0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 54 matches in All Departments

Handbook of Internet Computing (Paperback): Borko Furht Handbook of Internet Computing (Paperback)
Borko Furht
R1,038 Discovery Miles 10 380 Ships in 12 - 17 working days

Scientists in different geographical locations conduct real-time experiments in a virtual shared workspace. E-commerce provides an emerging market for businesses large and small. E-mail, Servers, and Enterprise Resources Planning have revolutionized businesses on every level. People from all over the globe gather in chat rooms. The Internet is here to stay and Internet technologies and applications continue to grow and evolve. The Handbook of Internet Computing presents comprehensive coverage of all technical issues related to the Internet and its applications. It addresses hot topics such as Internet architectures, content-based multimedia retrieval on the Internet, Web-based collaboration, Web search engines, digital libraries, and more. Real-life examples illustrate the concepts so that technical, non-technical and business people can quickly grasp the fundamentals.

Handbook of Mobile Broadcasting - Dvb-H, Dmb, Isdb-T, and Mediaflo (Paperback): Borko Furht, Syed A. Ahson Handbook of Mobile Broadcasting - Dvb-H, Dmb, Isdb-T, and Mediaflo (Paperback)
Borko Furht, Syed A. Ahson
R1,815 Discovery Miles 18 150 Ships in 12 - 17 working days

Operators are introducing mobile television and digital video content services globally. The Handbook of Mobile Broadcasting addresses all aspects of these services, providing a comprehensive reference on DVB-H, DMB, ISDB-T, and MediaFLO. Featuring contributions from experts in the field, the text presents technical standards and distribution protocols, offering detailed coverage of video coding, including design methodology and error resilience techniques; state-of-the-art technologies such as signaling, optimization, implementation, and simulation; and applications of mobile broadcasting, including emerging areas and new interactive services.

Multimedia Encryption and Authentication Techniques and Applications (Paperback): Borko Furht, Darko Kirovski Multimedia Encryption and Authentication Techniques and Applications (Paperback)
Borko Furht, Darko Kirovski
R1,825 Discovery Miles 18 250 Ships in 12 - 17 working days

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors. Features Describes and evaluates the state of the art in multimedia encryption and authentication techniques and related technologies, architectures, standards, and applications Includes advanced topics, such as chaotic encryption techniques for digital images and video, as well as streaming media encryption Focuses on digital rights management issues for video and for consumer devices Covers key management and protection for IP multimedia, digital media fingerprinting, and signature-based media authentication

Multimedia Security Handbook (Paperback): Borko Furht, Darko Kirovski Multimedia Security Handbook (Paperback)
Borko Furht, Darko Kirovski
R1,801 Discovery Miles 18 010 Ships in 12 - 17 working days

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications. Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part II focuses on multimedia encryption, detailing audio, image, and video encryption techniques. Part III examines watermarking techniques, reviewing current and future trends and discussing multidimensional, fragile, and robust watermarks. Part IV covers multimedia data hiding, fingerprinting, and authentication. The text concludes with chapters describing applications of multimedia protection schemes, presenting topics such as application taxonomy, digital rights management, and techniques for adult image filtering. The Handbook offers comprehensive reference material on advanced topics in the field. It delivers invaluable insight for researchers, practitioners, and engineers involved in designing and developing systems that protect digital multimedia content.

Handbook of Internet Computing (Hardcover): Borko Furht Handbook of Internet Computing (Hardcover)
Borko Furht
R5,536 Discovery Miles 55 360 Ships in 12 - 17 working days

Scientists in different geographical locations conduct real-time experiments in a virtual shared workspace. E-commerce provides an emerging market for businesses large and small. E-mail, Servers, and Enterprise Resources Planning have revolutionized businesses on every level. People from all over the globe gather in chat rooms. The Internet is here to stay and Internet technologies and applications continue to grow and evolve. The Handbook of Internet Computing presents comprehensive coverage of all technical issues related to the Internet and its applications. It addresses hot topics such as Internet architectures, content-based multimedia retrieval on the Internet, Web-based collaboration, Web search engines, digital libraries, and more. Real-life examples illustrate the concepts so that technical, non-technical and business people can quickly grasp the fundamentals.

