Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Multimedia Information Storage and Retrieval: Techniques and Technologies

Buy
Since multimedia systems are required to store and manipulate a variety of media types -- including text, graphics, images, sound, audio, and video among many others -- applications such as video-on-demand systems, interactive television, and video conferencing are becoming widely available at warp speed. This presents new challenges and obstacles to those in the multimedia industry.

Multimedia Information Storage and Retrieval: Techniques and Technologies offers solutions to these challenges, providing data placement techniques, scheduling methods, caching techniques and emerging characteristics of multimedia information. Academicians, students, professionals and practitioners in the multimedia industry will benefit from this ground-breaking publication.

About the Author

Philip Kwok Chung Tse is now with the Department of Electrical and Electronic Engineering of the University of Hong Kong. He received the Bachelor of Science (computing studies) degree from the University of Hong Kong (1983) and a Doctor of Philosophy (computer science) from the Victoria University of Technology (2002). He has taught computer science and information technology subjects in the University of Hong Kong, the Chinese University of Hong Kong, and the Macquarie University, Sydney. He had worked for more than twelve years in the industry prior to joining the academic sector. His research interests include multimedia information storage, and visual information systems.

(HTML tags aren't allowed.)

Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
Just Enough Project Management: The Indispensable Four-Step Process for Managing Any Project Better, Faster, Cheaper
The project-driven approach has proven its value, leading to spectacular results--projects delivered faster and at a more reasonable cost than ever before. Problem is, the project management process used for large projects is too cumbersome and bureaucratic for the projects most of us face, and is often more complex and costly than the problems it...
Mutual Funds: Your Money, Your Choice ... Take Control Now and Build Wealth Wisely
Mutual Funds: Your Money, Your Choice ... Take Control Now and Build Wealth Wisely
Mutual Funds: Your Money, Your Choice gives you an unvarnished look at both the positives and the negatives of mutual fund investing: the real risks, the real costs, the real tax issues, and the real returns. Simply and clearly, without complicated charts or equations, top investment researcher Charles P. Jones...
Linux Device Drivers, 2nd Edition
Linux Device Drivers, 2nd Edition
This practical guide is for anyone who wants to support computer peripherals under the Linux operating system. It shows step-by-step how to write a driver for character devices, block devices, and network interfaces, illustrating with examples you can compile and run. The second edition covers Kernel 2.4 and adds discussions of symmetric...

Database Modeling with Microsoft® Visio for Enterprise Architects, First Edition
Database Modeling with Microsoft® Visio for Enterprise Architects, First Edition

Database Modeling with Microsoft Visio for Enterprise Architects explains how to use the database modeling solution in VEA, providing information unavailable anywhere else. Although primarily focused on tool features, the book also provides an introduction to data modeling using Object-Role Modeling (ORM), a conceptual approach to data...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
©2015 LearnIT (support@pdfchm.net) - Privacy Policy