You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The religious association of Jehovah’s Witnesses has existed for about 150 years in Europe. How Jehovah’s Witnesses found their way in these countries has depended upon the way this missionary association was treated by the majority of the non-Witness population, the government and established churches. In this respect, the history of Jehovah’s Witnesses in Europe is also a history of the social constitution of these countries and their willingness to accept and integrate religious minorities. Jehovah’s Witnesses faced suppression and persecution not only in dictatorships, but also in some democratic states. In other countries, however, they developed in relative freedom. How the different situations in the various national societies affected the religious association and what challenges Jehovah’s Witnesses had to overcome – and still do in part even until our day – is the theme of this history volume.
First multi-year cumulation covers six years: 1965-70.
This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Information Hiding, IH 2004, held in Toronto, Canada in August 2004. The 25 revised full papers presented were carefully selected during two rounds of reviewing and revision from 70 papers submitted. The papers are organized in topical sections on digital media watermarking, steganalysis, forensic applications, steganography, software watermarking, security and privacy, anonymity, and data hiding in unusual content.
Techniques for Optimizing Multiprocessor Implementations of Signal Processing Applications An indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multimedia systems Embedded Multiprocessors: Scheduling and Synchronization, Second Edition presents arc...
This introductory book equips the reader to apply the core concepts and methods of network reliability analysis to real-life problems. It explains the modeling and critical analysis of systems and probabilistic networks, and requires only a minimal background in probability theory and computer programming. Based on the lecture notes of eight courses taught by the authors, the book is also self-contained, with no theory needed beyond the lectures. The primary focus is on essential “modus operandi,” which are illustrated in numerous examples and presented separately from the more difficult theoretical material.
PRINT/ONLINE PRICING OPTIONS AVAILABLE UPON REQUEST ATe-reference@taylorandfrancis.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactio...
Since previously published intellectual property law and business research discusses institutional analyses without interdisciplinary insights by technical experts, and technical references tend to concern engineering solutions without considering the social impact of institutional protection of multimedia digital information, there is a growing demand for a resource that bridges the gap between multimedia intellectual property protection law and technology. Intellectual Property Protection for Multimedia Information Technology provides scholars, management professionals, researchers, and lawyers in the field of multimedia information technology and its institutional practice with thorough coverage of the full range of issues surrounding multimedia intellectual property protection and its proper solutions from institutional, technical, and legal perspectives.
Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected at all costs from attackers.This book presents the recent advances in the theory and implementation of watermarking techniques. It brings together, for the first time, the successful applications of intelligent paradigms (including comparisons with conventional methods) in many areas. The accompanying CD-Rom provides readers with source codes and executables to put into practice general topics in watermarking.Intelligent Watermarking Techniques will be of great value to undergraduate and postgraduate students in many disciplines, including engineering and computer science. It is also targeted at researchers, scientists and engineers.
PIXELS & PAINTINGS “The discussion is firmly grounded in established art historical practices, such as close visual analysis and an understanding of artists’ working methods, and real-world examples demonstrate how computer-assisted techniques can complement traditional approaches.” —Dr. Emilie Gordenker, Director of the Van Gogh Museum The pioneering presentation of computer-based image analysis of fine art, forging a dialog between art scholars and the computer vision community In recent years, sophisticated computer vision, graphics, and artificial intelligence algorithms have proven to be increasingly powerful tools in the study of fine art. These methods—some adapted from fore...