|
Showing 1 - 25 of
68 matches in All Departments
Today, more than 80% of the data transmitted over networks and
archived on our computers, tablets, cell phones or clouds is
multimedia data - images, videos, audio, 3D data. The applications
of this data range from video games to healthcare, and include
computer-aided design, video surveillance and biometrics. It is
becoming increasingly urgent to secure this data, not only during
transmission and archiving, but also during its retrieval and use.
Indeed, in today's "all-digital" world, it is becoming ever-easier
to copy data, view it unrightfully, steal it or falsify it.
Multimedia Security 1 analyzes the issues of the authentication of
multimedia data, code and the embedding of hidden data, both from
the point of view of defense and attack. Regarding the embedding of
hidden data, it also covers invisibility, color, tracing and 3D
data, as well as the detection of hidden messages in an image by
steganalysis.
The linguistic description of Maltese has experienced an
invigorating renaissance in the last ten years. As an Arabic
language with a heavily mixed lexicon, Maltese serves as a
laboratory for questions of linguistic variation on all linguistics
levels, bilingualism, and language contact. This present volume
showcases the variety of up-to-date linguistic research on Maltese.
Starting with a tribute to the late David Cohen, influential French
Semiticist, the remainder of the book is divided into three parts:
Phonology, Morphology & Syntax, and Contact, Bilingualism &
Technology. The papers in the phonology section comprise a
minimalist representation of Maltese sounds from Gilbert Puech, a
detailed account of phonological changes in Maltese based on
onomastic data by Andrei Avram, and the description of lengthening
as a discourse strategy by Alexandra Vella et. al. The section on
morphology and syntax includes both synchronic and diachronic
approaches to variation in Maltese. Maris Camilleri provides a
detailed formal account of the paradigm in Maltese verbal
inflection using a multidimensional model which accounts for
subcategorization frame variation. Doehla's contribution traces the
development of Differential Object Marking (DOM) in Maltese and
draws parallels between similar phenomena in other varieties of
Arabic. Wilmsen provides a detailed history of the polar
interrogative marker -s in Maltese. The article by Stolz &
Saade investigates the variation between long and short independent
pronouns in Maltese taking into account phonological factors,
text-type, and grammatical person. Lucas & Spagnol tackle the
variation of Maltese numerals with respect to phonological and
morphological criteria in their study of the connecting /t/. The
section on Contact, Bilingualism & Technology starts with
Farrugia's description of variation in the assignment of gender for
loanwords in Maltese. Comrie & Spagnol place the make-up of the
borrowed part of the Maltese lexicon in a wider typology of
loanwords in the world's languages. The study by
Azzopardi-Alexander gives detailed insights into bilingual
practices in Malta, placing usage patterns on a continuum between
single language use and different code-switching and code-mixing
practices. In the final paper, John Camilleri shows how the
computational modelling of Maltese grammar has both theoretical and
practical repercussions for the study and teaching of Maltese. As
can be gathered from the wide variety of topics presented in this
volume, Maltese Linguistics has developed from a subdiscipline of
Arabic linguistics to a full academic subject in its own right.
This volume presents an ideal introduction to the wide range of
linguistic topics Maltese has to offer.
Today, more than 80% of the data transmitted over networks and
archived on our computers, tablets, cell phones or clouds is
multimedia data - images, videos, audio, 3D data. The applications
of this data range from video games to healthcare, and include
computer-aided design, video surveillance and biometrics. It is
becoming increasingly urgent to secure this data, not only during
transmission and archiving, but also during its retrieval and use.
Indeed, in today's "all-digital" world, it is becoming ever-easier
to copy data, view it unrightfully, steal it or falsify it.
Multimedia Security 2 analyzes issues relating to biometrics,
protection, integrity and encryption of multimedia data. It also
covers aspects such as crypto-compression of images and videos,
homomorphic encryption, data hiding in the encrypted domain and
secret sharing.
Unlike some other reproductions of classic texts (1) We have not
used OCR(Optical Character Recognition), as this leads to bad
quality books with introduced typos. (2) In books where there are
images such as portraits, maps, sketches etc We have endeavoured to
keep the quality of these images, so they represent accurately the
original artefact. Although occasionally there may be certain
imperfections with these old texts, we feel they deserve to be made
available for future generations to enjoy.
This book constitutes the refereed proceedings of the 13th
Symposium on Theoretical Aspects of Computer Science, STACS 96,
held in Grenoble, France in February 1996.
The 52 revised papers presented were selected from a total of 185
submissions; also included are three invited papers. The volume
addresses all current aspects of theoretical computer science and
is organized in sections on complexity theory, automata theory,
parallel algorithms, learning, parallel and distributed systems,
cryptography, logic and database theory, algorithms, semantics and
program verification, and communication complexity.
