pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: MULTIMEDIA DATABASE SYSTEMS
ISSUES AND RESEARCH DIRECTIONS
By: V. S. Subrahmanian (Editor), Sushil Jajodia (Editor)
Format: Paperback

List price: £94.50


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3642646220
ISBN 13: 9783642646225
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 27 September, 2011
Edition: Softcover reprint of the original 1st ed. 1996
Series: Artificial Intelligence
Pages: 323
Synopsis: With the rapid growth in the use of computers to manipulate, process, and reason about multimedia data, the problem of how to store and retrieve such data is becoming increasingly important. Thus, although the field of multimedia database systems is only about 5 years old, it is rapidly becoming a focus for much excitement and research effort. Multimedia database systems are intended to provide unified frameworks for requesting and integrating information in a wide variety of formats, such as audio and video data, document data, and image data. Such data often have special storage requirements that are closely coupled to the various kinds of devices that are used for recording and presenting the data, and for each form of data there are often multiple representations and multiple standards - all of which make the database integration task quite complex. Some of the problems include: - what a multimedia database query means - what kinds of languages to use for posing queries - how to develop compilers for such languages - how to develop indexing structures for storing media on ancillary devices - data compression techniques - how to present and author presentations based on user queries. Although approaches are being developed for a number of these problems, they have often been ad hoc in nature, and there is a need to provide a princi- pled theoretical foundation.
Illustrations: 9 Tables, black and white; XVI, 323 p.
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
A GENERAL FRAMEWORK FOR REASONING ON INCONSISTENCY (PB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (HB)
ADVANCED TRANSACTION MODELS AND ARCHITECTURES (PB)
ADVANCES IN MULTIMEDIA INFORMATION SYSTEMS (PB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (HB)
APPLICATIONS OF DATA MINING IN COMPUTER SECURITY (PB)
COMPUTATIONAL ANALYSIS OF TERRORIST GROUPS: LASHKAR-E-TAIBA (HB)
COMPUTATIONAL ANALYSIS OF TERRORIST GROUPS: LASHKAR-E-TAIBA (PB)
COMPUTER SECURITY - ESORICS 2008 (PB)
COMPUTER SECURITY -- ESORICS 2013 (PB)
CONCEPTUAL MODELING (PB)
CYBER DECEPTION (HB)
CYBER DECEPTION : BUILDING THE SCIENTIFI (PB)
CYBER SITUATIONAL AWARENESS (HB)
CYBER SITUATIONAL AWARENESS (PB)
CYBER WARFARE (HB)
CYBER WARFARE (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY (PB)
DATA AND APPLICATIONS SECURITY XIX (PB)
DATABASE SECURITY XII (HB)
DATABASE SECURITY XII (PB)
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY (HB)
GEOSPATIAL ABDUCTION (HB)
GEOSPATIAL ABDUCTION (PB)
GLOBAL CYBER-VULNERABILITY REPORT (PB)
GRAPHICAL MODELS FOR SECURITY (PB)
HANDBOOK OF COMPUTATIONAL APPROACHES TO COUNTERTERRORISM (HB)
HANDBOOK OF COMPUTATIONAL APPROACHES TO COUNTERTERRORISM (PB)
HANDBOOK OF DATABASE SECURITY (HB)
HANDBOOK OF DATABASE SECURITY (PB)
HETEROGENEOUS AGENT SYSTEMS (HB)
HETEROGENEOUS AGENT SYSTEMS (PB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (HB)
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (PB)
INDIAN MUJAHIDEEN (HB)
INDIAN MUJAHIDEEN (PB)
INFORMATION HIDING (HB)
INFORMATION HIDING (PB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (HB)
INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY (PB)
INFORMATION SECURITY THEORY AND PRACTICE (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INFORMATION SYSTEMS SECURITY (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS (PB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (HB)
INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS VI (PB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (HB)
INTRUSION DETECTION IN DISTRIBUTED SYSTEMS (PB)
JOURNAL ON DATA SEMANTICS II (PB)
MACHINE LEARNING BASED MODEL OF BOKO HARAM
MACHINE LEARNING BASED MODEL OF BOKO HARAM (HB)
MOVING TARGET DEFENSE (HB)
MOVING TARGET DEFENSE (PB)
MOVING TARGET DEFENSE II (HB)
MOVING TARGET DEFENSE II (PB)
MULTILEVEL SECURE TRANSACTION PROCESSING (HB)
MULTILEVEL SECURE TRANSACTION PROCESSING (PB)
MULTIMEDIA DATABASE SYSTEMS (HB)
MULTIMEDIA INFORMATION SYSTEMS (HB)
MULTIMEDIA INFORMATION SYSTEMS (PB)
NETWORK HARDENING (PB)
NETWORK SECURITY METRICS
NETWORK SECURITY METRICS (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (HB)
PRESERVING PRIVACY IN ON-LINE ANALYTICAL PROCESSING (OLAP) (PB)
PRINCIPLES OF MULTIMEDIA DATABASE SYSTEMS (HB)
PRIVACY IN LOCATION-BASED APPLICATIONS (PB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (HB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (PB)
SCALABLE UNCERTAINTY MANAGEMENT (PB)
SCALABLE UNCERTAINTY MANAGEMENT (PB)
SECURE CLOUD COMPUTING (HB)
SECURE CLOUD COMPUTING (PB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (HB)
SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS (PB)
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (PB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (HB)
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS (PB)
TEMPORAL DATABASES (PB)
THE GLOBAL CYBER-VULNERABILITY REPORT (HB)
THEORY AND MODELS FOR CYBER SITUATION AWARENESS (PB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (HB)
TIME GRANULARITIES IN DATABASES, DATA MINING, AND TEMPORAL REASONING (PB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (HB)
TRUSTED RECOVERY AND DEFENSIVE INFORMATION WARFARE (PB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Linux All-in-One For Dummies, 7th Edition (Paperback / softback)
By: Blum
John Wiley & Sons Inc
Our Price : £20.43
more details
Optimization in Operations Research: Pearson New International Edition (Paperback)
Pearson Education Limited
Our Price : £75.84
more details
Designing the Internet of Things (Paperback)
John Wiley & Sons Inc
Our Price : £14.59
more details
Computer Networks and Internets: Global Edition (Paperback)
Pearson Education Limited
Our Price : £73.07
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket