top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 307 p. 44 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Application software
Management information systems
Computer science
Data encryption (Computer science)
Computers and civilization
Computer Communication Networks
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Cryptology
Computers and Society
ISBN 3-319-17199-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Accountability in the Cloud -- Accountability for Data Governance in the Cloud -- Security in the Cloud -- On the Adoption of Security SLAs in the Cloud -- A Certification Framework for Cloud Security Properties: The Monitoring Path -- Privacy and Transparency in the Cloud -- HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains -- Privacy-Preserving Identity Management as a Service -- Empirical Approaches for the Cloud -- Metrics for Accountability in the Cloud -- Models for Cloud Risk Assessment: A Tutorial -- Agent-Based Evidence Collection in Cloud Computing -- Socio-Legal Aspects of the Cloud.-Understanding the Cloud: The Social Implications of Cloud Computing and the Need for Accountability -- Legal Aspects of Cloud Accountability -- Definition of Data Sharing Agreements -- Cloud Standards -- Standards for Accountability in the Cloud -- Accountability Glossary of Terms and Definitions Cloud Accountability: Glossary of Terms and Definitions.
Record Nr. UNISA-996200343303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Accountability and Security in the Cloud : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Accountability and Security in the Cloud : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 307 p. 44 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer networks
Application software
Management information systems
Computer science
Data encryption (Computer science)
Computers and civilization
Computer Communication Networks
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Cryptology
Computers and Society
ISBN 3-319-17199-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Accountability in the Cloud -- Accountability for Data Governance in the Cloud -- Security in the Cloud -- On the Adoption of Security SLAs in the Cloud -- A Certification Framework for Cloud Security Properties: The Monitoring Path -- Privacy and Transparency in the Cloud -- HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains -- Privacy-Preserving Identity Management as a Service -- Empirical Approaches for the Cloud -- Metrics for Accountability in the Cloud -- Models for Cloud Risk Assessment: A Tutorial -- Agent-Based Evidence Collection in Cloud Computing -- Socio-Legal Aspects of the Cloud.-Understanding the Cloud: The Social Implications of Cloud Computing and the Need for Accountability -- Legal Aspects of Cloud Accountability -- Definition of Data Sharing Agreements -- Cloud Standards -- Standards for Accountability in the Cloud -- Accountability Glossary of Terms and Definitions Cloud Accountability: Glossary of Terms and Definitions.
Record Nr. UNINA-9910484059203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Ad Hoc Networks : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 366 p. 168 illus.)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Data protection
Cryptography
Data encryption (Computer science)
Algorithms
Computer Communication Networks
Data and Information Security
Cryptology
ISBN 3-642-36958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery.    .
Record Nr. UNINA-9910437573203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile and Wireless Networks : 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings / / edited by Pedro M. Ruiz, J. J. Garcia-Luna-Aceves
Ad-Hoc, Mobile and Wireless Networks : 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings / / edited by Pedro M. Ruiz, J. J. Garcia-Luna-Aceves
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (xiv, 404 pages) : illustrations
Disciplina 621.3821
Altri autori (Persone) Garcia-Luna-AcevesJ. J
RuízPedro M
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer networks
User interfaces (Computer systems)
Human-computer interaction
Cryptography
Data encryption (Computer science)
Data structures (Computer science)
Information theory
Electronic data processing - Management
Application software
Computer Communication Networks
User Interfaces and Human Computer Interaction
Cryptology
Data Structures and Information Theory
IT Operations
Computer and Information Systems Applications
ISBN 3-642-04383-6
Classificazione DAT 256f
ELT 745f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Regular Papers -- TCP over Multi-Hop Wireless Networks: The Impact of MAC Level Interactions -- Cooperative Signalling and Its Application in a Power-Controlled MAC Protocol -- Joint Source-Channel-Network Decoding and Blind Estimation of Correlated Sensors Using Concatenated Zigzag Codes -- Challenges for Routing and Search in Dynamic and Self-organizing Networks -- Routing Metric for Interference and Channel Diversity in Multi-Radio Wireless Mesh Networks -- Minimum Delay Data Gathering in Radio Networks -- Asymptotic Delay Analysis and Timeout-Based Admission Control for Ad Hoc Wireless Networks -- Statistical Properties of the Delivery Rate for Single-Sink and Multiple-Sink Sensor Networks -- Application-Driven Analytic Toolbox for WSNs -- A Diffusion Approximation Analysis of Multilevel Ad Hoc and Sensor Networks -- Localized Sensor Self-deployment with Coverage Guarantee in Complex Environment -- An Efficient and Scalable Address Autoconfiguration in Mobile Ad Hoc Networks -- Towards Fair Leader Election in Wireless Networks -- Auction Aggregation Protocols for Wireless Robot-Robot Coordination -- On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment -- Mobile Sinks for Information Retrieval from Cluster-Based WSN Islands -- Secure EPC Gen2 Compliant Radio Frequency Identification -- On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks -- SenSearch: GPS and Witness Assisted Tracking for Delay Tolerant Sensor Networks -- Monte Carlo Localization of Mobile Sensor Networks