Long Term Evolution - 3GPP LTE Radio and Cellular Technology (Hardcover): Borko Furht, Syed A. Ahson Long Term Evolution - 3GPP LTE Radio and Cellular Technology (Hardcover)
Borko Furht, Syed A. Ahson
R3,714 Discovery Miles 37 140 Ships in 12 - 17 working days

While 3G has been an outstanding success, the ever-growing demand for higher data rates and higher quality mobile communication services continues to fuel conflict between the rapidly growing number of users and limited bandwidth resources. In the future, a 100-fold increase in mobile data traffic is expected. That will necessitate further improvements to 3GPP LTE (Long-Term Evolution) and create limitless opportunities for engineers who understand the technology and how to apply it to deliver enhanced services. Long Term Evolution: 3GPP LTE Radio and Cellular Technology outlines the best way to position yourself now for future success. With coverage ranging from basic concepts to current research, this comprehensive reference contains technical information about all aspects of 3GPP LTE. It details low chip rate, high-speed downlink/uplink packet access (HSxPA)/TDSCDMA EV 1x, LTE TDD, and 3G TDD. It introduces new technologies and covers methodologies to study the performance of frequency allocation schemes. The authors also discuss the proposed architecture of Mobile IPRR and distributed dynamic architecture in wireless communication, covering performance evaluation of the TD-SCDMA LTE System. With each passing day, more and more users are demanding mobile broadband data access everywhere, to facilitate synchronization of e-mails, Internet access, specific applications, and file downloads to mobile devices such as cell phones, smart phones, PDAs, and notebooks. LTE, successor to the 3G mobile radio network, is essential to creating radio coverage in the rollout phase and high capacity all over the radio cell in the long term. The 3GPP LTE will become increasingly crucial to supporting the high demand of data traffic rates generated by future mobile user terminals. Authored by international experts in the field, this practical book is an extremely valuable guide that addresses emerging current and future technolo

Multimedia Security Handbook (Hardcover, New): Borko Furht, Darko Kirovski Multimedia Security Handbook (Hardcover, New)
Borko Furht, Darko Kirovski
R6,326 Discovery Miles 63 260 Ships in 12 - 17 working days

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications. Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part II focuses on multimedia encryption, detailing audio, image, and video encryption techniques. Part III examines watermarking techniques, reviewing current and future trends and discussing multidimensional, fragile, and robust watermarks. Part IV covers multimedia data hiding, fingerprinting, and authentication. The text concludes with chapters describing applications of multimedia protection schemes, presenting topics such as application taxonomy, digital rights management, and techniques for adult image filtering. The Handbook offers comprehensive reference material on advanced topics in the field. It delivers invaluable insight for researchers, practitioners, and engineers involved in designing and developing systems that protect digital multimedia content.

Digital Image Processing: Practical Approach (Paperback, 1st ed. 2018): Borko Furht, Esad Akar, Whitney Angelica Andrews Digital Image Processing: Practical Approach (Paperback, 1st ed. 2018)
Borko Furht, Esad Akar, Whitney Angelica Andrews
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

The SpringerBrief covers fundamentals of digital image processing including image concept, image file formats, creating user interfaces and many practical examples of processing images using C++ and Java. These practical examples include among other creating image histograms, performing lossless image compression, detecting change in colors, similarity-based image retrieval and others. All practical examples are accompanied with an explanation how to create programs and the obtained results. This SpringerBrief can be very useful for the undergraduate courses on image processing, providing students with the basic tools in image analysis and processing. Practitioners and researchers working in this field will also find this research useful.

