LEADER 01392nam--2200421---450- 001 990000618100203316 005 20050715165425.0 035 $a0061810 035 $aUSA010061810 035 $a(ALEPH)000061810USA01 035 $a0061810 100 $a20010910d1995----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $a<> teatro del re$esaggio sui drammi storico-politici di Shakespeare$fFernando Ferrara 210 $aBari$cAdriatica$d1995 215 $a348 p.$d22 cm 225 2 $aBibliteca di studi inglesi$v61 410 $12001$aBibliteca di studi inglesi$v61 461 1$1001-------$12001 606 0 $aShakespeare, William$xDrammi storici 606 0 $aShakespeare, William$xDrammi politici 676 $a822.33 700 1$aFERRARA,$bFernando$0169288 801 0$aIT$bsalbc$gISBD 912 $a990000618100203316 951 $aVII.3. Coll.10/ 54(II i C COLL 40/61)$b128651 LM$cIIi C COLL 951 $aVII.3. Coll.10/ 54a(IIi C COLL 40/61 BIS)$b128652 LM$cIIi C COLL 951 $aVII.3. Coll.10/ 54b(IIi C COLL 40/61 A)$b128653 LM$cIIi C COLL 959 $aBK 969 $aUMA 979 $aPATTY$b90$c20010910$lUSA01$h1646 979 $c20020403$lUSA01$h1711 979 $aPATRY$b90$c20040406$lUSA01$h1643 979 $aCOPAT5$b90$c20050715$lUSA01$h1654 996 $aTeatro del re$9956838 997 $aUNISA LEADER 01152nam--2200373---450 001 990000669010203316 005 20201203102833.0 010 $a88-11-69303-9 035 $a0066901 035 $aUSA010066901 035 $a(ALEPH)000066901USA01 035 $a0066901 100 $a20011005d1991----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aMiti e utopie della scoperta$eCristoforo Colombo e il suo tempo$fJuan Gil$g[traduzione dallo spagnolo di Michela Finassi Pardo] 210 $aMilano$cGarzanti$d1991 215 $a315 p.$d22 cm 225 2 $aCollezione storica 312 $aMitos y utopias del descubrimiento 410 $12001$aCollezione storica 454 1$12001$aMitos y utopias del descubrimiento$935465 606 0 $aColombo,$bCristoforo 676 $a970.015092 700 1$aGIL,$bJuan$065749 702 1$aFINASSI PARDO,$bMichela 801 0$aIT$bsalbc$gISBD 912 $a990000669010203316 951 $aX.2.B. 458(III A COLL 192/11)$b110466 L.M.$cIII A COLL 959 $aBK 969 $aUMA 996 $aMitos y utopias del descubrimiento$935465 997 $aUNISA LEADER 05799nam 2200721Ia 450 001 9910453831303321 005 20200520144314.0 010 $a1-281-96830-7 010 $a9786611968304 010 $a981-283-268-8 035 $a(CKB)1000000000551208 035 $a(EBL)1193352 035 $a(SSID)ssj0000304661 035 $a(PQKBManifestationID)12115381 035 $a(PQKBTitleCode)TC0000304661 035 $a(PQKBWorkID)10284551 035 $a(PQKB)10775764 035 $a(MiAaPQ)EBC1193352 035 $a(WSP)00000389 035 $a(Au-PeEL)EBL1193352 035 $a(CaPaEBR)ebr10688036 035 $a(CaONFJC)MIL196830 035 $a(OCoLC)318879598 035 $a(EXLCZ)991000000000551208 100 $a20080404d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNumerical simulation of waves and fronts in inhomogeneous solids$b[electronic resource] /$fArkadi Berezovski, Juri Engelbrecht, Gerard A Maugin 210 $aHackensack, NJ $cWorld Scientific$dc2008 215 $a1 online resource (236 p.) 225 1 $aWorld Scientific series on nonlinear science,$xSeries A Monographs and treatises ;$vv. 62 300 $aDescription based upon print version of record. 311 $a981-283-267-X 320 $aIncludes bibliographical references (p. 209-219) and index. 327 $aPreface; Contents; 1. Introduction; 1.1 Waves and fronts; 1.2 True and quasi-inhomogeneities; 1.3 Driving force and the corresponding dissipation; 1.4 Example of a straight brittle crack; 1.5 Example of a phase-transition front; 1.6 Numerical simulations of moving discontinuities; 1.7 Outline of the book; 2. Material Inhomogeneities in Thermomechanics; 2.1 Kinematics; 2.2 Integral balance laws; 2.3 Localization and jump relations; 2.3.1 Local balance laws; 2.3.2 Jump relations; 2.3.3 Constitutive relations; 2.4 True and quasi-material inhomogeneities; 2.4.1 Balance of