| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996466252203316 |
|
|
Titolo |
Discrete Geometry for Computer Imagery [[electronic resource] ] : 13th International Conference, DGCI 2006, Szeged, Hungary, October 25-27, 2006, Proceedings / / edited by Attila Kuba, László G. Nyúl, Kálmán Palágyi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2006.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 688 p.) |
|
|
|
|
|
|
Collana |
|
Image Processing, Computer Vision, Pattern Recognition, and Graphics ; ; 4245 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Application software |
Optical data processing |
Computer graphics |
Computer science—Mathematics |
Computer simulation |
Algorithms |
Computer Applications |
Image Processing and Computer Vision |
Computer Graphics |
Discrete Mathematics in Computer Science |
Simulation and Modeling |
Algorithm Analysis and Problem Complexity |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Discrete Geometry -- Duality and Geometry Straightness, Characterization and Envelope -- On Minimal Perimeter Polyminoes -- A Generic Approach for n-Dimensional Digital Lines -- Two Discrete-Euclidean Operations Based on the Scaling Transform -- Geometry of Neighborhood Sequences in Hexagonal Grid -- Recognition of Blurred Pieces of Discrete Planes -- Discrete Tomography -- The Number of Line-Convex Directed Polyominoes Having the Same Orthogonal Projections -- A Network Flow Algorithm for Binary Image |
|
|
|
|
|
|
|
|
|
|
Reconstruction from Few Projections -- Fast Filling Operations Used in the Reconstruction of Convex Lattice Sets -- Reconstruction Algorithm and Switching Graph for Two-Projection Tomography with Prohibited Subregion -- A Geometry Driven Reconstruction Algorithm for the Mojette Transform -- Quantised Angular Momentum Vectors and Projection Angle Distributions for Discrete Radon Transformations -- A Benchmark Evaluation of Large-Scale Optimization Approaches to Binary Tomography -- Construction of Switching Components -- Discrete Topology -- Minimal Non-simple and Minimal Non-cosimple Sets in Binary Images on Cell Complexes -- Combinatorial Relations for Digital Pictures -- Reusing Integer Homology Information of Binary Digital Images -- On the Lattice Structure of Subsets of Octagonal Neighborhood Sequences in ?n -- On the Connectedness of Rational Arithmetic Discrete Hyperplanes -- Homology of Simploidal Set -- Measuring Intrinsic Volumes in Digital 3d Images -- Distance -- An Objective Comparison Between Gray Weighted Distance Transforms and Weighted Distance Transforms on Curved Spaces -- Chordal Axis on Weighted Distance Transforms -- Attention-Based Mesh Simplification Using Distance Transforms -- Generating Distance Maps with Neighbourhood Sequences -- Hierarchical Chamfer Matching Based on Propagation of Gradient Strengths -- Elliptical Distance Transforms and Applications -- Image Analysis -- A Composite and Quasi Linear Time Method for Digital Plane Recognition -- Fusion Graphs, Region Merging and Watersheds -- Revisiting Digital Straight Segment Recognition -- On Discrete Moments of Unbounded Order -- Feature Based Defuzzification in ?2 and ?3 Using a Scale Space Approach -- Improving Difference Operators by Local Feature Detection -- Shape Representation -- An Optimal Algorithm for Detecting Pseudo-squares -- Optimization Schemes for the Reversible Discrete Volume Polyhedrization Using Marching Cubes Simplification -- Arithmetic Discrete Hyperspheres and Separatingness -- The Eccentricity Transform (of a Digital Shape) -- Projected Area Based 3D Shape Similarity Evaluation -- Continuous Level of Detail on Graphics Hardware -- Topological and Geometrical Reconstruction of Complex Objects on Irregular Isothetic Grids -- Fast Polynomial Segmentation of Digitized Curves -- Segmentation -- Fuzzy Segmentation of Color Video Shots -- Application of Surface Topological Segmentation to Seismic Imaging -- Watershed Segmentation with Chamfer Metric -- Generalized Map Pyramid for Multi-level 3D Image Segmentation -- Topologically Correct Image Segmentation Using Alpha Shapes -- Skeletonization -- New Removal Operators for Surface Skeletonization -- Skeleton Pruning by Contour Partitioning -- A New 3D Parallel Thinning Scheme Based on Critical Kernels -- Order Independence in Binary 2D Homotopic Thinning -- Exact Euclidean Medial Axis in Higher Resolution -- Skeletonization and Distance Transforms of 3D Volumes Using Graphics Hardware -- Surfaces and Volumes -- How to Tile by Dominoes the Boundary of a Polycube -- A Generalized Preimage for the Standard and Supercover Digital Hyperplane Recognition -- Distance Transforms on Anisotropic Surfaces for Surface Roughness Measurement -- A 3D Live-Wire Segmentation Method for Volume Images Using Haptic Interaction -- Minimal Decomposition of a Digital Surface into Digital Plane Segments Is NP-Hard -- Erratum -- Topological and Geometrical Reconstruction of Complex Objects on Irregular Isothetic Grids. |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910645892603321 |
|
|
Autore |
Meng Yan |
|
|
Titolo |
Security in Smart Home Networks / / by Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (177 pages) |
|
|
|
|
|
|
Collana |
|
Wireless Networks, , 2366-1445 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Computer networks |
Data protection |
Computational intelligence |
Communications Engineering, Networks |
Computer Communication Networks |
Data and Information Security |
Computational Intelligence |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Era of Smart Home -- Smart Home Network Architectures -- Security and Privacy Challenges in Smart Home -- Security Challenges and Requirements of Smart Home -- Mobile Device Layer: Privacy Breaches and Countermeasures -- Voice Interface Layer: Liveness Detections against Voice Spoofing -- Application Platform Layer: Anomaly Detection via Wireless Traffic Analysis -- Conclusion on Security and Privacy in Smart Home -- Conclusion. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the |
|
|
|
|
|
|
|
|
|
|
application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home’s security and privacy issues. |
|
|
|
|
|
| |