Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Borivoje Furht is active.

Publication


Featured researches published by Borivoje Furht.


Archive | 2010

Handbook of Cloud Computing

Borivoje Furht; Armando Escalante

Cloud computing has become a significant technology trend. Experts believe cloud computing is currently reshaping information technology and the IT marketplace. The advantages of using cloud computing include cost savings, speed to market, access to greater computing resources, high availability, and scalability. Handbook of Cloud Computing includes contributions from world experts in the field of cloud computing from academia, research laboratories and private industry. This book presents the systems, tools, and services of the leading providers of cloud computing; including Google, Yahoo, Amazon, IBM, and Microsoft. The basic concepts of cloud computing and cloud computing applications are also introduced. Current and future technologies applied in cloud computing are also discussed. Case studies, examples, and exercises are provided throughout. Handbook of Cloud Computing is intended for advanced-level students and researchers in computer science and electrical engineering as a reference book. This handbook is also beneficial to computer and system infrastructure designers, developers, business managers, entrepreneurs and investors within the cloud computing related industry.


Real-time Imaging | 1995

Video and image processing in multimedia systems

Borivoje Furht; Stephen W. Smoliar; HongJiang Zhang

Part I: Introduction to Multimedia. 1. Basic Concepts. 2. Multimedia Networking and Synchronization. 3. Overview of Multimedia Applications. References. Part II: Multimedia Compression Techniques and Standards. 4. Introduction to Multimedia Compression. 5. JPEG Algorithm for Full-Color Still Image Compression. 6. PX64 Compression Algorithm for Video Telecommunications. 7. MPEG Compression for Motion-Intensive Applications. 8. Other Multimedia Compression Techniques. 9. Imlementations of Compression Algorithms. 10. Applications of Compression Systems. References. Part III: Image and Video Indexing and Retrieval Techniques. 11. Content-Based Image Retrieval. 12. Content-Based Video Indexing and Retrieval. 13. Video Processing Using Compressed Data. 14. A Case Study in Video Parsing: Television News. References. Index.


Archive | 2004

Multimedia Security Handbook

Borivoje Furht; Darko Kirovski

GENERAL ISSUES Protection of Multimedia Content in Distribution Networks A. M. Eskicioglu and E.J. Delp Vulnerability of Multimedia Protection Schemes M. F. Mansour and A.H. Tewfik MULTIMEDIA ENCRYPTION Fundamentals of Multimedia Encryption Techniques B. Furht, D. Socek, and A. M. Eskicioglu Chaos-Based Encryption for Digital Image and Video S. Li, G. Chen, and X. Zheng Key Management and Protection for IP Multimedia R. Blom, E. Carrara, F. Lindholm, K. Norrman, and M. Naslund Streaming Media Encryption H. Yu MULTIMEDIA WATERMARKING Survey of Multimedia Watermarking Techniques E. Muharemagic and B. Furht Robust Identification of Audio Using Watermarking and Fingerprinting J. Haitsma and T. Kalker High Capacity Real-Time Audio Watermarking with Perfect Correlation Sequence and Repeated Insertion S-C Pei, Y-F Hsu, and Y-W Lu Multidimensional Watermark for Still Image: Parallel Embedding and Detection Bo Hu Image Watermarking Method Resistant to Geometric Distortions H. Kim Fragile Watermarking for Image Authentication E. Izquierdo New Trends and Challenges in Digital Watermark Technologies: Applications for Printed Materials Z. Liu Robust Watermark Detection from Quantized MPEG Video Data D. Simitopoulos, A. Briassouli, and M. G. Strintzis Image Watermarking Robust to Both Geometric Distortion and JPEG Compression X. Kang, J. Huang, and Y. Q. Shi Reversible Watermarks Using a Difference Expansion A.M. Alattar MULTIMEDIA DATA HIDING, FINGERPRINTING, AND AUTHENTICATION Lossless Data Hiding: Fundamentals, Algorithms and Applications Y. Q. Shi, G. Xuan, and W. Su Attacking Multimedia Protection Systems via Blind Pattern Matching D. Kirovski and J-L Dugelay Digital Media Fingerprinting: Techniques and Trends W. Luh and D. Kundur Scalable Image and Video Authentication D. Skraparlis Signature-Based Media Authentication Q. Sun and S-F Chang APPLICATIONS Digital Watermarking Framework: Applications, Parameters and Requirements K. Levy and T. Rodriguez Digital Rights Management for Consumer Devices J. Lotspiech Adult Image Filtering for Internet Safety H. Zheng, M. Daudi, C. Tombelle, and C. Djeraba Combined Indexing and Watermarking of 3D Models Using the Generalized 3D Radon Transforms P. Daras, D. Zarpalas, D. Tzovaras, D. Simitopoulos, and M. G.Strintzis Digital Rights Management Issues for Video S. Emmanuel and M. S. Kankanhalli