pseudomomentum 327 $a2.5 Brittle fracture2.5.1 Straight brittle crack; 2.6 Phase-transition fronts; 2.6.1 Jump relations; 2.6.2 Driving force; 2.7 On the exploitation of Eshelby's stress in isothermal and adiabatic conditions; 2.7.1 Driving force at singular surface in adiabatic conditions; 2.7.2 Another approach to the driving force; 2.8 Concluding remarks; 3. Local Phase Equilibrium and Jump Relations at Moving Discontinuities; 3.1 Intrinsic stability of simple systems; 3.2 Local phase equilibrium; 3.2.1 Classical equilibrium conditions; 3.2.2 Local equilibrium jump relations; 3.3 Non-equilibrium states 327 $a3.4 Local equilibrium jump relations at discontinuity3.5 Excess quantities at a moving discontinuity; 3.6 Velocity of moving discontinuity; 3.7 Concluding remarks; 4. Linear Thermoelasticity; 4.1 Local balance laws; 4.2 Balance of pseudomomentum; 4.3 Jump relations; 4.4 Wave-propagation algorithm: an example of finite volume methods; 4.4.1 One-dimensional elasticity; 4.4.2 Averaged quantities; 4.4.3 Numerical fluxes; 4.4.4 Second order corrections; 4.4.5 Conservative wave propagation algorithm; 4.5 Local equilibrium approximation; 4.5.1 Excess quantities and numerical fluxes 327 $a4.5.2 Riemann problem4.5.3 Excess quantities at the boundaries between cells; 4.6 Concluding remarks; 5. Wave Propagation in Inhomogeneous Solids; 5.1 Governing equations; 5.2 One-dimensional waves in periodic media; 5.3 One-dimensional weakly nonlinear waves in periodic media; 5.4 One-dimensional linear waves in laminates; 5.5 Nonlinear elastic wave in laminates under impact loading; 5.5.1 Problem formulation; 5.5.2 Comparison with experimental data; 5.5.3 Discussion of results; 5.6 Waves in functionally graded materials; 5.7 Concluding remarks 327 $a6. Macroscopic Dynamics of Phase-Transition Fronts6.1 Isothermal impact-induced front propagation; 6.1.1 Uniaxial motion of a slab; 6.1.2 Excess quantities in the bulk; 6.1.3 Excess quantities at the phase boundary; 6.1.4 Initiation criterion for the stress-induced phase transformation; 6.1.5 Velocity of the phase boundary; 6.2 Numerical simulations; 6.2.1 Algorithm description; 6.2.2 Comparison with experimental data; 6.3 Interaction of a plane wave with phase boundary; 6.3.1 Pseudoelastic behavior; 6.4 One-dimensional adiabatic fronts in a bar; 6.4.1 Formulation of the problem 327 $a6.4.2 Adiabatic approximation 330 $aThis book shows the advanced methods of numerical simulation of waves and fronts propagation in inhomogeneous solids and introduces related important ideas associated with the application of numerical methods for these problems. Great care has been taken throughout the book to seek a balance between the thermomechanical analysis and numerical techniques. It is suitable for advanced undergraduate and graduate courses in continuum mechanics and engineering. Necessary prerequisites for this text are basic continuum mechanics and thermodynamics. Some elementary knowledge of numerical methods for p 410 0$aWorld Scientific series on nonlinear science.$nSeries A,$pMonographs and treatises ;$vv. 62. 606 $aElastic solids 606 $aInhomogeneous materials 606 $aWave-motion, Theory of 608 $aElectronic books. 615 0$aElastic solids. 615 0$aInhomogeneous materials. 