Big Data Technologies and Applications (Paperback, Softcover reprint of the original 1st ed. 2016): Borko Furht, Flavio... Big Data Technologies and Applications (Paperback, Softcover reprint of the original 1st ed. 2016)
Borko Furht, Flavio Villanustre
R3,761 Discovery Miles 37 610 Ships in 10 - 15 working days

The objective of this book is to introduce the basic concepts of big data computing and then to describe the total solution of big data problems using HPCC, an open-source computing platform. The book comprises 15 chapters broken into three parts. The first part, Big Data Technologies, includes introductions to big data concepts and techniques; big data analytics; and visualization and learning techniques. The second part, LexisNexis Risk Solution to Big Data, focuses on specific technologies and techniques developed at LexisNexis to solve critical problems that use big data analytics. It covers the open source High Performance Computing Cluster (HPCC Systems (R)) platform and its architecture, as well as parallel data languages ECL and KEL, developed to effectively solve big data problems. The third part, Big Data Applications, describes various data intensive applications solved on HPCC Systems. It includes applications such as cyber security, social network analytics including fraud, Ebola spread modeling using big data analytics, unsupervised learning, and image classification. The book is intended for a wide variety of people including researchers, scientists, programmers, engineers, designers, developers, educators, and students. This book can also be beneficial for business managers, entrepreneurs, and investors.

Big Data Technologies and Applications (Hardcover, 1st ed. 2016): Borko Furht, Flavio Villanustre Big Data Technologies and Applications (Hardcover, 1st ed. 2016)
Borko Furht, Flavio Villanustre
R5,218 Discovery Miles 52 180 Ships in 10 - 15 working days

The objective of this book is to introduce the basic concepts of big data computing and then to describe the total solution of big data problems using HPCC, an open-source computing platform. The book comprises 15 chapters broken into three parts. The first part, Big Data Technologies, includes introductions to big data concepts and techniques; big data analytics; and visualization and learning techniques. The second part, LexisNexis Risk Solution to Big Data, focuses on specific technologies and techniques developed at LexisNexis to solve critical problems that use big data analytics. It covers the open source High Performance Computing Cluster (HPCC Systems (R)) platform and its architecture, as well as parallel data languages ECL and KEL, developed to effectively solve big data problems. The third part, Big Data Applications, describes various data intensive applications solved on HPCC Systems. It includes applications such as cyber security, social network analytics including fraud, Ebola spread modeling using big data analytics, unsupervised learning, and image classification. The book is intended for a wide variety of people including researchers, scientists, programmers, engineers, designers, developers, educators, and students. This book can also be beneficial for business managers, entrepreneurs, and investors.

Virtualization Techniques for Mobile Systems (Paperback, Softcover reprint of the original 1st ed. 2014): David Jaramillo,... Virtualization Techniques for Mobile Systems (Paperback, Softcover reprint of the original 1st ed. 2014)
David Jaramillo, Borko Furht, Ankur Agarwal
R1,773 Discovery Miles 17 730 Ships in 10 - 15 working days

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Innovative Web Applications for Analyzing Traffic Operations (Paperback, 1st ed. 2016): Natasha Petrovska, Aleksandar... Innovative Web Applications for Analyzing Traffic Operations (Paperback, 1st ed. 2016)
Natasha Petrovska, Aleksandar Stevanovic, Borko Furht
R1,687 Discovery Miles 16 870 Ships in 10 - 15 working days

In response to the need to improve road traffic operation, researchers implement advanced technologies and integration of systems and data, and develop state-of-the-art applications to assist traffic engineers. This SpringerBrief introduces three novel Web applications which can be an exceptional resource and a good visualization tool for traffic operators, managers, and analysts to monitor the congestion, and analyze incidents and signal performance measures. The applications offer more detailed analysis providing users with insights from different levels and perspectives. The benefit of providing these automated and interactive visualization tools is more efficient estimation of the local transport networks' performance, thus facilitating the decision making process in case of emergency events.

Handbook of Social Network Technologies and Applications (Paperback, 2010 ed.): Borko Furht Handbook of Social Network Technologies and Applications (Paperback, 2010 ed.)
Borko Furht
R4,624 Discovery Miles 46 240 Ships in 10 - 15 working days

Social networking is a concept that has existed for a long time; however, with the explosion of the Internet, social networking has become a tool for people to connect and communicate in ways that were impossible in the past. The recent development of Web 2.0 has provided many new applications, such as Myspace, Facebook, and LinkedIn. The purpose of Handbook of Social Network Technologies and Applications is to provide comprehensive guidelines on the current and future trends in social network technologies and applications in the field of Web-based Social Networks. This handbook includes contributions from world experts in the field of social networks from both academia and private industry. A number of crucial topics are covered including Web and software technologies and communication technologies for social networks. Web-mining techniques, visualization techniques, intelligent social networks, Semantic Web, and many other topics are covered. Standards for social networks, case studies, and a variety of applications are covered as well.

