Compressed sensing for privacy-preserving data processing (Record no. 29504)

000 -LEADER
fixed length control field nam a22 7a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190527b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789811322785
Terms of availability (pbk)
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.3822
Item number TES
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Testa, Matteo
245 ## - TITLE STATEMENT
Title Compressed sensing for privacy-preserving data processing
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Singapore :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2019
300 ## - PHYSICAL DESCRIPTION
Extent viii, 91 p. :
Other physical details ill. ;
Dimensions 23.3 cm.
365 ## - TRADE PRICE
Price type code EUR
Price amount 54.99
Unit of pricing 00
490 ## - SERIES STATEMENT
Series statement SpringerBriefs in electrical and computer engineering, Signal processing
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references
520 ## - SUMMARY, ETC.
Summary, etc The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors’ website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures
Topical term or geographic name as entry element Privacy &​ data protection
Topical term or geographic name as entry element Calculus of variations
Topical term or geographic name as entry element Imaging systems &​ technology
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Mathematical optimization
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Valsesia, Diego
Relator term aut
Personal name Bianchi, Tiziano
Relator term aut
Personal name Magli, Enrico
Relator term aut
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2019-05-24 Baroda Book Corporation 4476.19 2 621.3822 TES 031950 2024-03-13 2024-02-21 Books

Powered by Koha