615 0$aWave-motion, Theory of. 676 $a530.4/12 700 $aBerezovski$b Arkadi$0867442 701 $aEngelbrecht$b Juri$0344257 701 $aMaugin$b G. A$g(Gerard A.),$f1944-$031842 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453831303321 996 $aNumerical simulation of waves and fronts in inhomogeneous solids$91936165 997 $aUNINA LEADER 01248nam a2200277 i 4500 001 991002173119707536 008 070222s1992 sz ita d 020 $a8885115608 035 $ab13486834-39ule_inst 040 $aDip.to Filologia Class. e Scienze Filosofiche$bita 100 1 $aCodiroli, Pierre$0156431 245 00$aTra fascio e balestra :$bun'acerba contesa culturale (1941-1945) /$cPierre Codiroli ; presentazione di Arturo Colombo 260 $aLocarno :$bDadò,$c1992 300 $a151 p., [16] p. di tav. :$bill. ;$c25 cm 490 0 $aL'officina : nuove ricerche sulla Svizzera italiana ;$v7 500 $aFonti archivistiche. Bibliografia: p. 137-146 600 14$aAngioletti, Giovanni Battista 610 04$aCircolo italiano di lettura (Lugano)$xStoria 630 04$aSvizzera italiana (Periodico)$yStoria (1941-1945) 651 4$aItalia$xRelazioni con la Svizzera$yStoria (1941-1945) 907 $a.b13486834$b02-04-14$c22-02-07 912 $a991002173119707536 945 $aLE007 945 COD 01.01$g1$i2007000115596$lle007$nLE007 2007 Cavallera$op$pE26.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i1437593x$z22-02-07 996 $aTra fascio e balestra$91096238 997 $aUNISALENTO 998 $ale007$b22-02-07$cm$da $e-$fita$gsz $h0$i0 LEADER 01152nam a22002773i 4500 001 991000705599707536 005 20040127143224.0 008 040220s1982 it a||||||||||||||||ita 035 $ab12658157-39ule_inst 035 $aARCHE-065649$9ExL 040 $aDip.to Scienze pedagogiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a372 100 1 $aDetti, Ermanno$0466530 245 13$aIl giornalino scolastico in Italia :$bresoconto e analisi di un'esperienza /$cErmanno Detti, Mario Di Rienzo, Teresa Vergalli 260 $aTeramo :$bGiunti & Lisciani,$c1982 300 $a199 p. :$bill. ;$c21 cm 440 0$aEducazione nuova 650 4$aGiornalini di classe$xScuola elementare 700 1 $aVergalli, Teresa 700 1 $aDi Rienzo, Mario$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0303454 907 $a.b12658157$b02-04-14$c17-03-04 912 $a991000705599707536 945 $aLE022 MP 69 H 17$g1$i2022000052931$lle022$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13164880$z17-03-04 996 $aGiornalino scolastico in Italia$91446974 997 $aUNISALENTO 998 $ale022$b17-03-04$cm$da $e-$fita$git $h3$i1 LEADER 01990oam 2200577M 450 001 9910716189403321 005 20200213070901.1 035 $a(CKB)5470000002518217 035 $a(OCoLC)1065590801 035 $a(OCoLC)995470000002518217 035 $a(EXLCZ)995470000002518217 100 $a20071213d1926 ua 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMarking of red clover and alfalfa seed. March 27 (calendar day, March 30), 1926. -- Ordered to be printed 210 1$a[Washington, D.C.] :$c[U.S. Government Printing Office],$d1926. 215 $a1 online resource (3 pages) 225 1 $aSenate report / 69th Congress, 1st session. Senate ;$vno. 500 225 1 $a[United States congressional serial set ] ;$v[serial no. 8525] 300 $aBatch processed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aFDLP item number not assigned. 517 $aMarking of red clover and alfalfa seed. March 27 606 $aAgricultural laws and legislation 606 $aAgriculture 606 $aForeign trade promotion 606 $aForeign trade and employment 606 $aImports 606 $aLabels 606 $aSeeds 608 $aLegislative materials.$2lcgft 615 0$aAgricultural laws and legislation. 615 0$aAgriculture. 615 0$aForeign trade promotion. 615 0$aForeign trade and employment. 615 0$aImports. 615 0$aLabels. 615 0$aSeeds. 