The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video databases for applications such as digital libraries, video production, and a variety of Internet applications, there is a great need to develop effective techniques for content-based video retrieval. One of the main issues in this area of research is how to bridge the semantic gap between low-Ievel features extracted from a video (such as color, texture, shape, motion, and others) and semantics that describe video concept on a higher level. In...
The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video dat...
Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- lished new emerging technologies, such as ubiquitous computing and ambient intelligence, as a very important and unavoidablepartof everydaylife. However, this development has greatly in?uenced people s security concerns. As data is accessible anytime from anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. As another consequence, the use of new technologies has brought some privacy concerns. It...
Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- l...
This book constitutes the refereed post-proceedings of the International Workshop on Databases in Telecommunications, held in Edinburgh, in September 1999 during the VLDB-99 conference. The 13 revised full papers presented together with a panel discussion report have gone through two rounds of reviewing and revision. The volume is devoted to establishing strong connections between the telecommunications and databases research and development communities. Among the topics covered are data management in networks, database technology for network management, service configuration, performance...
This book constitutes the refereed post-proceedings of the International Workshop on Databases in Telecommunications, held in Edinburgh, in September ...
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people s privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also...
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on dat...
Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present...
Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital st...
The new emergingtechnologiesput new requirementsonsecurityanddata m- agement.Asdataareaccessibleanytimeanywhere, itbecomesmucheasiertoget unauthorized data access. Furthermore, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal information thereby endangering people's privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The interesting pr- lems range from traditional topics, such as, access control and...
The new emergingtechnologiesput new requirementsonsecurityanddata m- agement.Asdataareaccessibleanytimeanywhere, itbecomesmucheasiertoget unauthorized...
The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video databases for applications such as digital libraries, video production, and a variety of Internet applications, there is a great need to develop effective techniques for content-based video retrieval. One of the main issues in this area of research is how to bridge the semantic gap between low-Ievel features extracted from a video (such as color, texture, shape, motion, and others) and semantics that describe video concept on a higher level. In...
The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video dat...
Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf-...
Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these ...
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 r...