𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Digital image access & retrieval

✍ Scribed by Turner, James M.


Publisher
John Wiley and Sons
Year
1998
Tongue
English
Weight
26 KB
Volume
49
Category
Article
ISSN
0002-8231

No coin nor oath required. For personal study only.

✦ Synopsis


No matter what laws are passed, and no matter how good security Processing, March 24-26, 1996'' (title page) at the Graduate measures might become, they will not be good enough for us to School of Library and Information Science, University of Illihave completely secure systems. . . . The members of society nois at Urbana-Champaign. It consists of a substantial introducneed to be educated so that they understand the importance of tion by the editors, and 11 papers ''arranged in three sections respecting the privacy and ownership of data. (p. 503) that reflect different aspects of digital image access that were explored at the symposium.'' (p. 2) The first section consists Some areas of Internet Besieged could have been improved.

of three papers which provide a framework for discussion. The There are several terminology lapses throughout the book: Hypsecond section consists of six papers covering the question of ertext Transfer Protocol (HTTP) is frequently called Hypertext automatic and semi-automatic picture indexing, mostly through Transport Protocol (pp. 19, 379, 455); the Computer Fraud and content-based retrieval. The third section consists of two papers Abuse Act is incorrectly termed the Computer Crime Act (p.

which discuss the issue of preservation of pictures using digital ix); and in Kent's chapter on PEM, sections of Figure 1 are technology. This is followed by biographical information on labeled ''Mail Transfer Agent'' when they should be labeled the contributors and a detailed index to the content of the papers. ''Message Transfer Agent'' as listed in the text (p. 297). The

The authors of the first three papers are Howard Besser, title of the book is also problematic. The word ''scofflaws'' in Jennifer Trant, and Lois Lunin, all prominent figures in the area the subtitle is not a commonly used word and may confuse of managing picture collections. Because of the importance of people about the subject of the text. Perhaps Countering Cyberthese papers for understanding the other ones included, they are space Attacks would have been a better choice since the words described here in some detail. Howard Besser takes a look at correspond with Dorothy E. Denning's title in Chapter 2. Fithe way technology for managing image collections has changed nally, a hardcover binding would have been a better choice than over the last decade, opening with the statement that ''in 1986, a trade paper binding, since this book will probably be used the idea of large-scale image databases seemed quite farheavily by those who purchase it.

fetched.'' (p. 11) He identifies the important issues in this area Overall, Internet Besieged is an important contribution to and puts them in perspective. The article is rich in information, networking scholarship that should be required reading for netand in material for discussion and reflection on this rapidlywork administrators and information science professionals developing area of information science. In this technologically working with the Internet. Readers interested in pursuing further unstable and somewhat bewildering world, in which it often education in network security should watch for a forthcoming seems a waste of time to attempt any planning or development Professional Knowledge Program on Network and Data Secuat all until things settle a bit, it is encouraging to gain some rity sponsored by the Association for Computing (ACM). A understanding of how we can have real hope for the eventual certificate will be provided to those who successfully complete solution to the problems involved in organizing digital images the program. More information about the program will eventufor storage and retrieval. Particularly useful is the discussion of ally be found on the WWW at http://www.acm.org/pkp/.

the layers of metadata that need to be defined and elaborated in order to ensure adequate use and management of collections Derek G. Smith of digital pictures. Besser also touches on the question of item-Jessie Ball duPont Library level indexing of pictures using text, a practice rarely seen in The University of the South picture collections, and points to content-based retrieval, the Sewanee, TN 37383-1000 subject of the second section of this collection of papers and E-mail: dsmith


πŸ“œ SIMILAR VOLUMES


Visual image retrieval
✍ Peter G. B. Enser πŸ“‚ Article πŸ“… 2009 πŸ› Information Today, Inc. 🌐 English βš– 773 KB
Digital Image Display
✍ Lindsay MacDonald πŸ“‚ Article πŸ“… 2005 πŸ› John Wiley and Sons 🌐 English βš– 33 KB
Digital image processing
✍ D.R.K. Brownrigg πŸ“‚ Article πŸ“… 1994 πŸ› Elsevier Science 🌐 English βš– 51 KB
A Graph-Based Object Description for Inf
✍ I.Burak Γ–zer; Wayne Wolf; Ali N. Akansu πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 614 KB

This work focuses on the search of a sample object (car) in video sequences and images based on shape similarity. We form a new description for cars, using relational graphs in order to annotate the images where the object of interest (OOI) is present. Query by text can be performed afterward to ex