Archive | 2011

Handbook of Augmented Reality

Borivoje Furht

Augmented Reality (AR) refers to the merging of a live view of the physical, real world with context-sensitive, computer-generated images to create a mixed reality. Through this augmented vision, a user can digitally interact with and adjust information about their surrounding environment on-the-fly. Handbook of Augmented Reality provides an extensive overview of the current and future trends in Augmented Reality, and chronicles the dramatic growth in this field. The book includes contributions from world expert s in the field of AR from academia, research laboratories and private industry. Case studies and examples throughout the handbook help introduce the basic concepts of AR, as well as outline the Computer Vision and Multimedia techniques most commonly used today. The book is intended for a wide variety of readers including academicians, designers, developers, educators, engineers, practitioners, researchers, and graduate students. This book can also be beneficial for business managers, entrepreneurs, and investors.


Archive | 2010

Handbook of Social Network Technologies and Applications

Borivoje Furht

Social networking is a concept that has existed for a long time; however, with the explosion of the Internet, social networking has become a tool for people to connect and communicate in ways that were impossible in the past. The recent development of Web 2.0 has provided many new applications, such as Myspace, Facebook, and LinkedIn. The purpose of Handbook of Social Networks: Technologies and Applications is to provide comprehensive guidelines on the current and future trends in social network technologies and applications in the field of Web-based Social Networks. This handbook includes contributions from world experts in the field of social networks from both academia and private industry. A number of crucial topics are covered including Web and software technologies and communication technologies for social networks. Web-mining techniques, visualization techniques, intelligent social networks, Semantic Web, and many other topics are covered. Standards for social networks, case studies, and a variety of applications are covered as well.


Archive | 2009

Long Term Evolution: 3GPP LTE Radio and Cellular Technology

Borivoje Furht; Syed Ahson

While 3G has been an outstanding success, the ever-growing demand for higher data rates and higher quality mobile communication services continues to fuel conflict between the rapidly growing number of users and limited bandwidth resources. In the future, a 100-fold increase in mobile data traffic is expected. That will necessitate further improvements to 3GPP LTE (Long-Term Evolution) and create limitless opportunities for engineers who understand the technology and how to apply it to deliver enhanced services.Long Term Evolution: 3GPP LTE Radio and Cellular Technology outlines the best way to position yourself now for future success. With coverage ranging from basic concepts to current research, this comprehensive reference contains technical information about all aspects of 3GPP LTE. It details low chip rate, high-speed downlink/uplink packet access (HSxPA)/TDSCDMA EV 1x, LTE TDD, and 3G TDD. It introduces new technologies and covers methodologies to study the performance of frequency allocation schemes. The authors also discuss the proposed architecture of Mobile IPRR and distributed dynamic architecture in wireless communication, covering performance evaluation of the TD-SCDMA LTE System.With each passing day, more and more users are demanding mobile broadband data access everywhere, to facilitate synchronization of e-mails, Internet access, specific applications, and file downloads to mobile devices such as cell phones, smart phones, PDAs, and notebooks. LTE, successor to the 3G mobile radio network, is essential to creating radio coverage in the rollout phase and high capacity all over the radio cell in the long term. The 3GPP LTE will become increasingly crucial to supporting the high demand of data traffic rates generated by future mobile user terminals. Authored by international experts in the field, this practical book is an extremely valuable guide that addresses emerging current and future technologies associated with LTE and its future direction.