701 $aGooding$b Frank Robert$f1859-1928$pRepublican (ID)$01389127 801 0$bWYU 801 1$bWYU 801 2$bOCLCO 801 2$bOCLCQ 801 2$bOCLCO 801 2$bOCLCQ 906 $aBOOK 912 $a9910716189403321 996 $aMarking of red clover and alfalfa seed. March 27 (calendar day, March 30), 1926. -- Ordered to be printed$93484452 997 $aUNINA LEADER 08396nam 2200517 450 001 9910830058003321 005 20221216134215.0 010 $a1-119-98739-3 010 $a1-394-15038-5 024 7 $a10.1002/9781119987390 035 $a(MiAaPQ)EBC7001295 035 $a(Au-PeEL)EBL7001295 035 $a(CKB)22895132600041 035 $a(OCoLC)1328576927 035 $a(OCoLC-P)1328576927 035 $a(CaSebORM)9781789450279 035 $a(EXLCZ)9922895132600041 100 $a20221216d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aMultimedia security 2 $ebiometrics, video surveillance and multimedia encryption /$fedited by William Puech 210 1$aHoboken, New Jersey :$cJohn Wiley & Sons,$d[2022] 210 4$d©2022 215 $a1 online resource (320 pages) 225 0 $aSciences. image. compression, coding and protection of images and videos 311 08$aPrint version: Puech, William Multimedia Security 2 Newark : John Wiley & Sons, Incorporated,c2022 9781789450279 320 $aIncludes bibliographical references and index. 327 $aCover -- Half-Title Page -- Title Page -- Copyright Page -- Contents -- Foreword by Gildas Avoine -- Foreword by Cédric Richard -- Preface -- Chapter 1. Biometrics and Applications -- 1.1. Introduction -- 1.2. History of biometrics -- 1.3. The foundations of biometrics -- 1.3.1. Uses of biometrics -- 1.3.2. Definitions -- 1.3.3. Biometric modalities -- 1.4. Scientific issues -- 1.4.1. Presentation attacks -- 1.4.2. Acquisition of new biometric data or hidden biometrics -- 1.4.3. Quality of biometric data -- 1.4.4. Efficient representation of biometric data -- 1.4.5. Protecting biometric data -- 1.4.6. Aging biometric data -- 1.5. Conclusion -- 1.6. References -- Chapter 2. Protecting Documents Using Printed Anticopy Elements -- 2.1. Introduction -- 2.2. Document authentication approaches: an overview -- 2.3. Print test shapes -- 2.3.1. Print test signatures -- 2.3.2. Glyphs -- 2.3.3. Guilloches -- 2.4. Copy-sensitive graphical codes -- 2.4.1. Copy detection pattern -- 2.4.2. Two-level barcodes -- 2.4.3. Watermarked barcodes -- 2.4.4. Performance of CSGC authentication -- 2.5. Conclusion -- 2.6. References -- Chapter 3. Verifying Document Integrity -- 3.1. Introduction -- 3.2. Fraudulent manipulation of document images -- 3.2.1. Imitation -- 3.2.2. Copy-and-paste of a region from the same document -- 3.2.3. Copy-and-paste of a region from another document -- 3.2.4. Deleting information -- 3.3. Degradation in printed and re-scanned documents -- 3.3.1. Degradations linked to the print process -- 3.3.2. Degradations linked to scanning -- 3.3.3. Degradation models -- 3.4. Active approaches: protection by extrinsic fingerprints -- 3.4.1. Watermarking a document -- 3.4.2. Digital signatures -- 3.5. Passive approaches: detecting intrinsic characteristics -- 3.5.1. Printer identification -- 3.5.2. Detecting graphical clues -- 3.5.3. Other approaches. 327 $a3.6. Conclusion -- 3.7. References -- Chapter 4. Image Crypto-Compression -- 4.1. Introduction -- 4.2. Preliminary notions -- 4.2.1. The JPEG image format -- 4.2.2. Introduction to cryptography -- 4.3. Image encryption -- 4.3.1. Naive methods -- 4.3.2. Chaos-based methods -- 4.3.3. Encryption-then-compression -- 4.4. Different classes of crypto-compression for images -- 4.4.1. Substitution-based crypto-compression -- 4.4.2. Shuffle-based crypto-compression -- 4.4.3. Hybrid crypto-compression -- 4.5. Recompressing crypto-compressed JPEG images -- 4.5.1. A crypto-compression approach robust to recompression -- 4.5.2. Recompression of a crypto-compressed image -- 4.5.3. Decoding a recompressed version of a crypto-compressed JPEG image -- 4.5.4. Illustration of the method -- 4.6. Conclusion -- 4.7. References -- Chapter 