top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 307 p. 44 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Application software
Management information systems
Computer science
Data encryption (Computer science)
Computers and civilization
Computer Communication Networks
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Cryptology
Computers and Society
ISBN 3-319-17199-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Accountability in the Cloud -- Accountability for Data Governance in the Cloud -- Security in the Cloud -- On the Adoption of Security SLAs in the Cloud -- A Certification Framework for Cloud Security Properties: The Monitoring Path -- Privacy and Transparency in the Cloud -- HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains -- Privacy-Preserving Identity Management as a Service -- Empirical Approaches for the Cloud -- Metrics for Accountability in the Cloud -- Models for Cloud Risk Assessment: A Tutorial -- Agent-Based Evidence Collection in Cloud Computing -- Socio-Legal Aspects of the Cloud.-Understanding the Cloud: The Social Implications of Cloud Computing and the Need for Accountability -- Legal Aspects of Cloud Accountability -- Definition of Data Sharing Agreements -- Cloud Standards -- Standards for Accountability in the Cloud -- Accountability Glossary of Terms and Definitions Cloud Accountability: Glossary of Terms and Definitions.
Record Nr. UNINA-9910484059203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 307 p. 44 illus.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Application software
Management information systems
Computer science
Data encryption (Computer science)
Computers and civilization
Computer Communication Networks
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
Cryptology
Computers and Society
ISBN 3-319-17199-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Accountability in the Cloud -- Accountability for Data Governance in the Cloud -- Security in the Cloud -- On the Adoption of Security SLAs in the Cloud -- A Certification Framework for Cloud Security Properties: The Monitoring Path -- Privacy and Transparency in the Cloud -- HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains -- Privacy-Preserving Identity Management as a Service -- Empirical Approaches for the Cloud -- Metrics for Accountability in the Cloud -- Models for Cloud Risk Assessment: A Tutorial -- Agent-Based Evidence Collection in Cloud Computing -- Socio-Legal Aspects of the Cloud.-Understanding the Cloud: The Social Implications of Cloud Computing and the Need for Accountability -- Legal Aspects of Cloud Accountability -- Definition of Data Sharing Agreements -- Cloud Standards -- Standards for Accountability in the Cloud -- Accountability Glossary of Terms and Definitions Cloud Accountability: Glossary of Terms and Definitions.
Record Nr. UNISA-996200343303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Ad Hoc Networks [[electronic resource] ] : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Ad Hoc Networks [[electronic resource] ] : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 366 p. 168 illus.)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computer Communication Networks
Systems and Data Security
Cryptology
Algorithm Analysis and Problem Complexity
ISBN 3-642-36958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery.    .
Record Nr. UNINA-9910437573203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Special purpose computers
Computer system failures
Application software
Coding theory
Information theory
Data encryption (Computer science)
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
Information Systems Applications (incl. Internet)
Coding and Information Theory
Cryptology
ISBN 3-030-31831-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349278103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.)
Disciplina 004.685
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Special purpose computers
Computer system failures
Application software
Coding theory
Information theory
Data encryption (Computer science)
Computer Communication Networks
Special Purpose and Application-Based Systems
System Performance and Evaluation
Information Systems Applications (incl. Internet)
Coding and Information Theory
Cryptology
ISBN 3-030-31831-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466445403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXI, 897 p. 389 illus.)
Disciplina 004
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
E-commerce
Management information systems
Computer science
Computers and civilization
Systems and Data Security
Cryptology
Coding and Information Theory
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-25903-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work.
3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation.
5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration.
2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References.
Security, Forensics and Biometrics.
Record Nr. UNISA-996466421203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XXI, 897 p. 389 illus.)
Disciplina 004
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
E-commerce
Management information systems
Computer science
Computers and civilization
Systems and Data Security
Cryptology
Coding and Information Theory
e-Commerce/e-business
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-25903-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work.
3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation.
5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration.
2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References.
Security, Forensics and Biometrics.
