The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video databases for applications such as digital libraries, video production, and a variety of Internet applications, there is a great need to develop effective techniques for content-based video retrieval. One of the main issues in this area of research is how to bridge the semantic gap between low-Ievel features extracted from a video (such as color, texture, shape, motion, and others) and semantics that describe video concept on a higher level. In...
The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video dat...
Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- lished new emerging technologies, such as ubiquitous computing and ambient intelligence, as a very important and unavoidablepartof everydaylife. However, this development has greatly in?uenced people s security concerns. As data is accessible anytime from anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. As another consequence, the use of new technologies has brought some privacy concerns. It...
Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- l...
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people s privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also...
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on dat...
The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video databases for applications such as digital libraries, video production, and a variety of Internet applications, there is a great need to develop effective techniques for content-based video retrieval. One of the main issues in this area of research is how to bridge the semantic gap between low-Ievel features extracted from a video (such as color, texture, shape, motion, and others) and semantics that describe video concept on a higher level. In...
The area of content-based video retrieval is a very hot area both for research and for commercial applications. In order to design effective video dat...
Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these technologies are spreading increasingly into our commercial and private spheres. For many people, these services have changed the way they work, communicate, shop, arrange travel, etc. Remote transactions, however, may also open possibilities for fraud and other types of misuse. Hence, the requi- ment to authorize transactions may arise. Authorization may in turn call for some kind of user authentication. When users have to provide personal inf-...
Advances in information and communication technologies continue to p- vide new means of conducting remote transactions. Services facilitated by these ...
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 r...