Listing 1 - 10 of 19 | << page >> |
Sort by
|
Choose an application
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography. .
Engineering & Applied Sciences --- Computer Science --- Cryptography --- Chaotic behavior in systems. --- Data processing. --- Chaos in systems --- Chaos theory --- Chaotic motion in systems --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Artificial intelligence. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Intelligence, Computational --- Artificial intelligence --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Construction --- Industrial arts --- Technology --- Soft computing --- Differentiable dynamical systems --- Dynamics --- Nonlinear theories --- System theory --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Artificial Intelligence. --- Cryptology. --- Data Structures and Information Theory.
Choose an application
Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- chaos --- DES (data encryption standard) --- cryptologie --- programmatielogica --- KI (kunstmatige intelligentie) --- robots --- AI (artificiële intelligentie)
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- cryptologie --- informatica --- computerbesturingssystemen --- informatiesystemen --- programmatielogica --- OS (operating system) --- computernetwerken
Choose an application
MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications.
Wireless communication systems --Security measures --Congresses. --- Wireless communication systems --- Library & Information Science --- Telecommunications --- Computer Science --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Social Sciences --- Security measures --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Computer science. --- Computer system failures. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Information storage and retrieval. --- Computer Science. --- Data Encryption. --- Information Storage and Retrieval. --- Programming Techniques. --- Data Structures, Cryptology and Information Theory. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Information storage and retrieva. --- Data structures (Computer scienc. --- Computer system performance. --- Cryptology. --- Data Structures and Information Theory. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Information storage and retrieval systems. --- Application software. --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Failures --- Programming --- Telecommunication systems
Choose an application
Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers’ properties to improve the network’s resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network’s bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.
Multimedia communications --- Artificial intelligence --- Civil & Environmental Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Civil Engineering --- Telecommunications --- Applied Mathematics --- Data processing --- Multimedia systems. --- Computational intelligence. --- Intelligence, Computational --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Engineering. --- Computers. --- Artificial intelligence. --- Applied mathematics. --- Engineering mathematics. --- Electrical engineering. --- Appl.Mathematics/Computational Methods of Engineering. --- Artificial Intelligence (incl. Robotics). --- Communications Engineering, Networks. --- Information Systems and Communication Service. --- Electric engineering --- Engineering --- Engineering analysis --- Mathematical analysis --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Construction --- Industrial arts --- Technology --- Mathematics --- Soft computing --- Information storage and retrieval systems --- Telecommunication. --- Information systems. --- Mathematical and Computational Engineering. --- Artificial Intelligence. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting
Choose an application
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- chaos --- DES (data encryption standard) --- cryptologie --- programmatielogica --- KI (kunstmatige intelligentie) --- robots
Choose an application
Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers’ properties to improve the network’s resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network’s bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.
Mathematics --- Electrical engineering --- Applied physical engineering --- Engineering sciences. Technology --- Mass communications --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- toegepaste wiskunde --- computers --- economie --- informatiesystemen --- wiskunde --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- elektrotechniek --- communicatietechnologie --- AI (artificiële intelligentie)
Choose an application
"TV content is currently available through various communication channels and devices, including digital TV, mobile TV, and Internet TV. However, with the increase in TV content volume, both its management and consumption become more and more challenging. Thoroughly describing TV program analysis techniques, this book explores the systems, architectures, algorithms, applications, research results, new approaches, and open issues. Leading experts address a wide variety of related subject areas and present a scientifically sound treatment of state-of-the-art techniques for readers interested or involved in TV program analysis"--Provided by publisher. "The book aims to give a thorough description of TV program analysis techniques, which consist of algorithms, systems, architectures, applications, overviews, including the latest research results, new emerging approaches and open issues"--Provided by publisher.
Choose an application
Chaos is a fascinating phenomenon that has been observed in nature, laboratory, and has been applied in various real-world applications. Chaotic systems are deterministic with no random elements involved yet their behavior appears to be random. Observations of chaotic behavior in nature include weather and climate, the dynamics of satellites in the solar system, the time evolution of the magnetic field of celestial bodies, population growth in ecology, to mention only a few examples. Chaos has been observed in the laboratory in a number of systems such as electrical circuits, lasers, chemical reactions, fluid dynamics, mechanical systems, and magneto-mechanical devices. Chaotic behavior has also found numerous applications in electrical and communication engineering, information and communication technologies, biology and medicine. The book project was launched to access the latest research related to chaos applications in intelligent computing where researchers from all over the world provide the necessary coverage of the mentioned field. The primary objective of this project was to assemble as much research coverage as possible related to the field by defining the latest innovative technologies and providing the most comprehensive list of research references. The coverage of this book provides strength to this reference resource for both researchers and also decision makers in obtaining a greater understanding of the concepts, issues, problems, trends, challenges and opportunities related to this field of study.
Computational intelligence --- Chaotic behavior in systems --- Civil Engineering --- Computer Science --- Applied Mathematics --- Engineering & Applied Sciences --- Civil & Environmental Engineering --- Computational intelligence. --- Chaotic behavior in systems. --- Chaos in systems --- Chaos theory --- Chaotic motion in systems --- Intelligence, Computational --- Engineering. --- Artificial intelligence. --- Statistical physics. --- Dynamical systems. --- Applied mathematics. --- Engineering mathematics. --- Appl.Mathematics/Computational Methods of Engineering. --- Statistical Physics, Dynamical Systems and Complexity. --- Artificial Intelligence (incl. Robotics). --- Engineering --- Engineering analysis --- Mathematical analysis --- Dynamical systems --- Kinetics --- Mathematics --- Mechanics, Analytic --- Force and energy --- Mechanics --- Physics --- Statics --- Mathematical statistics --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Statistical methods --- Differentiable dynamical systems --- Dynamics --- Nonlinear theories --- System theory --- Artificial intelligence --- Soft computing --- Mathematical and Computational Engineering. --- Complex Systems. --- Artificial Intelligence. --- Statistical Physics and Dynamical Systems.
Choose an application
Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are invented, which bring vast performance improvements to practical applications. For example, such content transmission techniques as p2p, sensor network and ad hoc network are constructed, which adaptively use the peers' properties to improve the network's resources. Multimedia adaptation techniques can adjust the multimedia data rate in order to compliant with the network's bandwidth. Scalable encryption techniques can generate the data stream that can be correctly decrypted after bit rate conversion. Ubiquitous multimedia services make the user share any kind of content anywhere. The book includes fourteen chapters highlighting current concepts, issues and emerging technologies. Distinguished scholars from many prominent research institutions around the world contribute to the book. The book covers various aspects, including not only some fundamental knowledge and the latest key techniques, but also typical applications and open issues. For example, the covered topics include the present and future video coding standards, stereo and multiview coding techniques, free-viewpoint TV techniques, wireless broadcasting techniques, media streaming techniques, wireless media transmission techniques and systems, and User-Generated Content sharing.
Mathematics --- Electrical engineering --- Applied physical engineering --- Engineering sciences. Technology --- Mass communications --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- toegepaste wiskunde --- computers --- economie --- informatiesystemen --- wiskunde --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- elektrotechniek --- communicatietechnologie
Listing 1 - 10 of 19 | << page >> |
Sort by
|