Archive | 2003

Wireless internet handbook: technologies, standards, and application

Borivoje Furht; Mohammad Ilyas

BASIC CONCEPTS The Fundamentals on Wireless Internet, B. Furht and M. Ilyas Wireless Internet > Wireless + Internet, S. Tekinay and D. Goodman Wireless Internet Security, D.S. Lee TECHNOLOGIES AND STANDARDS Multimedia Streaming Over Mobile Networks - European Perspective, I. Curcio Streaming Video Over Wireless Internet, H. Zheng and J. Boyce Clustering and Roaming Techniques for IEEE 802.11 Wireless LANs, A.K. Elhakeem VoIP Service in Wireless Networks, S. Das and K. Basu Wireless Application Protocol and Mobile Wireless Access, A. Llana NETWORKS AND ARCHITECTURES User Mobility in IP Networks: Current Issues and Recent Developments, B. Landfeldt, J. Chan, B. Thai, and A. Seneviratne Wireless Local Access to the Mobile Internet, J.A. Garcia-Macias and L. Toumi A Survey of Location Prediction Techniques for Mobile Wireless Users, C. Cheng, R. Jain, and E. Van Den Berg Handoff and Rerouting in Wireless Data Networks, G. Racherla and S. Radhakrishnan Wireless Communication Using Bluetooth, O. Marques and N. Barman Multi-Antenna Technology for High-Speed Wireless Internet Access, A. Lozano Location Management in Mobile Wireless Networks, S. Jha, D. Saha, and A. Mukherjee Mobile Ad-Hoc Networks: Principles and Practices, G. Racherla, D. Furnuno, and S. Radhakrishnan Managing Location in Universal Location-Aware Computing, S. K. Das, A. Bhattachacharya, A. Roy, and A. Misra APPLICATIONS Wireless Internet Services - From Luxury to Commodity, V. A. Rosenblatt Wireless Technology Impacts the Enterprise Network, A. Llana An Efficient WAP-Enabled Transaction Processing Model for Mobile Database Systems, G. Radhamani and M. Umar Siddiqi Mobile VideoTelephony, I. Curcio WAP: Transitional Technology for M-Commerce, M. S. Raisinghani Wireless Internet in Telemedicine, K. Hung and Y.T. Zhang Delivering Music over the Wireless Internet: From Song Distribution to Interactive Karaoke on UMTS Devices, M. Roccetti, P. Salomoni, V. Ghini, S. Ferretti, and S. Cacciaguerra


Archive | 2006

Multimedia encryption and authentication techniques and applications

Borivoje Furht; Darko Kirovski

Protection of Multimedia Content in Distribution Networks, Ahmet M. Eskicioglu and Edward J. Delp Vulnerabilities of Multimedia Protection Schemes, Mohamed F. Mansour and Ahmed H. Tewfik Fundamentals of Multimedia Encryption Techniques, Borko Furht, Daniel Socek, and Ahmet M. Eskicioglu Chaos-Based Encryption for Digital Image and Video, Shujun Li, Guanrong Chen, and Xuan Zheng Key Management and Protection for IP Multimedia, Rolf Blom, Elisabetta Carrara, Fredrik Lindholm, Karl Norrman, and Mats Naslund Streaming Media Encryption, Heather Yu Digital Media Fingerprinting: Techniques and Trends, William Luh and Deepa Kundur Scalable Image and Video Authentication, Dimitrios Skraparlis Signature-Based Media Authentication, Qibin Sun and Shih-Fu Chang Digital Rights Management for Consumer Devices, Jeffrey Lotspiech Adult Image Filtering for Internet Safety, Huicheng Zheng, Mohamed Daoudi,Christophe Tombelle, and Chabane Djeraba Digital Rights Management Issues for Video, Sabu Emmanuel and Mohan S. Kankanhalli


Archive | 1996

Multimedia Systems and Techniques

Borivoje Furht

Preface. 1. Multimedia Objects R. Hamakawa, A. Atarashi. 2. Compression Techniques and Standards B. Furht. 3. Multimedia Interfaces: Designing for Diversity M. Blattner. 4. Multimedia Storage Systems H.M. Vin, P.V. Rangan. 5. Multimedia Networks B. Furht, H. Kalva. 6. Multimedia Synchronization B. Prabhakaran. 7. InfoScopes: Multimedia Information Systems R. Jain. 8. Scheduling in Multimedia Systems A.L. Narasimha Reddy. 9. Video Indexing and Retrieval S.W. Smoliar, HongJiang Zhang. Index.


Archive | 2011

Handbook of Data Intensive Computing

Borivoje Furht; Armando Escalante

Data Intensive Computing refers to capturing, managing, analyzing, and understanding data at volumes and rates that push the frontiers of current technologies. The challenge of data intensive computing is to provide the hardware architectures and related software systems and techniques which are capable of transforming ultra-large data into valuable knowledge. Handbook of Data Intensive Computing is written by leading international experts in the field. Experts from academia, research laboratories and private industry address both theory and application. Data intensive computing demands a fundamentally different set of principles than mainstream computing. Data-intensive applications typically are well suited for large-scale parallelism over the data and also require an extremely high degree of fault-tolerance, reliability, and availability. Real-world examples are provided throughout the book. Handbook of Data Intensive Computing is designed as a reference for practitioners and researchers, including programmers, computer and system infrastructure designers, and developers. This book can also be beneficial for business managers, entrepreneurs, and investors.

Collaboration


Dive into the Borivoje Furht's collaboration.

Top Co-Authors

Avatar

Oge Marques

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Ankur Agarwal

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Esfandiar Zolghadr

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Mohammad Ilyas

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Raymond Westwater

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar

Stephen W. Smoliar

National University of Singapore

View shared research outputs
Researchain Logo
Decentralizing Knowledge