Record Nr. UNINA-9910484986803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Encryption Standard - AES [[electronic resource] ] : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / / edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa
Advanced Encryption Standard - AES [[electronic resource] ] : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / / edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 190 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Symbolic and Algebraic Manipulation
Discrete Mathematics in Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
Record Nr. UNINA-9910484780103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Encryption Standard - AES [[electronic resource] ] : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / / edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa
Advanced Encryption Standard - AES [[electronic resource] ] : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / / edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 190 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Symbolic and Algebraic Manipulation
Discrete Mathematics in Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
Record Nr. UNISA-996465822403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Infocomm Technology [[electronic resource] ] : 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers / / edited by Vincent Guyot
Advanced Infocomm Technology [[electronic resource] ] : 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers / / edited by Vincent Guyot
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 358 p. 153 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer communication systems
Application software
Algorithms
Management information systems
Computer science
Data encryption (Computer science)
Software engineering
Computer Communication Networks
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Cryptology
Software Engineering
ISBN 3-642-38227-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Energy Based Limits on Computing Capacity and on Human Computing Ability.- Making a Breakthrough in Cloud Application Design.- On Managing Heterogeneity in Production Cloud Computing Environments.- Towards Urban Vehicular Networking -- Performance Evaluation of Fairness between High-Speed TCPs in Wireless Environment.- Evaluation of SIP Call Setup Delay for VoIP in IMS.- MPLS-TP: OAM Discovery Mechanism.- Supporting Data Center Management through Clustering of System Data Streams -- Extension of Path Computation Element (PCE) Framework for Resource Provisioning Based on User Profile in Dynamic Circuit Network.- Traffic Engineering Approaches in P2P Environments.- On Selective Placement for Uniform Cache Objects.- Loss Probability and Delay of Finite-Buffer Queues with Discrete ON-OFF Markovian Arrivals and Geometric Service Times.- Improve Prefetch Performance by Splitting the Cache Replacement Queue.- CO2 Laser Writing of Long-Period Fiber Gratings in Polarization-Maintaining Fiber under Tension.- SAVI - A Model for Video Workload Generation Based on Scene Length.- UNIVERSALLY: A Context-Aware Architecture for Multimedia Access in Digital Homes.- A User-Centric Network Architecture for Sustainable Rural Areas.- A Relative Delay Measurement Method for Wideband Array with LFM Waveform.- Signal Detection Based on Maximum-Minimum Eigenvalue in Rician Fading Channel.- Collective Intelligence Based Place Recommendation System.- Providing Reliability for Transactional Mobile Agents.- On the Security of Lv et al.’s Three-Party Authenticated Key Exchange Protocol Using One-Time Key.- Mechanisms to Locate Non-cooperative Transmitters in Wireless Networks.- Mantle: A Novel DOSN Leveraging Free Storage and Local Software.- Descriptional Entropy: Application to Security Software Analysis.- Adaptative Delay Aware Data Gathering Strategy for Wireless Sensor Networks.- Overcoming the Deficiencies of Collaborative Detection of Spatially-Correlated Events in WSN.- A Low-Complexity and High-Performance Beamforming Scheme for mmWave WPAN systems.- Energy Efficient Aggregation in Wireless Sensor Networks.- Energy Optimization of Mesh Access Networks.- Predictive Sink Mobility for Target Tracking in Sensor Networks.- Backhaul Topology Design and Weighted Max-Min Fair Capacity Allocation in Wireless Mesh Networks.- A Double Data Rate, Low Complexity 2 x 2 MIMO Scheme Based on a Combination of Alamouti System and Orthogonal Codes.- GeoSUZ: A Geocast Routing Protocol in Sub-ZORs for VANETs.- Adaptive Contention Window for Zone-Based Dissemination of Vehicular Traffic.- Highway Preventive Congestion Control through Input Regulation in Vehicular Networks.
Record Nr. UNISA-996466301203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui