Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Database management 3
- Data encryption (Computer science) 2
- Data structures (Computer science) 2
- Mathematics 2
- Multimedia systems 2
- Open source software 2
- Web site development 2
- Artificial intelligence 1
- Coding theory 1
- Computational linguistics 1
- Computer hardware 1
- Computer networks 1
- Computer security 1
- Computer software 1
- Data mining 1
- Data protection 1
- Design and construction 1
- Digital communications 1
- Equipment and supplies 1
- Information storage and retrieval systems 1
- Information theory 1
- Microprocessors 1
- Oracle (Computer file) 1
- Statistics 1
Search alternatives:
"lossless data compression" » "lossless image compression" (Expand Search), "lossless _ compression" (Expand Search), "losses data compression" (Expand Search)
"lossless data compression" » "lossless image compression" (Expand Search), "lossless _ compression" (Expand Search), "losses data compression" (Expand Search)
-
1
An Introduction to Single-User Information Theory by Fady Alajaji, Po-Ning Chen.
Published 2018Table of Contents: “…Introduction -- Information Measures for Discrete Systems -- Lossless Data Compression -- Data Transmission and Channel Capacity -- Differential Entropy and Gaussian Channels -- Lossy Data Compression and Transmission.…”
Full text (Wentworth users only)
Electronic eBook -
2
Digital communications : principles and systems / Ifiok Otung.
Published 2014Full text (Wentworth users only)
Electronic eBook -
3
-
4
-
5
Joomla! 1.5 Multimedia.
Published 2010Table of Contents: “…Digital images; Lossy and lossless data compression; Image formats; GIF; JPEG; PNG; SVG; Including images in your content articles and modules; Adding an image using the Joomla! …”
Full text (Wentworth users only)
Electronic eBook -
6
Managing multimedia and unstructured data in the Oracle database / Marcelle Kratochvil.
Published 2013Table of Contents: “…CompressionLossy data compression; Lossless data compression; Codec; Container; Understanding each image type; Photo; Icon; Color space; Color calibration; The RGB color model family; Viewing colors; Printing using the CMYK colorspace; Other color spaces; Little endian and big endian; Digital image storage formats; Raster graphics formats; Raw; Vector graphics; Audio; Bit rate; Encoding; Channels; Video; Frame; Frame resolution; Frame aspect ratio; Frame rate; Progressive scan versus interlaced; Codecs/containers; Issues when converting; Documents; Terminology; PDF; DOC/DOCX; ODT; TXT.…”
Full text (Wentworth users only)
Electronic eBook -
7
Joomla! 1.5 Multimedia.
Published 2010Table of Contents: “…Digital images; Lossy and lossless data compression; Image formats; GIF; JPEG; PNG; SVG; Including images in your content articles and modules; Adding an image using the Joomla! …”
Full text (Wentworth users only)
Electronic eBook -
8
Managing multimedia and unstructured data in the Oracle database / Marcelle Kratochvil.
Published 2013Table of Contents: “…CompressionLossy data compression; Lossless data compression; Codec; Container; Understanding each image type; Photo; Icon; Color space; Color calibration; The RGB color model family; Viewing colors; Printing using the CMYK colorspace; Other color spaces; Little endian and big endian; Digital image storage formats; Raster graphics formats; Raw; Vector graphics; Audio; Bit rate; Encoding; Channels; Video; Frame; Frame resolution; Frame aspect ratio; Frame rate; Progressive scan versus interlaced; Codecs/containers; Issues when converting; Documents; Terminology; PDF; DOC/DOCX; ODT; TXT.…”
Full text (Wentworth users only)
Electronic eBook -
9
Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings / edited by Tat Wing Chim, Tsz Hon Yuen.
