This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017. The 18 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: biometric systems; emerging services with Network Function Virtualization (NFV); multimedia forensics; security protocols; software defined networks; and technologies for Internet of Things (IoT).
This book constitutes the proceedings of the 28th International Tyrrhenian Workshop on Digital Communication, TIWDC 2017, which took place in Palermo, Italy, in September 2017. The 18 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: biometric systems; emerging services with Network Function Virtualization (NFV); multimedia forensics; security protocols; software defined networks; and technologies for Internet of Things (IoT).
Produktdetails
Produktdetails
Communications in Computer and Information Science 766
Biometric systems.- On the use of time information at long distance in biometric online signature recognition.- Automatic Face Recognition and Identification Tools in the Forensic Science Domain.- Biometric Fusion for Palm-Vein Based Recognition Systems.- Emerging services with NFV.- Availability Modeling and Evaluation of a Network Service Deployed via NFV.- Definition and Evaluation of Cold Migration Policies for the Minimization of the Energy Consumption in NFV Architectures.- A Lightweight Prediction Method for Scalable Analytics of Multi-Seasonal KPIs.- Multimedia forensics.- A copy-move detection algorithm based on geometric local binary pattern.- A Dataset for forensic analysis of videos in the wild.- Illumination Analysis in Physics-based Image Forensics: A Joint Discussion of Illumination Direction and Color.- Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling.- Security protocols.- A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices.- Delay Tolerant Revocation Scheme in Delay Tolerant VANETs.- Impact of Spreading Factor Imperfect Orthogonality in LoRa Communications.- Software Defined Networks.- A Network-Assisted Platform for Multipoint Remote Learning.- A de-verticalizing middleware for IoT systems based on Information Centric Networking design.- Technologies for IoT.- Measuring Spectrum Similarity in Distributed Radio Monitoring Systems.- Green and Heuristics-based Consolidation Scheme for Data Center Cloud Applications.- Implementing a per-flow Token Bucket using Open Packet Processor.
Biometric systems.- On the use of time information at long distance in biometric online signature recognition.- Automatic Face Recognition and Identification Tools in the Forensic Science Domain.- Biometric Fusion for Palm-Vein Based Recognition Systems.- Emerging services with NFV.- Availability Modeling and Evaluation of a Network Service Deployed via NFV.- Definition and Evaluation of Cold Migration Policies for the Minimization of the Energy Consumption in NFV Architectures.- A Lightweight Prediction Method for Scalable Analytics of Multi-Seasonal KPIs.- Multimedia forensics.- A copy-move detection algorithm based on geometric local binary pattern.- A Dataset for forensic analysis of videos in the wild.- Illumination Analysis in Physics-based Image Forensics: A Joint Discussion of Illumination Direction and Color.- Matrix Theory for Modeling the Eigenvalue Distribution of Images under Upscaling.- Security protocols.- A Security Evaluation of FIDO's UAF Protocol in Mobile and Embedded Devices.- Delay Tolerant Revocation Scheme in Delay Tolerant VANETs.- Impact of Spreading Factor Imperfect Orthogonality in LoRa Communications.- Software Defined Networks.- A Network-Assisted Platform for Multipoint Remote Learning.- A de-verticalizing middleware for IoT systems based on Information Centric Networking design.- Technologies for IoT.- Measuring Spectrum Similarity in Distributed Radio Monitoring Systems.- Green and Heuristics-based Consolidation Scheme for Data Center Cloud Applications.- Implementing a per-flow Token Bucket using Open Packet Processor.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497