Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 307 p. 44 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Application software Management information systems Computer science Data encryption (Computer science) Computers and civilization Computer Communication Networks Information Systems Applications (incl. Internet) Management of Computing and Information Systems Cryptology Computers and Society |
ISBN | 3-319-17199-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Accountability in the Cloud -- Accountability for Data Governance in the Cloud -- Security in the Cloud -- On the Adoption of Security SLAs in the Cloud -- A Certification Framework for Cloud Security Properties: The Monitoring Path -- Privacy and Transparency in the Cloud -- HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains -- Privacy-Preserving Identity Management as a Service -- Empirical Approaches for the Cloud -- Metrics for Accountability in the Cloud -- Models for Cloud Risk Assessment: A Tutorial -- Agent-Based Evidence Collection in Cloud Computing -- Socio-Legal Aspects of the Cloud.-Understanding the Cloud: The Social Implications of Cloud Computing and the Need for Accountability -- Legal Aspects of Cloud Accountability -- Definition of Data Sharing Agreements -- Cloud Standards -- Standards for Accountability in the Cloud -- Accountability Glossary of Terms and Definitions Cloud Accountability: Glossary of Terms and Definitions. |
Record Nr. | UNINA-9910484059203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Accountability and Security in the Cloud [[electronic resource] ] : First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures / / edited by Massimo Felici, Carmen Fernández-Gago |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (X, 307 p. 44 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Application software Management information systems Computer science Data encryption (Computer science) Computers and civilization Computer Communication Networks Information Systems Applications (incl. Internet) Management of Computing and Information Systems Cryptology Computers and Society |
ISBN | 3-319-17199-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Accountability in the Cloud -- Accountability for Data Governance in the Cloud -- Security in the Cloud -- On the Adoption of Security SLAs in the Cloud -- A Certification Framework for Cloud Security Properties: The Monitoring Path -- Privacy and Transparency in the Cloud -- HCI Requirements for Transparency and Accountability Tools for Cloud Service Chains -- Privacy-Preserving Identity Management as a Service -- Empirical Approaches for the Cloud -- Metrics for Accountability in the Cloud -- Models for Cloud Risk Assessment: A Tutorial -- Agent-Based Evidence Collection in Cloud Computing -- Socio-Legal Aspects of the Cloud.-Understanding the Cloud: The Social Implications of Cloud Computing and the Need for Accountability -- Legal Aspects of Cloud Accountability -- Definition of Data Sharing Agreements -- Cloud Standards -- Standards for Accountability in the Cloud -- Accountability Glossary of Terms and Definitions Cloud Accountability: Glossary of Terms and Definitions. |
Record Nr. | UNISA-996200343303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ad Hoc Networks [[electronic resource] ] : Fourth International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers / / edited by Jun Zhi-zhong, Nathalie Mitton |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 366 p. 168 illus.) |
Disciplina | 005.82 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer communication systems
Computer security Data encryption (Computer science) Algorithms Computer Communication Networks Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 3-642-36958-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Substitution Networks: Performance Collapse Due to Overhead in Communication Times -- Handheld Analyzer of IEEE 802.15.4 PHY and MAC Frames -- Distributed Medium Access Control with Dynamic Altruism -- Providing Throughput Guarantees in IEEE 802.11 Wireless Networks -- Node Discovery and Replacement Using Mobile Robot -- Dynamic Tracking of Composite Events in Wireless Sensor Networks -- Localization in Wireless Sensor Networks by Cross Entropy Method -- Auction-Based Agent Negotiation in Cognitive Radio Ad Hoc Networks -- Asynchronous Rendezvous Protocol for Cognitive Radio Ad Hoc Networks -- DISON: A Self-organizing Network Management Framework for Wireless Sensor Networks -- A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs -- LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks -- Cross-Layer Interception Caching for MANETs -- Below Cross-Layer: An Alternative Approach to Service Discovery -- Modeling the Spontaneous Reaction of Mammalian Cells to External Stimuli -- Substitution Networks Based on Software Defined Networking -- A Modular Architecture for Reconfigurable Heterogeneous Networks -- Design Challenges and Solutions for Multi-channel Communications in Vehicular Ad Hoc NETworks -- Movement Speed Based Inter-probe Times for Neighbour Discovery. . |