Handbook of Cloud Computing (Paperback, 2010 ed.): Borko Furht, Armando Escalante Handbook of Cloud Computing (Paperback, 2010 ed.)
Borko Furht, Armando Escalante
R4,853 Discovery Miles 48 530 Ships in 10 - 15 working days

Cloud computing has become a significant technology trend. Experts believe cloud computing is currently reshaping information technology and the IT marketplace. The advantages of using cloud computing include cost savings, speed to market, access to greater computing resources, high availability, and scalability. Handbook of Cloud Computing includes contributions from world experts in the field of cloud computing from academia, research laboratories and private industry. This book presents the systems, tools, and services of the leading providers of cloud computing; including Google, Yahoo, Amazon, IBM, and Microsoft. The basic concepts of cloud computing and cloud computing applications are also introduced. Current and future technologies applied in cloud computing are also discussed. Case studies, examples, and exercises are provided throughout. Handbook of Cloud Computing is intended for advanced-level students and researchers in computer science and electrical engineering as a reference book. This handbook is also beneficial to computer and system infrastructure designers, developers, business managers, entrepreneurs and investors within the cloud computing related industry.

Handbook of Multimedia for Digital Entertainment and Arts (Paperback, 2009 ed.): Borko Furht Handbook of Multimedia for Digital Entertainment and Arts (Paperback, 2009 ed.)
Borko Furht
R5,913 Discovery Miles 59 130 Ships in 10 - 15 working days

The advances in computer entertainment, multi-player and online games, technology-enabled art, culture and performance have created a new form of entertainment and art. The success of this new field has influenced the development of the digital entertainment industry and related products/services, which has impacted every aspect of our lives. Handbook of Multimedia for Digital Entertainment and Arts is an edited volume contributed by worldwide experts in the field of the new digital and interactive media, and their applications in entertainment and arts. This handbook covers leading edge media technologies, and the latest research applied to digital entertainment and arts. The main focus of Handbook of Multimedia for Digital Entertainment and Arts targets interactive and online games, edutainment, e-performance, personal broadcasting, innovative technologies for digital arts, digital visual and auditory media, augmented reality, moving media, and other advanced topics. The final chapters of this book present future trends and developments within this explosive field. Handbook of Multimedia for Digital Entertainment and Arts serves as a primary reference for advanced-level students, researchers and professors studying computer science and electrical engineering. With the dramatic growth of interactive digital entertainment and art applications, this handbook is also suitable as a reference for practitioners, programmers, and engineers working in this field.

Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.): David Jaramillo, Borko Furht, Ankur Agarwal Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.)
David Jaramillo, Borko Furht, Ankur Agarwal
R1,526 Discovery Miles 15 260 Ships in 10 - 15 working days

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Handbook of Data Intensive Computing (Paperback, 2011): Borko Furht, Armando Escalante Handbook of Data Intensive Computing (Paperback, 2011)
Borko Furht, Armando Escalante
R3,375 Discovery Miles 33 750 Ships in 10 - 15 working days

Data Intensive Computing refers to capturing, managing, analyzing, and understanding data at volumes and rates that push the frontiers of current technologies. The challenge of data intensive computing is to provide the hardware architectures and related software systems and techniques which are capable of transforming ultra-large data into valuable knowledge. "Handbook of Data Intensive Computing" is written by leading international experts in the field. Experts from academia, research laboratories and private industry address both theory and application. Data intensive computing demands a fundamentally different set of principles than mainstream computing. Data-intensive applications typically are well suited for large-scale parallelism over the data and also require an extremely high degree of fault-tolerance, reliability, and availability. Real-world examples are provided throughout the book.

"Handbook of Data Intensive Computing" is designed as a reference for practitioners and researchers, including programmers, computer and system infrastructure designers, and developers. This book can also be beneficial for business managers, entrepreneurs, and investors.

