Focusing on content-based video retrieval, this book explores innovative techniques to bridge the semantic gap between low-level video features and higher-level semantics. Dr. Milan Petković and Prof. Dr. Willem Jonker present three main techniques: a spatio-temporal extension of the Cobra framework, hidden Markov models, and Bayesian belief networks. They evaluate these methods through experiments with real video data and discuss the adaptability of their solutions across multiple domains. Additionally, a prototype video database management system is described, showcasing their proposed techniques.
Willem Jonker Knihy




Secure Data Management
6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings
This book constitutes the refereed proceedings of the 6th VLDB Workshop on Secure Data Management, SDM 2009, held in Lyon, France, on August 28, 2009, in conjunction with VLDB 2009. The 10 revised full papers presented were carefully reviewed and selected from 24 submissions for publication in the book. The topics in this volume range from traditional ones, such as access control and general database security, via provacy protection to new research directions, such as cryptographically enforded access control. The papers are organized in topical sections on database security, access control, and privacy protection.
Secure data management
- 219 stránok
- 8 hodin čítania
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people’s privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also privacy-enhanced, turns out to be a challenging goal that will also seriously in? uence the acceptance of ub- uitous computing and ambient intelligence concepts by society. With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one of the important interdisciplinary - search ? elds that brings together people from the security research community and the data management research community. The call for papers attracted 28 submissions both from universities and industry. The program committee selected 15 researchpapers for presentation at the workshop. The technical c- tributions presented at the SDM workshop are collected in this volume, which, wehope, willserveasavaluableresearchandreferencebookinyourprofessional life.