Using the Position Information of Neighbor Nodes -- Autonomous Transmission Power Adaptation for Multi-Radio Multi-Channel Wireless Mesh Networks -- A Decentralized Approach to Minimum-Energy Broadcasting in Static Ad Hoc Networks -- Heavily Reducing WSNs’ Energy Consumption by Employing Hardware-Based Compression -- Optimal and Fair Transmission Rate Allocation Problem in Multi-hop Cellular Networks -- Short Papers -- A Topology Management Routing Protocol for Mobile IP Support of Mobile Ad Hoc Networks -- Implementation and Comparison of AODV and OLSR Routing Protocols in an Ad-Hoc Network over Bluetooth -- Inside-Out OLSR Scalability Analysis -- Proximal Labeling for Oblivious Routing in Wireless Ad Hoc Networks -- Proposal and Evaluation of a Caching Scheme for Ad Hoc Networks -- A Secure Spontaneous Ad-Hoc Network to Share Internet Access -- A Middleware Family for VANETs -- Joint IP Address and Public Key Certificate Trust Model for Mobile Ad Hoc Networks -- A Localized Algorithm for Target Monitoring in Wireless Sensor Networks -- A Wireless Sensor Network Architecture for Homeland Security Application.
Record Nr. UNINA-9910484806203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile, and Wireless Networks : 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy, October 19–21, 2020, Proceedings / / edited by Luigi Alfredo Grieco, Gennaro Boggia, Giuseppe Piro, Yaser Jararweh, Claudia Campolo
Ad-Hoc, Mobile, and Wireless Networks : 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy, October 19–21, 2020, Proceedings / / edited by Luigi Alfredo Grieco, Gennaro Boggia, Giuseppe Piro, Yaser Jararweh, Claudia Campolo
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XIII, 316 p. 161 illus., 90 illus. in color.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Artificial Intelligence
Data Structures and Information Theory
Cryptology
ISBN 3-030-61746-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intelligent, Programmable and Delay- and Disruption- Tolerant Networks -- Internet of Drones and Smart Mobility -- Internet of Things and Internet of Medical Things -- Secure Communication Protocols and Architectures -- Wireless Systems.
Record Nr. UNINA-9910427681503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Special purpose computers
Computer system failures
Application software
Coding theory
Information theory
Data encryption (Computer science)
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
Information Systems Applications (incl. Internet)
Coding and Information Theory
Cryptology
ISBN 3-030-31831-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466445403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile, and Wireless Networks : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Ad-Hoc, Mobile, and Wireless Networks : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer networks
Computers, Special purpose
Electronic digital computers - Evaluation
Application software
Coding theory
Information theory
Cryptography
Data encryption (Computer science)
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
Computer and Information Systems Applications
Coding and Information Theory
Cryptology
ISBN 3-030-31831-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349278103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Communication Systems and Information Security : Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20–22, 2019, Revised Selected Papers / / edited by Mostafa Belkasmi, Jalel Ben-Othman, Cheng Li, Mohamed Essaaidi
Advanced Communication Systems and Information Security : Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20–22, 2019, Revised Selected Papers / / edited by Mostafa Belkasmi, Jalel Ben-Othman, Cheng Li, Mohamed Essaaidi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XV, 251 p. 112 illus.)
Disciplina 621.384
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Application software
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Computer science - Mathematics
Computer Engineering and Networks
Computer and Information Systems Applications
Cryptology
Coding and Information Theory
Mathematics of Computing
ISBN 3-030-61143-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless Communications and Services -- Vehicular Communications -- Channel Coding -- Construction of Error Correcting Codes -- Intrusion Detection Techniques -- Wireless and Mobile Network Security -- Applied Cryptography. .
Record Nr. UNINA-9910427701703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXI, 897 p. 389 illus.)
Disciplina 004
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
E-commerce
Management information systems
Computer science
Computers and civilization
Systems and Data Security
Cryptology
Coding and Information Theory
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-25903-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work.
3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation.
5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration.
2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References.
Security, Forensics and Biometrics.
Record Nr. UNISA-996466421203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Concepts for Intelligent Vision Systems : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Advanced Concepts for Intelligent Vision Systems : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXI, 897 p. 389 illus.)
Disciplina 004
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Coding theory
Information theory
Electronic commerce
Electronic data processing - Management
Computers and civilization
Data and Information Security
Cryptology
Coding and Information Theory
e-Commerce and e-Business
IT Operations
Computers and Society
ISBN 3-319-25903-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work.
3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation.
5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration.
2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References.
Security, Forensics and Biometrics.
Record Nr. UNINA-9910484986803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui