Showing 1 - 10 results of 10 for search '"lossless data compression"', query time: 0.08s Refine Results
  1. 1

    An Introduction to Single-User Information Theory by Fady Alajaji, Po-Ning Chen. by Alajaji, Fady, Chen, Po-Ning

    Published 2018
    Table of Contents: “…Introduction -- Information Measures for Discrete Systems -- Lossless Data Compression -- Data Transmission and Channel Capacity -- Differential Entropy and Gaussian Channels -- Lossy Data Compression and Transmission.…”
    Full text (Wentworth users only)
    Electronic eBook
  2. 2

    Digital communications : principles and systems / Ifiok Otung. by Otung, Ifiok

    Published 2014
    Full text (Wentworth users only)
    Electronic eBook
  3. 3
  4. 4
  5. 5

    Joomla! 1.5 Multimedia. by Walker, Allan

    Published 2010
    Table of Contents: “…Digital images; Lossy and lossless data compression; Image formats; GIF; JPEG; PNG; SVG; Including images in your content articles and modules; Adding an image using the Joomla! …”
    Full text (Wentworth users only)
    Electronic eBook
  6. 6

    Managing multimedia and unstructured data in the Oracle database / Marcelle Kratochvil. by Kratochvil, Marcelle

    Published 2013
    Table of Contents: “…CompressionLossy data compression; Lossless data compression; Codec; Container; Understanding each image type; Photo; Icon; Color space; Color calibration; The RGB color model family; Viewing colors; Printing using the CMYK colorspace; Other color spaces; Little endian and big endian; Digital image storage formats; Raster graphics formats; Raw; Vector graphics; Audio; Bit rate; Encoding; Channels; Video; Frame; Frame resolution; Frame aspect ratio; Frame rate; Progressive scan versus interlaced; Codecs/containers; Issues when converting; Documents; Terminology; PDF; DOC/DOCX; ODT; TXT.…”
    Full text (Wentworth users only)
    Electronic eBook
  7. 7

    Joomla! 1.5 Multimedia. by Walker, Allan

    Published 2010
    Table of Contents: “…Digital images; Lossy and lossless data compression; Image formats; GIF; JPEG; PNG; SVG; Including images in your content articles and modules; Adding an image using the Joomla! …”
    Full text (Wentworth users only)
    Electronic eBook
  8. 8

    Managing multimedia and unstructured data in the Oracle database / Marcelle Kratochvil. by Kratochvil, Marcelle

    Published 2013
    Table of Contents: “…CompressionLossy data compression; Lossless data compression; Codec; Container; Understanding each image type; Photo; Icon; Color space; Color calibration; The RGB color model family; Viewing colors; Printing using the CMYK colorspace; Other color spaces; Little endian and big endian; Digital image storage formats; Raster graphics formats; Raw; Vector graphics; Audio; Bit rate; Encoding; Channels; Video; Frame; Frame resolution; Frame aspect ratio; Frame rate; Progressive scan versus interlaced; Codecs/containers; Issues when converting; Documents; Terminology; PDF; DOC/DOCX; ODT; TXT.…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 9

    Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings / edited by Tat Wing Chim, Tsz Hon Yuen. by Chim, Tat Wing

    Published 2012
    Table of Contents: “…Audio Steganalysis Based on Lossless Data-Compression Techniques -- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme -- Impact of the Revocation Service in PKI Prices -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem -- Improved Related-Key Differential Attacks on Reduced-Round LBlock -- Countermeasures on Application Level Low-Rate Denial-of-Service Attack -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test -- Group Behavior Metrics for P2P Botnet Detection -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model -- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain -- Perfect Ambiguous Optimistic Fair Exchange -- Privacy-Preserving Noisy Keyword Search in Cloud Computing -- Forward Secure Attribute-Based Signatures -- On Constant-Round Precise Zero-Knowledge -- Outsourcing Encryption of Attribute-Based Encryption with MapReduce -- Security Enhancement of Identity-Based Identification with Reversibility -- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture -- Permission-Based Abnormal Application Detection for Android -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic Approach for Providing Revocation Support in Secret Handshake -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy -- Exploring Mobile Proxies for Better Password Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack -- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack -- Comparison between Side-Channel Analysis Distinguishers -- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware -- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme -- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition -- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack -- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer -- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding -- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance -- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains -- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography -- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances -- Location Privacy Policy Management System -- Privacy Protection in Social Networks Using l-Diversity -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault Scheme -- A New Version of McEliece PKC Based on Convolutional Codes -- Flexible Attribute-Based Encryption -- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles -- A Comparative Study of Malware Family Classification -- A Fine-Grained Classification Approach for the Packed Malicious Code.…”
    Full text (Wentworth users only).
    Electronic eBook
  10. 10

