Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Multimedia Information Storage and Retrieval: Techniques and Technologies

Buy
Since multimedia systems are required to store and manipulate a variety of media types -- including text, graphics, images, sound, audio, and video among many others -- applications such as video-on-demand systems, interactive television, and video conferencing are becoming widely available at warp speed. This presents new challenges and obstacles to those in the multimedia industry.

Multimedia Information Storage and Retrieval: Techniques and Technologies offers solutions to these challenges, providing data placement techniques, scheduling methods, caching techniques and emerging characteristics of multimedia information. Academicians, students, professionals and practitioners in the multimedia industry will benefit from this ground-breaking publication.

About the Author

Philip Kwok Chung Tse is now with the Department of Electrical and Electronic Engineering of the University of Hong Kong. He received the Bachelor of Science (computing studies) degree from the University of Hong Kong (1983) and a Doctor of Philosophy (computer science) from the Victoria University of Technology (2002). He has taught computer science and information technology subjects in the University of Hong Kong, the Chinese University of Hong Kong, and the Macquarie University, Sydney. He had worked for more than twelve years in the industry prior to joining the academic sector. His research interests include multimedia information storage, and visual information systems.

(HTML tags aren't allowed.)

JavaScript™ by Example
JavaScript™ by Example

In JavaScript by Example, Ellie Quigley teaches JavaScript using the same proven approach that's made her the world's favorite scripting author and instructor. This book's unique and classroom-tested learning path contains hundreds of small, easy-to-understand examples that demonstrate the...

Ambient Intelligence: Impact on Embedded System Design
Ambient Intelligence: Impact on Embedded System Design
The emerging Ambient Intelligence vision has the potential to fundamentally change our world. This volume is a preview into the next era of computing. It investigates the impact of Ambient Intelligence on embedded system design. Combining visionary contributions with papers on recent developments, it brings to light the challenges in system design...
Moodle for Mobile Learning
Moodle for Mobile Learning
Mobile devices have become ubiquitous, and both smartphones and tablets offer so many new possibilities for learning. Moodle is gradually becoming more mobile-friendly, with the inclusion of a mobile theme in Moodle 2, the availability of responsive third-party themes, and the launch of an official Moodle app. Moodle and mobile are...

The Autobiography of Malcolm X: As Told to Alex Haley
The Autobiography of Malcolm X: As Told to Alex Haley
Malcolm X's searing memoir belongs on the small shelf of great autobiographies. The reasons are many: the blistering honesty with which he recounts his transformation from a bitter, self-destructive petty criminal into an articulate political activist, the continued relevance of his militant analysis of white racism, and his emphasis on...
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for...
Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
Mission-Critical Security Planner: When Hackers Won't Take No for an Answer
All the worksheets and templates you need to create a complete customized security plan that works for your business

Let’s face it: Security is a business problem, not just a technical challenge. Whether hackers simply want to test their skills or steal your data, they can–and will–do incalculable damage to your company. You...

©2014 LearnIT (support@pdfchm.net) - Privacy Policy