![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing
Recently, deep neural network and cloud computing based intelligent video surveillance technology are growing interests in the industrial and academia. The synergy with both technologies emerges as a key role ...
-
Chapter and Conference Paper
Prototype System Design for Large-Scale Person Re-identification
Identifying a person across cameras in disjoint views at different time and location has important applications in visual surveillance. However, it is difficult to apply existing methods to the development of...
-
Chapter and Conference Paper
Face Recognition for Mobile Self-authentication with Online Model Update
Face recognition system encounters complex change that varies over time, due to a limited control over the environment. So, the facial model of an individual tends to diverse from underlying distribution that ...
-
Chapter and Conference Paper
Security Technologies Based on Home Gateway for Making Smart Home Secure
As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in ope...
-
Chapter and Conference Paper
Security Policy Deployment in IPsec
Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding appl...