Motion Estimation Algorithms for Video Compression (Paperback, Softcover reprint of the original 1st ed. 1997): Borko Furht,... Motion Estimation Algorithms for Video Compression (Paperback, Softcover reprint of the original 1st ed. 1997)
Borko Furht, Joshua Greenberg, Raymond Westwater
R5,721 Discovery Miles 57 210 Ships in 10 - 15 working days

Video technology promises to be the key for the transmission of motion video. A number of video compression techniques and standards have been introduced in the past few years, particularly the MPEG-1 and MPEG-2 for interactive multimedia and for digital NTSC and HDTV applications, and H.2611H.263 for video telecommunications. These techniques use motion estimation techniques to reduce the amount of data that is stored and transmitted for each frame. This book is about these motion estimation algorithms, their complexity, implementations, advantages, and drawbacks. First, we present an overview of video compression techniques with an emphasis to techniques that use motion estimation, such as MPEG and H.2611H.263. Then, we give a survey of current motion estimation search algorithms, including the exhaustive search and a number of fast search algorithms. An evaluation of current search algorithms, based on a number of experiments on several test video sequences, is presented as well. The theoretical framework for a new fast search algorithm, Densely-Centered Uniform-P Search (DCUPS), is developed and presented in the book. The complexity of the DCUPS algorithm is comparable to other popular motion estimation techniques, however the algorithm shows superior results in terms of compression ratios and video qUality. We should stress out that these new results, presented in Chapters 4 and 5, have been developed by Joshua Greenberg, as part of his M.Sc. thesis entitled "Densely-Centered Uniform P-Search: A Fast Motion Estimation Algorithm" (FAU, 1996).

Real-Time Video Compression - Techniques and Algorithms (Paperback, Softcover reprint of the original 1st ed. 1997): Raymond... Real-Time Video Compression - Techniques and Algorithms (Paperback, Softcover reprint of the original 1st ed. 1997)
Raymond Westwater, Borko Furht
R2,917 Discovery Miles 29 170 Ships in 10 - 15 working days

Real-Time Video Compression: Techniques and Algorithms introduces the XYZ video compression technique, which operates in three dimensions, eliminating the overhead of motion estimation. First, video compression standards, MPEG and H.261/H.263, are described. They both use asymmetric compression algorithms, based on motion estimation. Their encoders are much more complex than decoders. The XYZ technique uses a symmetric algorithm, based on the Three-Dimensional Discrete Cosine Transform (3D-DCT). 3D-DCT was originally suggested for compression about twenty years ago; however, at that time the computational complexity of the algorithm was too high, it required large buffer memory, and was not as effective as motion estimation. We have resurrected the 3D-DCT-based video compression algorithm by developing several enhancements to the original algorithm. These enhancements make the algorithm feasible for real-time video compression in applications such as video-on-demand, interactive multimedia, and videoconferencing. The demonstrated results, presented in this book, suggest that the XYZ video compression technique is not only a fast algorithm, but also provides superior compression ratios and high quality of the video compared to existing standard techniques, such as MPEG and H.261/H.263. The elegance of the XYZ technique is in its simplicity, which leads to inexpensive VLSI implementation of any XYZ codec. Real-Time Video Compression: Techniques and Algorithms can be used as a text for graduate students and researchers working in the area of real-time video compression. In addition, the book serves as an essential reference for professionals in the field.

Video and Image Processing in Multimedia Systems (Paperback, Softcover reprint of the original 1st ed. 1995): Borko Furht,... Video and Image Processing in Multimedia Systems (Paperback, Softcover reprint of the original 1st ed. 1995)
Borko Furht, Stephen W. Smoliar, HongJiang Zhang
R5,789 Discovery Miles 57 890 Ships in 10 - 15 working days

Video and Image Processing in Multimedia Systems treats a number of critical topics in multimedia systems, with respect to image and video processing techniques and their implementations. These techniques include: * Image and video compression techniques and standards, and * Image and video indexing and retrieval techniques. Video and Image Processing in Multimedia Systems is divided into three parts. Part I serves as an introduction to multimedia systems, discussing basic concepts, multimedia networking and synchronization, and an overview of multimedia applications. Part II presents comprehensive coverage of image and video compression techniques and standards, their implementations and applications. Because multimedia data (specifically video and images) require efficient compression techniques in order to be stored and delivered in real-time, video and image compression is a crucial element of an effective multimedia system. In Part III attention is focused on the semantic nature of image and video source material, and how that material may be effectively indexed and retrieved.Topics discussed include static images, full-motion video, and the manner in which compressed representations can facilitate structural analysis. Part III concludes with an extended discussion of a case study. This book serves as an invaluable reference with respect to the most important standards in the field. Video and Image Processing in Multimedia Systems is suitable as a textbook for course use.

