Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)

Buy
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
(HTML tags aren't allowed.)

The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
How to Code .NET: Tips and Tricks for Coding .NET 1.1 and .NET 2.0 Applications Effectively
How to Code .NET: Tips and Tricks for Coding .NET 1.1 and .NET 2.0 Applications Effectively

What is good code? Writing good code is really a question about what the code is trying to solve. (And good code is not to be confused with patternsbecause not all pieces of good code are patterns.) We debate about good code because there is not just a single piece of good code, but so many good pieces of code. And each good piece of code...

Learn Raspberry Pi Programming with Python: Learn to Program on the World's Most Popular Tiny Computer
Learn Raspberry Pi Programming with Python: Learn to Program on the World's Most Popular Tiny Computer
Learn how to program your nifty new $35 computer to make a web spider, a weather station, a media server, and more. This book explores how to make a variety of fun and even useful projects, from a web bot to search and download files to a toy to drive your pets insane.

Even if you're completely new to programming in
...

ESD in Silicon Integrated Circuits
ESD in Silicon Integrated Circuits

In the seven years since the first edition of this book was completed, Electrostatic Discharge (ESD) phenomena in integrated circuits (IC) continues to be important as technologies shrink and the speed and size of the chips increases. The phenomena related to ESD events in semiconductor devices take place outside the realm of normal device...

Real-Time Java Platform Programming
Real-Time Java Platform Programming

Build powerful real-time Java platform applications.

  • The authoritative reference to the Real-Time Specification for Java (RTSJ)—by one of its creators
  • Complete introduction to Java-based RT development—no real-time experience necessary
  • Covers scheduling, asynchronous transfer control,...
Advanced Methods in Cellular Immunology
Advanced Methods in Cellular Immunology

Immunologists as well investigators in other disciplines may often use protocols involving the isolation, cultures and characterization of different types of leukocytes. Advanced Methods in Cellular Immunology is a collection of techniques in an easy-to-use format.

Each chapter provides readers with related program information, a...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy