Narrow your search

Library

AP (3)

KDG (3)

KU Leuven (3)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

ULB (3)

ULiège (3)

VIVES (3)


Resource type

book (3)

digital (3)


Language

English (6)


Year
From To Submit

2014 (6)

Listing 1 - 6 of 6
Sort by

Book
Interactive segmentation techniques : algorithms and performance evaluation
Authors: --- ---
ISSN: 21964076 ISBN: 9814451592 9814451606 Year: 2014 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation algorithms and then discuss state-of-the-art techniques, including graph matching methods, region merging and label propagation, clustering methods, and segmentation methods based on edge detection. A comparative analysis of these methods will be provided with quantitative and qualitative performance evaluation, which will be illustrated using natural and synthetic images. Also, extensive statistical performance comparisons will be made. Pros and cons of these interactive segmentation methods will be pointed out, and their applications will be discussed. There have been only a few surveys on interactive segmentation techniques, and those surveys do not cover recent state-of-the art techniques. By providing comprehensive up-to-date survey on the fast developing topic and the performance evaluation, this book can help readers learn interactive segmentation techniques quickly and thoroughly.


Book
Network and System Security : 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings
Authors: --- ---
ISBN: 3319116975 3319116983 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- e-Commerce/e-business. --- Information Systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer networks --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Distributed processing


Digital
Network and System Security : 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedings
Authors: --- ---
ISBN: 9783319116983 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.


Digital
Interactive Segmentation Techniques : Algorithms and Performance Evaluation
Authors: --- ---
ISBN: 9789814451604 Year: 2014 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation algorithms and then discuss state-of-the-art techniques, including graph matching methods, region merging and label propagation, clustering methods, and segmentation methods based on edge detection. A comparative analysis of these methods will be provided with quantitative and qualitative performance evaluation, which will be illustrated using natural and synthetic images. Also, extensive statistical performance comparisons will be made. Pros and cons of these interactive segmentation methods will be pointed out, and their applications will be discussed. There have been only a few surveys on interactive segmentation techniques, and those surveys do not cover recent state-of-the art techniques. By providing comprehensive up-to-date survey on the fast developing topic and the performance evaluation, this book can help readers learn interactive segmentation techniques quickly and thoroughly.


Book
Signal processing approaches to secure physical layer communications in multi-antenna wireless systems
Authors: --- ---
ISBN: 9814560138 9814560146 Year: 2014 Publisher: Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will cover cases with collocated and with distributed antennas, i.e., relays. The topics covered will be of interest to researchers in the signal processing community as well to practitioners and engineers working in this area. This book will also review recent works that apply these signal processing approaches to more advanced wireless systems, such as OFDM systems, multicell systems, cognitive radio, multihop networks etc. This will draw interest from researchers that wish to pursue the topic further in these new directions. This book is divided into three parts: (i) data transmission, (ii) channel estimation and (iii) advanced applications. Even though many works exist in the literature on these topics, the approaches and perspectives taken were largely diverse. This book provides a more organized and systematic view of these designs and to lay a solid foundation for future work in these areas. Moreover, by presenting the work from a signal processing perspective, this book will also trigger more research interest from the signal processing community and further advance the field of physical layer secrecy along the described directions. This book allows readers to gain basic understanding of works on physical layer secrecy, knowledge of how signal processing techniques can be applied to this area, and the application of these techniques in advanced wireless applications.

Keywords

Adaptive antennas --- Antenna radiation patterns --- Roaming (Telecommunication) --- Mathematical models. --- Call handoff (Telecommunication) --- Handoffs (Telecommunication) --- Handover (Telecommunication) --- Open connectivity (Telecommunication) --- Virtual roaming (Telecommunication) --- Antenna lobe patterns --- Antenna patterns --- Antennas (Electronics) --- Directional patterns of antennas --- Field intensity patterns of antennas --- Field patterns of antennas --- Lobe patterns, Antenna --- Patterns, Antenna radiation --- Radiation patterns, Antenna --- Radiation patterns --- Engineering. --- Computer security. --- Electrical engineering. --- Signal, Image and Speech Processing. --- Systems and Data Security. --- Communications Engineering, Networks. --- Electric engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Construction --- Industrial arts --- Technology --- Protection --- Security measures --- Electromagnetic fields --- Radio relay systems --- Wireless communication systems --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Security measures.


Digital
Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems
Authors: --- ---
ISBN: 9789814560146 Year: 2014 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will cover cases with collocated and with distributed antennas, i.e., relays. The topics covered will be of interest to researchers in the signal processing community as well to practitioners and engineers working in this area. This book will also review recent works that apply these signal processing approaches to more advanced wireless systems, such as OFDM systems, multicell systems, cognitive radio, multihop networks etc. This will draw interest from researchers that wish to pursue the topic further in these new directions. This book is divided into three parts: (i) data transmission, (ii) channel estimation and (iii) advanced applications. Even though many works exist in the literature on these topics, the approaches and perspectives taken were largely diverse. This book provides a more organized and systematic view of these designs and to lay a solid foundation for future work in these areas. Moreover, by presenting the work from a signal processing perspective, this book will also trigger more research interest from the signal processing community and further advance the field of physical layer secrecy along the described directions. This book allows readers to gain basic understanding of works on physical layer secrecy, knowledge of how signal processing techniques can be applied to this area, and the application of these techniques in advanced wireless applications.

Listing 1 - 6 of 6
Sort by