Content-Based Image and Video Retrieval (Paperback, Softcover reprint of the original 1st ed. 2002): Oge Marques, Borko Furht Content-Based Image and Video Retrieval (Paperback, Softcover reprint of the original 1st ed. 2002)
Oge Marques, Borko Furht
R4,455 Discovery Miles 44 550 Ships in 10 - 15 working days

Content-Based Image And Video Retrieval addresses the basic concepts and techniques for designing content-based image and video retrieval systems. It also discusses a variety of design choices for the key components of these systems. This book gives a comprehensive survey of the content-based image retrieval systems, including several content-based video retrieval systems. The survey includes both research and commercial content-based retrieval systems. Content-Based Image And Video Retrieval includes pointers to two hundred representative bibliographic references on this field, ranging from survey papers to descriptions of recent work in the area, entire books and more than seventy websites. Finally, the book presents a detailed case study of designing MUSE-a content-based image retrieval system developed at Florida Atlantic University in Boca Raton, Florida.

Real-Time UNIX (R) Systems - Design and Application Guide (Paperback, Softcover reprint of the original 1st ed. 1991): Borko... Real-Time UNIX (R) Systems - Design and Application Guide (Paperback, Softcover reprint of the original 1st ed. 1991)
Borko Furht, Dan Grostick, David Gluch, Guy Rabbat, John Parker, …
R4,477 Discovery Miles 44 770 Ships in 10 - 15 working days

A growing concern of mine has been the unrealistic expectations for new computer-related technologies introduced into all kinds of organizations. Unrealistic expectations lead to disappointment, and a schizophrenic approach to the introduction of new technologies. The UNIX and real-time UNIX operating system technologies are major examples of emerging technologies with great potential benefits but unrealistic expectations. Users want to use UNIX as a common operating system throughout large segments of their organizations. A common operating system would decrease software costs by helping to provide portability and interoperability between computer systems in today's multivendor environments. Users would be able to more easily purchase new equipment and technologies and cost-effectively reuse their applications. And they could more easily connect heterogeneous equipment in different departments without having to constantly write and rewrite interfaces. On the other hand, many users in various organizations do not understand the ramifications of general-purpose versus real-time UNIX. Users tend to think of "real-time" as a way to handle exotic heart-monitoring or robotics systems. Then these users use UNIX for transaction processing and office applications and complain about its performance, robustness, and reliability. Unfortunately, the users don't realize that real-time capabilities added to UNIX can provide better performance, robustness and reliability for these non-real-time applications. Many other vendors and users do realize this, however. There are indications even now that general-purpose UNIX will go away as a separate entity. It will be replaced by a real-time UNIX. General-purpose UNIX will exist only as a subset of real-time UNIX.

Multimedia Tools and Applications (Paperback, Softcover reprint of the original 1st ed. 1996): Borko Furht Multimedia Tools and Applications (Paperback, Softcover reprint of the original 1st ed. 1996)
Borko Furht
R4,520 Discovery Miles 45 200 Ships in 10 - 15 working days