    Database and Expert Systems Applications 23rd International Conference, DEXA 2012, Vienna, Austria, September 3-6, 2012. Proceedings, Part II / edited by Stephen W. Liddle, Klaus-D... by Liddle, Stephen W., 1965-

    Published 2012
    Table of Contents: “…Consistent Query Answering Using Relational Databases through Argumentation -- Analytics-Driven Lossless Data Compression for Rapid In-situ Indexing, Storing, and Querying -- Prediction of Web User Behavior by Discovering Temporal Relational Rules from Web Log Data -- A Hybrid Approach to Text Categorization Applied to Semantic Annotation.-  An Unsupervised Framework for Topological Relations Extraction from Geographic Documents -- Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries -- A Framework for Conditioning Uncertain Relational Data -- Cause Analysis of New Incidents by Using Failure Knowledge Database -- Modeling and Querying Context-Aware Personal Information Spaces -- Ontology-Based Recommendation Algorithms for Personalized Education -- Towards Quantitative Constraints Ranking in Data Clustering -- A Topic-Oriented Analysis of Information Diffusion in a Blogosphere -- Trip Tweets Search by Considering Spatio-temporal Continuity of User Behavior -- Incremental Cosine Computations for Search and Exploration of Tag Spaces -- Impression-Aware Video Stream Retrieval System with Temporal Color-Sentiment Analysis and Visualization -- Dynamic Workload-Based Partitioning for Large-Scale Databases -- Dynamic Vertical Partitioning of Multimedia Databases Using Active Rules -- RTDW-bench: Benchmark for Testing Refreshing Performance of Real-Time Data Warehouse -- Middleware and Language for Sensor Streams -- Statistical Analysis of the owl:sameAs Network for Aligning Concepts in the Linking Open Data Cloud -- Paragraph Tables: A Storage Scheme Based on RDF Document Structure -- Continuously Mining Sliding Window Trend Clusters in a Sensor Network -- Generic Subsequence Matching Framework: Modularity, Flexibility, Efficiency -- R-Proxy Framework for In-DB Data-Parallel Analytics -- View Selection under Multiple Resource Constraints in a Distributed Context -- The Impact of Modes of Mediation on the Web Retrieval Process -- Querying a Semi-automated Data Integration System -- A New Approach for Date Sharing and Recommendation in Social Web -- A Framework for Time-Aware Recommendations -- A Hybrid Time-Series Link Prediction Framework for Large Social Network -- A Comparison of Top-k Temporal Keyword Querying over Versioned Text Collections -- An Efficient SQL Rewrite Approach for Temporal Coalescing in the Teradata RDBMS -- HIP: I nformation Passing for Optimizing Join-Intensive Data Processing Workloads on Hadoop -- All-Visible-k-Nearest-Neighbor Queries -- Algorithm for Term Linearizations of Aggregate Queries with Comparisons -- Evaluating Skyline Queries on Spatial Web Objects.- Alternative Query Optimization for Workload Management -- Online Top-k Similar Time-Lagged Pattern Pair Search in Multiple Time Series.-  Improving the Performance for the Range Search on Metric Spaces Using a Multi-GPU Platform -- A Scheme of Fragment-Based Faceted Image Search -- Indexing Metric Spaces with Nested Forests -- Navigating in Complex Business Processes -- Combining Information and Activities in Business Processes -- Opinion Extraction Applied to Criteria -- SocioPath: Bridging the Gap between Digital and Social Worlds.- Detecting Privacy Violations in Multiple Views Publishing -- Anomaly Discovery and Resolution in MySQL Access Control Policies.  .…”
    Full text (Wentworth users only).
    Electronic eBook