Record Nr. | UNINA-9910437573203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.) |
Disciplina | 004.685 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Special purpose computers Computer system failures Application software Coding theory Information theory Data encryption (Computer science) Computer Communication Networks Special Purpose and Application-Based Systems System Performance and Evaluation Information Systems Applications (incl. Internet) Coding and Information Theory Cryptology |
ISBN | 3-030-31831-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910349278103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Ad-Hoc, Mobile, and Wireless Networks [[electronic resource] ] : 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings / / edited by Maria Rita Palattella, Stefano Scanzio, Sinem Coleri Ergen |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 645 p. 262 illus., 188 illus. in color.) |
Disciplina | 004.685 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Special purpose computers Computer system failures Application software Coding theory Information theory Data encryption (Computer science) Computer Communication Networks Special Purpose and Application-Based Systems System Performance and Evaluation Information Systems Applications (incl. Internet) Coding and Information Theory Cryptology |
ISBN | 3-030-31831-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466445403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XXI, 897 p. 389 illus.) |
Disciplina | 004 |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory E-commerce Management information systems Computer science Computers and civilization Systems and Data Security Cryptology Coding and Information Theory e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
ISBN | 3-319-25903-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work. 3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation. 5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration. 2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References. Security, Forensics and Biometrics. |
Record Nr. | UNISA-996466421203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advanced Concepts for Intelligent Vision Systems [[electronic resource] ] : 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings / / edited by Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, Paul Scheunders |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XXI, 897 p. 389 illus.) |
Disciplina | 004 |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory E-commerce Management information systems Computer science Computers and civilization Systems and Data Security Cryptology Coding and Information Theory e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
ISBN | 3-319-25903-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- About the Volume Editors -- Organization -- Contents -- Low-Level Image Processing -- BNRFBE Method for Blur Estimation in Document Images -- 1 Introduction -- 2 Blur Analysis -- 3 Blur Measuring -- 3.1 Principle of the Measurement -- 3.2 Text Blur Measurement -- 4 Experiments -- 4.1 Simulated Blur -- 4.2 Influence of Working Zone Z -- 4.3 Real Images -- 4.4 DIQA Database -- 5 Conclusion -- References -- Edge Width Estimation for Defocus Map from a Single Image -- 1 Introduction -- 2 Edge Width -- 2.1 Gaussian Edge Model -- 2.2 Estimation of Edge Width -- 2.3 The Edge Width Estimation Algorithm -- 3 Defocus Blur Estimation -- 3.1 Sparse Defocus Map -- 3.2 Full Defocus Map -- 4 Results and Discussion -- 4.1 Possible Improvement -- 5 Conclusion -- References -- RSD-DOG: A New Image Descriptor Based on Second Order Derivatives -- 1 Introduction -- 1.1 Related Work -- 2 Directional Filter -- 3 Ridge and Valley Detection Using Difference of Gaussian Filters -- 3.1 Difference of Half Smoothing Filters (DHSF) -- 3.2 Estimating the Direction of Second Order Statistics Such as Ridges and Valleys -- 4 Descriptor Construction -- 5 Experiments and Results -- 5.1 Dataset and Evaluation -- 5.2 Descriptor Performance -- 6 Conclusion -- References -- Ringing Artifact Suppression Using Sparse Representation -- 1 Introduction -- 2 Ringing Suppression -- 2.1 Problem Formulation -- 2.2 Joint Sparse Coding -- 2.3 Ringing Suppression Method -- 3 Evaluation -- 4 Conclusion -- References -- Patch-Based Mathematical Morphology for Image Processing, Segmentation and Classification -- 1 Introduction -- 2 Patch Complete Lattice Learning -- 2.1 Complete Lattice from Patches -- 2.2 Complete Lattice Learning -- 2.3 Patch-Based MM Operators -- 3 Applications -- 3.1 Color Image Processing -- 3.2 Color Image Segmentation.
