You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Although the animal may be, as Nietzsche argued, ahistorical, living completely in the present, it nonetheless plays a crucial role in human history. The fascination with animals that leads not only to a desire to observe and even live alongside them, but to capture or kill them, is found in all civilizations. The essays collected in Beastly Natures show how animals have been brought into human culture, literally helping to build our societies (as domesticated animals have done) or contributing, often in problematic ways, to our concept of the wild. The book begins with a group of essays that approach the historical relevance of human-animal relations seen from the perspectives of various di...
Information theory has recently attracted renewed attention because of key developments spawning challenging research problems." "The book is suitable for graduate students and research mathematicians interested in communications and network information theory."--Jacket.
The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous c- munication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; se- rity researchers are also interested in ‘stray’ communication channels, such as those which arise via shared resourcesin operating systems or the physical le...
The advent of the digital era, the Internet, and the development of fast com puting devices that can access mass storage servers at high communication bandwidths have brought within our reach the world of ambient intelligent systems. These systems provide users with information, communication, and entertainment at any desired place and time. Since its introduction in 1998, the vision of Ambient Intelligence has attracted much attention within the re search community. Especially, the need for intelligence generated by smart al gorithms, which run on digital platforms that are integrated into consumer elec tronics devices, has strengthened the interest in Computational Intelligence. This newly developing research field, which can be positioned at the inter section of computer science, discrete mathematics, and artificial intelligence, contains a large variety of interesting topics including machine learning, con tent management, vision, speech, data mining, content augmentation, profiling, contextual awareness, feature extraction, resource management, security, and privacy.
Visualinformationsystemsareinformationsystemsforvisualcomputing.Visual computing is computing on visual objects. Some visual objects such as images are inherently visual in the sense that their primary representation is the visual representation.Somevisualobjectssuchasdatastructuresarederivativelyvisual in the sense that their primary representation is not the visual representation, but can be transformed into a visual representation. Images and data structures are the two extremes. Other visual objects such as maps may fall somewhere in between the two. Visual computing often involves the transformation from one type of visual objects into another type of visual objects, or into the same ty...
'To interlace or not to interlace' is a hot issue currently. Traditionally interlace has been part of the video standard as it reduces the transmission and display demands, while hardly affecting the perceived quality of the pictures. With the current explosion of new video formats due to emerging technologies as multimedia PC's, videotelephony and flat matrix display the question whether or not interlace is a relict from the past is more relevant than ever. This book provides a broad overview of advanced motion estimation and de-interlacing techniques to enable a profound scientific basis for answering the above question. An extensive evaluation of the algorithms, including many screen photographs is an imt part of the book. But also system questions, such as whether interlace is a good choice in combination with modern video compression methods (MPEG), and which currently would be the optional choice for a display format are extensively treated. The combination of scientific profoundness and completions, with the focus on practical hot issues, makes the book unique in its kind.
This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern
Multidimensional Filter Banks and Wavelets: Reserach Developments and Applications brings together in one place important contributions and up-to-date research results in this important area. Multidimensional Filter Banks and Wavelets: Research Developments and Applications serves as an excellent reference, providing insight into some of the most important research issues in the field.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Security Protocols, held in Cambridge, UK, in April 2003. The 25 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Among the topics addressed are authentication, mobile ad-hoc network security, SPKI, verification of cryptographic protocols, denial of service, access control, protocol attacks, API security, biometrics for security, and others.