Multimedia computing has emerged in the last few years as a major area of research. Multimedia computer systems have opened a wide range of applications by combining a variety of information sources, such as voice, graphics, animation, images, audio, and full-motion video. Looking at the big picture, multimedia can be viewed as the merging of three industries: the computer, communications, and broadcasting industries. Research and development efforts in multimedia computing can be divided into two areas. As the first area of research, much effort has been centered on the stand-alone multimedia workstation and associated software systems and tools, such as music composition, computer-aided education and training, and interactive video. However, the combination of multimedia computing with distributed systems offers even greater potential. New applications based on distributed multimedia systems include multimedia information systems, collaborative and videoconferencing systems, on-demand multimedia services, and distance learning. Multimedia Tools and Applications is one of two volumes published by Kluwer, both of which provide a broad introduction to this fast moving area. This book covers selected tools applied in multimedia systems and key multimedia applications. Topics presented include multimedia application development techniques, techniques for content-based manipulation of image databases, techniques for selection and dissemination of digital video, and tools for digital video segmentation. Selected key applications described in the book include multimedia news services, multimedia courseware and training, interactive television systems, digital video libraries, multimedia messaging systems, and interactive multimedia publishing systems. The second book, Multimedia Systems and Techniques, covers fundamental concepts and techniques used in multimedia systems. The topics include multimedia objects and related models, multimedia compression techniques and standards, multimedia interfaces, multimedia storage techniques, multimedia communication and networking, multimedia synchronization techniques, multimedia information systems, scheduling in multimedia systems, and video indexing and retrieval techniques. Multimedia Tools and Applications, along with its companion volume, is intended for anyone involved in multimedia system design and applications and can be used as a textbook for advanced courses on multimedia.

Multimedia Systems and Techniques (Paperback, Softcover reprint of the original 1st ed. 1996): Borko Furht Multimedia Systems and Techniques (Paperback, Softcover reprint of the original 1st ed. 1996)
Borko Furht
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

Multimedia computing has emerged in the last few years as a major area of research. Multimedia computer systems have opened a wide range of applications by combining a variety of information sources, such as voice, graphics, animation, images, audio and full-motion video. Looking at the big picture, multimedia can be viewed as the merging of three industries: computer, communications, and broadcasting industries. Research and development efforts can be divided into two areas. As the first area of research, much effort has been centered on the stand-alone multimedia workstation and associated software systems and tools, such as music composition, computer-aided education and training, and interactive video. However, the combination of multimedia computing with distributed systems offers even greater potential. New applications based on distributed multimedia systems include multimedia information systems, collaborative and video conferencing systems, on-demand multimedia services, and distance learning. Multimedia Systems and Techniques is one of two volumes published by Kluwer, both of which provide a broad introduction into this fast moving area. The book covers fundamental concepts and techniques used in multimedia systems. The topics include multimedia objects and related models, multimedia compression techniques and standards, multimedia interfaces, multimedia storage techniques, multimedia communication and networking, multimedia synchronization techniques, multimedia information systems, scheduling in multimedia systems, and video indexing and retrieval techniques. Multimedia Systems and Techniques, together with its companion volume, Multimedia Tools and Applications, is intended for anyone involved in multimedia system design and applications and can be used as a textbook for advanced courses on multimedia.

Multimedia Encryption and Watermarking (Paperback, Softcover reprint of hardcover 1st ed. 2005): Borko Furht, Edin Muharemagic,... Multimedia Encryption and Watermarking (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Borko Furht, Edin Muharemagic, Daniel Socek
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio sharing techniques. Part III, Digital Watermarking, introduces the concept of watermarking for multimedia, classifies watermarking applications, and evaluates various multimedia watermarking concepts and techniques, including digital watermarking techniques for binary images. Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia content. This volume is also suitable as a textbook for graduate courses on multimedia security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Little Live Pets Lil' Bird and Birdhouse…
R499 R269 Discovery Miles 2 690
Poldark: Series 1-2
Aidan Turner, Eleanor Tomlinson, … Blu-ray disc  (1)
R55 Discovery Miles 550
Meet The Moonlight
Jack Johnson CD R430 Discovery Miles 4 300
Stealth SX-C10-X Twin Rechargeable…
R499 R269 Discovery Miles 2 690
It: Chapter 1
Bill Skarsgård Blu-ray disc R111 Discovery Miles 1 110
Dala Craft Pom Poms - Assorted Colours…
R36 Discovery Miles 360
Cable Guy Ikon "Light Up" Marvel…
R543 Discovery Miles 5 430
ASUS VA24EHF 24" Eye Care Monitor
R2,999 R2,562 Discovery Miles 25 620
Kendall Office Chair (Green)
 (1)
R1,699 R1,346 Discovery Miles 13 460
Happier Than Ever
Billie Eilish CD  (1)
R426 Discovery Miles 4 260

 

Partners