a user wants to maximize the map, what will be the effect on rendering the following image? ( conflict)

– Rendered behind the map.

– Rendered after another action.

• The CMO author need to:

– Visualize

– Analyze

Rutgers - CIMC 29

User Interaction Problems

How to model different types of user interaction on the composite multimedia object plan?

How can the author visualize and analyze the impact of potential user interaction on the rendering of the CMO?

How to detect potential conflicts between different types of constraints?

How to resolve different conflicts between constraints?

Rutgers - CIMC 30

CMO constraints Uniform Model

Conflict resolution

PETRI-NET Modeling for validation

and analysis

Implementation with

user/web friendly with flexibility

and interoperability (SMIL 2.0)

Rutgers - CIMC 31

Related Work

• Multimedia object rendering

• Security

• User interaction

Rutgers - CIMC 32

Related Work

Multimedia Object Rendering:• Adam and Atluri et al.(2001) Presented the Universal Access

problem and the Oblet approach. – Uses Petri Net to present temporal, spatial, modality and fidelity

constraints.

• Bertino et al.(2000) present a system called MPGS - Multimedia Presentation Generator System.– Enables specification of synchronization and spatial constraints

– Capable of analyzing the consistency among these two types of constraints.

None of those papers addressed the security constraints in a CMO

Rutgers - CIMC 33

Related Work

Security:• Damiani et al.(2000),Bertino et Al.(2000) and Kudo et al (2000) addressed

access control models in XML.

• We adopted Kudo et al. approach in presenting a new Petri Net model that incorporate the security constraints in the CMO.

Rutgers - CIMC 34

Related WorkUser interaction:• User interaction research within CMO may be divided into three categories:

– Formal modeling

– Programming approach

– Statistical techniques

• Formal modeling, using Petri net :

– Song et al.(1996) presented Timed Petri Net (TPN).

– Guan et al. (1998) presented a distributed object composition Petri net (DOCPN).

– Prabhakaran et al.(1993) presented a dynamic timed Petri nets (DTPN) model.

– All models are restrictive in types of interactions.

– They only deal with the synchronization constraints.

Rutgers - CIMC 35

Related Work• Programming approach

– Partially support user interactions for online CMO.

– LimSee(2002), Grins (2002), Yang (2001).

– All of which based on time line events

– which leads to dead times if the CMO is adaptable.

• Statistical techniques

– Predict online user interactions

– Hollfelder et al. (2000) where they model the user behavior as a Continuous Time Markov chain (CTMC).

– Boll et al.(2001) implementing adaptive streaming of MPEG videos for interactive internet applications to support jumping to bookmarks within the MPEG

Rutgers - CIMC 36

Future Work

• Enforcing Security Constraints.• Secure the plan on the client side ( certificates, relational

transducer).

• Allowing User Interaction.

• Conflict Identification and Resolution Strategy.

top related