3.3 Color Image Texture Classification -- 4 Conclusion -- References -- Time Ordering Shuffling for Improving Background Subtraction -- 1 Introduction -- 2 Time Shuffling Strategies -- 2.1 Principle -- 2.2 Random Time Shuffling Strategy -- 2.3 Deterministic Time Shuffling Strategies -- 2.4 Implementation of the Deterministic Strategies -- 3 Experiments and Results -- 3.1 Initialization -- 3.2 Dataset -- 3.3 Background Subtraction Algorithms -- 3.4 Results and Interpretation -- 4 Conclusions -- References -- Fast and Low Power Consumption Outliers Removal for Motion Vector Estimation -- 1 Introduction -- 2 Proposed Method -- 2.1 Pre-processing -- 2.2 Advanced Voting -- 2.3 Motion Estimation Model -- 3 Experimental Results -- 4 Computational Cost Comparison -- 5 Conclusion -- References -- Adaptive Scale Selection for Multiscale Image Denoising -- 1 Introduction -- 2 Motivation of the Work -- 2.1 Atomic Representation and Time-Scale Evolution -- 2.2 Rational Dilation Wavelet Transform -- 3 Scale Selection -- 3.1 Packets of Atoms -- 3.2 Scale Selection Algorithm -- 4 Adaptive RDWT -- 5 Preliminary Experimental Results -- 6 Conclusions -- References -- Secure Signal Processing Using Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 3 Fully Homomorphic Encryption -- 4 Encrypted Natural Logarithm -- 5 Brightness/Contrast Filter Theory -- 6 Experimental Results -- 7 Conclusion -- References -- Video Processing and Camera Networks -- Towards a Bayesian Video Denoising Method -- 1 Introduction -- 2 Bayesian Video Denoising -- 2.1 A Nonlocal Bayesian Principle -- 2.2 Learning the a Priori Model -- 2.3 Description of the Algorithm -- 2.4 Computational Complexity -- 3 Results -- 4 Conclusions -- References -- Collaborative, Context Based Activity Control Method for Camera Networks -- 1 Introduction -- 2 Related Work. 3 The Implemented Algorithm -- 4 The Test Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- EFIC: Edge Based Foreground Background Segmentation and Interior Classification for Dynamic Camera Viewpoints -- 1 Introduction -- 2 Edge Based Foreground Background Segmentation -- 2.1 Previous Work -- 2.2 Foreground Shape Correction -- 2.3 Ghost Removal -- 3 Camera Motion Detection -- 3.1 Optical Flow -- 3.2 Flow Based Camera Motion Detection -- 4 Camera Motion Compensation -- 4.1 Affine Image Transformation -- 4.2 Distinction Between Panning/Tilting and Jitter -- 4.3 Jitter Compensation -- 4.4 Panning/Tilting Compensation -- 5 Experiments -- 6 Conclusions -- References -- A Unified Camera Calibration from Arbitrary Parallelograms and Parallepipeds -- 1 Introduction -- 2 Preliminaries -- 2.1 Parallelogram Parameterization -- 3 Projections of Parallelograms -- 3.1 Canonic Homography -- 3.2 Measurement Matrix of Homographies -- 4 Parameter Estimation -- 4.1 Rescaling the Measurement Matrix -- 4.2 Factorization -- 4.3 Resolving Affine Ambiguity -- 4.4 Computing Camera Parameters -- 5 Merging Information from Parallelepipeds -- 6 Experimental Results -- 6.1 Simulated Experiment -- 6.2 Real Image Experiment -- 7 Conclusion -- References -- Motion Compensation Based on Robust Global Motion Estimation: Experiments and Applications -- 1 Introduction -- 2 Related Work -- 2.1 Problem Statement -- 2.2 Geometric Feature-Based Methods -- 2.3 Direct Methods -- 3 Proposed Method -- 3.1 Outlines of the Method -- 3.2 Detailed Method -- 3.3 A Hybrid Pyramidal Method Robust to Large Motion -- 3.4 Motion Estimation Robust to Occlusions and Moving Objects -- 4 Experimental Framework and Results -- 4.1 Problem Statement -- 4.2 Experiments -- 4.3 Criteria -- 4.4 Results -- 5 Applications -- 5.1 Stabilisation -- 5.2 Panorama Creation. 