Published 2012Table of Contents: “…Audio Steganalysis Based on Lossless Data-Compression Techniques -- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme -- Impact of the Revocation Service in PKI Prices -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem -- Improved Related-Key Differential Attacks on Reduced-Round LBlock -- Countermeasures on Application Level Low-Rate Denial-of-Service Attack -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test -- Group Behavior Metrics for P2P Botnet Detection -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model -- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain -- Perfect Ambiguous Optimistic Fair Exchange -- Privacy-Preserving Noisy Keyword Search in Cloud Computing -- Forward Secure Attribute-Based Signatures -- On Constant-Round Precise Zero-Knowledge -- Outsourcing Encryption of Attribute-Based Encryption with MapReduce -- Security Enhancement of Identity-Based Identification with Reversibility -- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture -- Permission-Based Abnormal Application Detection for Android -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic Approach for Providing Revocation Support in Secret Handshake -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy -- Exploring Mobile Proxies for Better Password Authentication -- On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack -- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack -- Comparison between Side-Channel Analysis Distinguishers -- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware -- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme -- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition -- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack -- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer -- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding -- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance -- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains -- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography -- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances -- Location Privacy Policy Management System -- Privacy Protection in Social Networks Using l-Diversity -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault Scheme -- A New Version of McEliece PKC Based on Convolutional Codes -- Flexible Attribute-Based Encryption -- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles -- A Comparative Study of Malware Family Classification -- A Fine-Grained Classification Approach for the Packed Malicious Code.…”
Full text (Wentworth users only).
Electronic eBook -
10
Database and Expert Systems Applications 23rd International Conference, DEXA 2012, Vienna, Austria, September 3-6, 2012. Proceedings, Part II / edited by Stephen W. Liddle, Klaus-D...
Published 2012Table of Contents: “…Consistent Query Answering Using Relational Databases through Argumentation -- Analytics-Driven Lossless Data Compression for Rapid In-situ Indexing, Storing, and Querying -- Prediction of Web User Behavior by Discovering Temporal Relational Rules from Web Log Data -- A Hybrid Approach to Text Categorization Applied to Semantic Annotation.- An Unsupervised Framework for Topological Relations Extraction from Geographic Documents -- Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries -- A Framework for Conditioning Uncertain Relational Data -- Cause Analysis of New Incidents by Using Failure Knowledge Database -- Modeling and Querying Context-Aware Personal Information Spaces -- Ontology-Based Recommendation Algorithms for Personalized Education -- Towards Quantitative Constraints Ranking in Data Clustering -- A Topic-Oriented Analysis of Information Diffusion in a Blogosphere -- Trip Tweets Search by Considering Spatio-temporal Continuity of User Behavior -- Incremental Cosine Computations for Search and Exploration of Tag Spaces -- Impression-Aware Video Stream Retrieval System with Temporal Color-Sentiment Analysis and Visualization -- Dynamic Workload-Based Partitioning for Large-Scale Databases -- Dynamic Vertical Partitioning of Multimedia Databases Using Active Rules -- RTDW-bench: Benchmark for Testing Refreshing Performance of Real-Time Data Warehouse -- Middleware and Language for Sensor Streams -- Statistical Analysis of the owl:sameAs Network for Aligning Concepts in the Linking Open Data Cloud -- Paragraph Tables: A Storage Scheme Based on RDF Document Structure -- Continuously Mining Sliding Window Trend Clusters in a Sensor Network -- Generic Subsequence Matching Framework: Modularity, Flexibility, Efficiency -- R-Proxy Framework for In-DB Data-Parallel Analytics -- View Selection under Multiple Resource Constraints in a Distributed Context -- The Impact of Modes of Mediation on the Web Retrieval Process -- Querying a Semi-automated Data Integration System -- A New Approach for Date Sharing and Recommendation in Social Web -- A Framework for Time-Aware Recommendations -- A Hybrid Time-Series Link Prediction Framework for Large Social Network -- A Comparison of Top-k Temporal Keyword Querying over Versioned Text Collections -- An Efficient SQL Rewrite Approach for Temporal Coalescing in the Teradata RDBMS -- HIP: I nformation Passing for Optimizing Join-Intensive Data Processing Workloads on Hadoop -- All-Visible-k-Nearest-Neighbor Queries -- Algorithm for Term Linearizations of Aggregate Queries with Comparisons -- Evaluating Skyline Queries on Spatial Web Objects.- Alternative Query Optimization for Workload Management -- Online Top-k Similar Time-Lagged Pattern Pair Search in Multiple Time Series.- Improving the Performance for the Range Search on Metric Spaces Using a Multi-GPU Platform -- A Scheme of Fragment-Based Faceted Image Search -- Indexing Metric Spaces with Nested Forests -- Navigating in Complex Business Processes -- Combining Information and Activities in Business Processes -- Opinion Extraction Applied to Criteria -- SocioPath: Bridging the Gap between Digital and Social Worlds.- Detecting Privacy Violations in Multiple Views Publishing -- Anomaly Discovery and Resolution in MySQL Access Control Policies. .…”
Full text (Wentworth users only).
Electronic eBook