Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings

Springer
Free sample

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people’s privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.
Read more
Collapse
Loading...

Additional Information

Publisher
Springer
Read more
Collapse
Published on
Aug 18, 2008
Read more
Collapse
Pages
229
Read more
Collapse
ISBN
9783540852599
Read more
Collapse
Read more
Collapse
Best For
Read more
Collapse
Language
English
Read more
Collapse
Genres
Business & Economics / Information Management
Computers / Databases / General
Computers / Networking / General
Computers / Networking / Hardware
Computers / Operating Systems / General
Computers / Security / General
Computers / System Administration / Storage & Retrieval
Computers / Systems Architecture / General
Language Arts & Disciplines / Library & Information Science / General
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video databases for applications such as digital libraries, video production, and a variety of Internet applications, there is a great need to develop effective techniques for content-based video retrieval. One of the main issues in this area of research is how to bridge the semantic gap between low-Ievel features extracted from a video (such as color, texture, shape, motion, and others) and semantics that describe video concept on a higher level. In this book, Dr. Milan Petkovi6 and Prof. Dr. Willem Jonker have addressed this issue by developing and describing several innovative techniques to bridge the semantic gap. The main contribution of their research, which is the core of the book, is the development of three techniques for bridging the semantic gap: (1) a technique that uses the spatio-temporal extension of the Cobra framework, (2) a technique based on hidden Markov models, and (3) a technique based on Bayesian belief networks. To evaluate performance of these techniques, the authors have conducted a number of experiments using real video data. The book also discusses domains solutions versus general solution of the problem. Petkovi6 and Jonker proposed a solution that allows a system to be applied in multiple domains with minimal adjustments. They also designed and described a prototype video database management system, which is based on techniques they proposed in the book.
©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.