5.3 Moving Target Detection and Tracking -- 6 Conclusion and Future Work -- References -- Bayesian Fusion of Back Projected Probabilities (BFBP): Co-occurrence Descriptors for Tracking in Complex Environments -- 1 Introduction -- 2 Related Work -- 3 Probabilstic Color Co-occurrence Modeling -- 4 Bayesian Fusion of Multiple Co-occurrence Back Projections -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Embedded System Implementation for Vehicle Around View Monitoring -- 1 Introduction -- 2 Surrounding Image Construction -- 2.1 Rectification -- 2.2 Bird's-Eye-View Transformation -- 2.3 Image Stitching -- 3 Embedded System Implementation -- 3.1 Hardware System Architecture -- 3.2 Performance Optimization -- 4 Experimental Results -- 4.1 Calibration Result -- 4.2 Result of Bird's-Eye-View Transformation -- 4.3 Obtaining 360 Surrounding View Image -- 4.4 Real-Time Stitching Performance and Precision -- 5 Conclusion -- References -- Motion and Tracking -- Cosine-Sine Modulated Filter Banks for Motion Estimation and Correction -- 1 Introduction -- 2 Cosine-Sine Modulated Filter Bank -- 3 Motion Estimation -- 3.1 The Error Function -- 3.2 Hierarchical Motion Estimation with CSMFB -- 4 Results -- 4.1 Motion Estimation -- 4.2 Motion Correction -- 4.3 Phase Shift Correction -- 4.4 Motion Correction in Magnetic Resonance Imaging -- 5 Conclusions -- Fast and Robust Variational Optical Flow for High-Resolution Images Using SLIC Superpixels -- 1 Introduction -- 2 Existing Work Using (Over)Segmentation -- 3 Existing Superpixel Methods -- 3.1 gSLIC Superpixels -- 3.2 (g)SLIC in Our Proposed Workflow -- 4 Variational Optical Flow on the Superpixel Grid -- 5 Experiments and Results -- 6 Conclusion -- 7 Future Work -- References -- Depth-Based Filtration for Tracking Boost -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pixel Filtration. 2.2 Tracking Stage -- 2.3 Detection Stage -- 2.4 Occlusion Handling -- 2.5 Recenter and Resize -- 2.6 Learning Stage -- 3 Experimental Results -- 3.1 Success Rate -- 3.2 Precision -- 3.3 Efficiency -- 4 Conclusion -- Robust Fusion of Trackers Using Online Drift Prediction -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Drift Predictor -- 3.2 Computation of the Fusion Bounding Box -- 3.3 Object Model Reinitialization or Update -- 4 Fusion Experiments and Results -- 4.1 Video Dataset -- 4.2 Evaluation Protocol -- 4.3 Implementation -- 4.4 Results -- 5 Conclusion -- References -- Bootstrapping Computer Vision and Sensor Fusion for Absolute and Relative Vehicle Positioning -- 1 Introduction -- 2 Fusion Approach -- 3 Visual Features -- 4 Improved GPS Method -- 5 Dynamic Map -- References -- Detection of Social Groups in Pedestrian Crowds Using Computer Vision -- 1 Introduction -- 2 Proposed Methodology -- 3 Bottom up Hierarchical Clustering -- 4 Experimental Results -- 5 Conclusions -- References -- Single Image Visual Obstacle Avoidance for Low Power Mobile Sensing -- 1 Introduction -- 2 Navigating Around Obstacles -- 2.1 Relative Focus Maps -- 2.2 Obstacle Avoidance -- 2.3 Implementation -- 3 Evaluation -- 4 Conclusions and Future Work -- References -- ROS-Based SLAM for a Gazebo-Simulated Mobile Robot in Image-Based 3D Model of Indoor Environment -- 1 Introduction -- 2 System Setup -- 2.1 Choice of a Robot for Simulation in Gazebo -- 2.2 PR-2 Robot Description and Simulation -- 2.3 AR-601M Robot Description and Simulation -- 3 Camera-Based 3D Model of Indoor Environment -- 3.1 Indoor Environment Shooting with Camera -- 3.2 Image-Based 3D Modeling of Indoor Environment -- 4 ROS-Based SLAM Using Gazebo in Image-Based 3D Model of Indoor Environment -- 4.1 Robot Simulation in Gazebo -- 4.2 ROS-Based SLAM Simulation in Gazebo -- References. Security, Forensics and Biometrics. |
Record Nr. | UNINA-9910484986803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Encryption Standard - AES [[electronic resource] ] : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / / edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (X, 190 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Algorithms Computer science—Mathematics Cryptology Algorithm Analysis and Problem Complexity Symbolic and Algebraic Manipulation Discrete Mathematics in Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. |
