2017
DOI: 10.1007/s11042-017-5301-x
|View full text |Cite
|
Sign up to set email alerts
|

Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing

Abstract: In recent years, the use of mobile and cloud Computing is rapidly growing. In other word, mobile and cloud Computing play an important role in everybody's life today. It carries rich computational resources to mobile users, network operators, as well as cloud computing providers. Moreover, the explosion of multimedia big data (image, video, 3D, etc.) in mobile and cloud computing have created unprecedented opportunities and fundamental security and privacy challenges as they are not just big in volume, but als… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 63 publications
(16 citation statements)
references
References 15 publications
0
15
0
1
Order By: Relevance
“…The establishment of the 2.5D vision system model is similar to that of 2D, with only one additional Z-axis height monitoring. However, the acquisition of such information is difficult in visual calculations [17][18][19]. In some applications, in order to solve this problem, it is usually only a simple addition of the distance sensor, which only measures the deviation of the Z axis.…”
Section: Composition Of Industrial Robot Vision Guidance Systemmentioning
confidence: 99%
“…The establishment of the 2.5D vision system model is similar to that of 2D, with only one additional Z-axis height monitoring. However, the acquisition of such information is difficult in visual calculations [17][18][19]. In some applications, in order to solve this problem, it is usually only a simple addition of the distance sensor, which only measures the deviation of the Z axis.…”
Section: Composition Of Industrial Robot Vision Guidance Systemmentioning
confidence: 99%
“…As there is no provision in the current frame, therefore this request is not scheduled in UL-MAP of frame 2. In the duration [2,3], B request 12 units of bandwidth. Since SR B > SR, therefore the algorithm allocates it as an unconf irmed allocation in the frame f + d B i.e.…”
Section: Rtps Schedulingmentioning
confidence: 99%
“…The unused 5 units of bandwidth in frame 3 are used to schedule 5 units of bandwidth from the next frame. For the duration [3,4], there is no bandwidth request. There is a conf irmed allocation of 5 units and 2 unconf irmedallocation of 17 units.…”
Section: Rtps Schedulingmentioning
confidence: 99%
See 1 more Smart Citation
“…security concerns (i.e., secure data storage, secure computation, network security, data privacy, usage privacy, location privacy; Gupta et al 2016Gupta et al , 2017aGupta et al , 2018Jain and Gupta 2016).…”
mentioning
confidence: 99%