This book presents the proceedings of the 12th Annual Symposium on
Theoretical Aspects of Computer Science (STACS 95), held in Munich,
Germany in March 1995.
Besides three invited talks, the book contains revised versions of
53 research papers selected from a total of 180 submissions. The
contributions address all current aspects of theoretical computer
science; they are organized in sections on complexity theory,
automata theory, algorithms, logic, theory of parallel computing,
communication theory, graph theory and databases, and computational
geometry.
Accessible and compact approach Contains interesting examples from
everyday life (including the Paris Metro, a water spider, a gecko,
and duck feathers) Accompanied by additional exercises to enhance
understanding available for download from the CRC Press website
Technology is even more than our world, our form of life, our
civilization. Technology interacts with the world to change it.
Philosophers need to seriously address the fluidity of a smartphone
interface, the efficiency of a Dyson vacuum cleaner, or the
familiar noise of an antique vacuum cleaner. Beyond their
phenomenological description, the emotional experience acquires
moral significance and in some cases even supplies ethical
resources for the self. If we leave this dimension of modern
experience unaddressed, we may miss something of value in
contemporary life. Combining European humanism, Anglophone
pragmatism, and Asian traditions, Michel Puech pleads for an
"ethical turn" in the way we understand and address technological
issues in modern day society. Puech argues that the question of
"power" is what needs to be reconsidered today. In doing so, he
provides a three-tier distinction of power: power to modify the
outer world (our first-intention method in any case: technology);
power over other humans (our enduring obsession: politics and
domination); power over oneself (ethics and wisdom).
Technology is even more than our world, our form of life, our
civilization. Technology interacts with the world to change it.
Philosophers need to seriously address the fluidity of a smartphone
interface, the efficiency of a Dyson vacuum cleaner, or the
familiar noise of an antique vacuum cleaner. Beyond their
phenomenological description, the emotional experience acquires
moral significance and in some cases even supplies ethical
resources for the self. If we leave this dimension of modern
experience unaddressed, we may miss something of value in
contemporary life. Combining European humanism, Anglophone
pragmatism, and Asian traditions, Michel Puech pleads for an
"ethical turn" in the way we understand and address technological
issues in modern day society. Puech argues that the question of
"power" is what needs to be reconsidered today. In doing so, he
provides a three-tier distinction of power: power to modify the
outer world (our first-intention method in any case: technology);
power over other humans (our enduring obsession: politics and
domination); power over oneself (ethics and wisdom).
Accessible and compact approach Contains interesting examples from
everyday life (including the Paris Metro, a water spider, a gecko,
and duck feathers) Accompanied by additional exercises to enhance
understanding available for download from the CRC Press website
Volume XXXI contains the editio princeps of the first group of Aramaic texts (4Q529-549) from Cave 4 which were originally assigned to Père Jean Starcky. They are primarily parabiblical and pseudepigraphical compositions reflecting the interest in biblical themes characteristic of Second Temple Judaism. The commentary is in French.
Maple V est un logiciel de calcul formel qui comporte non seulement
un environnement interactif mais aussi un langage de programmation.
Programmer avec Maple V est un ouvrage entierement nouveau qui
presente les caracteristiques de ce langage de programmation. Apres
une introduction aux principes generaux de la programmation,
l'ouvrage presente les multiples possibilites des structures de
donnees de Maple a travers des exemples varies allant de la simple
evaluation mathematique a la realisation de programmes complexes.
Les chapitres qui suivent sont consacres a des themes particuliers
comme la description des structures de donnees utilisees par Maple
pour elaborer des graphiques des entrees/sorties ou l'utilisation
du debogueur."
Title: La vie de nos ance tres d'apre s leurs livres de raison; ou,
Les Ni mois dans la seconde moitie du XVIIe sie cle.Publisher:
British Library, Historical Print EditionsThe British Library is
the national library of the United Kingdom. It is one of the
world's largest research libraries holding over 150 million items
in all known languages and formats: books, journals, newspapers,
sound recordings, patents, maps, stamps, prints and much more. Its
collections include around 14 million books, along with substantial
additional collections of manuscripts and historical items dating
back as far as 300 BC.The GENERAL HISTORICAL collection includes
books from the British Library digitised by Microsoft. This varied
collection includes material that gives readers a 19th century view
of the world. Topics include health, education, economics,
agriculture, environment, technology, culture, politics, labour and
industry, mining, penal policy, and social order. ++++The below
data was compiled from various identification fields in the
bibliographic record of this title. This data is provided as an
additional tool in helping to insure edition identification: ++++
British Library Puech, Albert; 1888. 460 p.; 8 . 010171.h.7.
|
|