Record Nr. | UNINA-9910484780103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Encryption Standard - AES [[electronic resource] ] : 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers / / edited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (X, 190 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Algorithms Computer science—Mathematics Cryptology Algorithm Analysis and Problem Complexity Symbolic and Algebraic Manipulation Discrete Mathematics in Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components -- An Algebraic Interpretation of 128 -- Hardware Implementations -- Efficient AES Implementations on ASICs and FPGAs -- Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results -- Other Topics -- Complementation-Like and Cyclic Properties of AES Round Functions -- More Dual Rijndaels -- Representations and Rijndael Descriptions -- Linearity of the AES Key Schedule -- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. |
Record Nr. | UNISA-996465822403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advanced Infocomm Technology [[electronic resource] ] : 5th IEEE International Conference, ICAIT 2012, Paris, France, July 25-27, 2012, Revised Selected papers / / edited by Vincent Guyot |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 358 p. 153 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Application software Algorithms Management information systems Computer science Data encryption (Computer science) Software engineering Computer Communication Networks Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Cryptology Software Engineering |
ISBN | 3-642-38227-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Energy Based Limits on Computing Capacity and on Human Computing Ability.- Making a Breakthrough in Cloud Application Design.- On Managing Heterogeneity in Production Cloud Computing Environments.- Towards Urban Vehicular Networking -- Performance Evaluation of Fairness between High-Speed TCPs in Wireless Environment.- Evaluation of SIP Call Setup Delay for VoIP in IMS.- MPLS-TP: OAM Discovery Mechanism.- Supporting Data Center Management through Clustering of System Data Streams -- Extension of Path Computation Element (PCE) Framework for Resource Provisioning Based on User Profile in Dynamic Circuit Network.- Traffic Engineering Approaches in P2P Environments.- On Selective Placement for Uniform Cache Objects.- Loss Probability and Delay of Finite-Buffer Queues with Discrete ON-OFF Markovian Arrivals and Geometric Service Times.- Improve Prefetch Performance by Splitting the Cache Replacement Queue.- CO2 Laser Writing of Long-Period Fiber Gratings in Polarization-Maintaining Fiber under Tension.- SAVI - A Model for Video Workload Generation Based on Scene Length.- UNIVERSALLY: A Context-Aware Architecture for Multimedia Access in Digital Homes.- A User-Centric Network Architecture for Sustainable Rural Areas.- A Relative Delay Measurement Method for Wideband Array with LFM Waveform.- Signal Detection Based on Maximum-Minimum Eigenvalue in Rician Fading Channel.- Collective Intelligence Based Place Recommendation System.- Providing Reliability for Transactional Mobile Agents.- On the Security of Lv et al.’s Three-Party Authenticated Key Exchange Protocol Using One-Time Key.- Mechanisms to Locate Non-cooperative Transmitters in Wireless Networks.- Mantle: A Novel DOSN Leveraging Free Storage and Local Software.- Descriptional Entropy: Application to Security Software Analysis.- Adaptative Delay Aware Data Gathering Strategy for Wireless Sensor Networks.- Overcoming the Deficiencies of Collaborative Detection of Spatially-Correlated Events in WSN.- A Low-Complexity and High-Performance Beamforming Scheme for mmWave WPAN systems.- Energy Efficient Aggregation in Wireless Sensor Networks.- Energy Optimization of Mesh Access Networks.- Predictive Sink Mobility for Target Tracking in Sensor Networks.- Backhaul Topology Design and Weighted Max-Min Fair Capacity Allocation in Wireless Mesh Networks.- A Double Data Rate, Low Complexity 2 x 2 MIMO Scheme Based on a Combination of Alamouti System and Orthogonal Codes.- GeoSUZ: A Geocast Routing Protocol in Sub-ZORs for VANETs.- Adaptive Contention Window for Zone-Based Dissemination of Vehicular Traffic.- Highway Preventive Congestion Control through Input Regulation in Vehicular Networks. |
Record Nr. | UNISA-996466301203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|