5. Crypto-Compression of Videos -- 5.1. Introduction -- 5.1.1. Background -- 5.1.2. Video compression -- 5.1.3. Video security -- 5.2. State of the art -- 5.2.1. Naive encryption -- 5.2.2. Partial encryption -- 5.2.3. Perceptual encryption -- 5.2.4. Crypto-compression methods -- 5.2.5. Selective encryption methods -- 5.3. Format-compliant selective encryption -- 5.3.1. Properties -- 5.3.2. Constant bitrate format compliant selective encryption -- 5.3.3. Standardized selective encryption -- 5.3.4. Locally applied selective encryption -- 5.3.5. Decrypting selective encryption -- 5.4. Image and video quality -- 5.4.1. Experiments on encryption solutions -- 5.4.2. Video quality: experimental results -- 5.4.3. CSE: a complete real-time solution -- 5.5. Perspectives and directions for future research -- 5.5.1. Versatile Video Coding -- 5.5.2. Immersive and omnidirectinal video -- 5.6. Conclusion -- 5.7. References -- Chapter 6. Processing Encrypted Multimedia Data Using Homomorphic Encryption -- 6.1. Context. 327 $a6.2. Different classes of homomorphic encryption systems -- 6.2.1. Partial solutions in classic cryptography -- 6.2.2. Complete solutions in cryptography using Euclidean networks -- 6.3. From theory to practice -- 6.3.1. Algorithmics -- 6.3.2. Implementation and optimization -- 6.3.3. Managing and reducing the size of encrypted elements -- 6.3.4. Security -- 6.4. Proofs of concept and applications -- 6.4.1. Facial recognition -- 6.4.2. Classification -- 6.4.3. RLE and image compression -- 6.5. Conclusion -- 6.6. Acknowledgments -- 6.7. References -- Chapter 7. Data Hiding in the Encrypted Domain -- 7.1. Introduction: processing multimedia data in the encrypted domain -- 7.1.1. Applications: visual secret sharing -- 7.1.2. Applications: searching and indexing in encrypted image databases -- 7.1.3. Applications: data hiding in the encrypted domain -- 7.2. Main aims -- 7.2.1. Digital rights management -- 7.2.2. Cloud storage -- 7.2.3. Preserving patient confidentiality -- 7.2.4. Classified data -- 7.2.5. Journalism -- 7.2.6. Video surveillance -- 7.2.7. Data analysis -- 7.3. Classes and characteristics -- 7.3.1. Properties -- 7.3.2. Classic approaches to encryption -- 7.3.3. Evaluation criteria -- 7.4. Principal methods -- 7.4.1. Image partitioning -- 7.4.2. Histogram shifting -- 7.4.3. Encoding -- 7.4.4. Prediction -- 7.4.5. Public key encryption -- 7.5. Comparison and discussion -- 7.6. A high-capacity data hiding approach based on MSB prediction -- 7.6.1. General description of the method -- 7.6.2. The CPE-HCRDH approach -- 7.6.3. The EPE-HCRDH approach -- 7.6.4. Experimental results for both approaches -- 7.7. Conclusion -- 7.8. References -- Chapter 8. Sharing Secret Images and 3D Objects -- 8.1. Introduction -- 8.2. Secret sharing -- 8.2.1. Classic methods -- 8.2.2. Hierarchical aspects -- 8.3. Secret image sharing -- 8.3.1. Principle. 327 $a8.3.2. Visual cryptography -- 8.3.3. Secret image sharing (polynomial-based) -- 8.3.4. Properties -- 8.4. 3D object sharing -- 8.4.1. Principle -- 8.4.2. Methods without format preservation -- 8.4.3. Methods with format preservation -- 8.5. Applications for social media -- 8.6. Conclusion -- 8.7. References -- List of Authors -- Index -- EULA. 330 $aToday, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing. 606 $aMultimedia systems$xSecurity measures 615 0$aMultimedia systems$xSecurity measures. 676 $a006.7 702 $aPuech$b William 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830058003321 996 $aMultimedia security 2$94087625 997 $aUNINA