|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn536309692 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr mn|---||||| |
008 |
100212s2009 njua ob 100 0 eng d |
010 |
|
|
|z 2009288047
|
040 |
|
|
|a MERUC
|b eng
|e pn
|c MERUC
|d YDXCP
|d OSU
|d N$T
|d EBLCP
|d IDEBK
|d E7B
|d OCLCQ
|d MHW
|d OCLCQ
|d OCLCA
|d OCLCQ
|d OCLCA
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d DEBSZ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCL
|d OCLCO
|d OCLCQ
|d LOA
|d OCLCO
|d JBG
|d AZK
|d AGLDB
|d MOR
|d PIFAG
|d ZCU
|d OTZ
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d STF
|d WRM
|d VTS
|d CEF
|d ICG
|d INT
|d NRAMU
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d TKN
|d OCLCQ
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d HS0
|d OCLCQ
|d UKCRE
|d VLY
|d AJS
|d OCLCO
|d OCLCQ
|d VHC
|d QGK
|d INARC
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBA911436
|2 bnb
|
016 |
7 |
|
|a 014897833
|2 Uk
|
019 |
|
|
|a 586163215
|a 647851151
|a 960206364
|a 961494153
|a 962684136
|a 988496607
|a 991960206
|a 995003806
|a 1037913647
|a 1038665622
|a 1045522737
|a 1062930425
|a 1064143352
|a 1081211106
|a 1153556926
|a 1162501033
|a 1228568360
|a 1241903745
|a 1259226002
|a 1290074668
|a 1300632345
|a 1303323587
|a 1303442918
|a 1330343055
|a 1390927142
|
020 |
|
|
|a 9789812836243
|q (electronic bk.)
|
020 |
|
|
|a 9812836241
|q (electronic bk.)
|
020 |
|
|
|a 1282442295
|
020 |
|
|
|a 9781282442290
|
020 |
|
|
|a 9786612442292
|
020 |
|
|
|a 6612442298
|
020 |
|
|
|z 9789812836236
|
020 |
|
|
|z 9812836233
|
029 |
1 |
|
|a AU@
|b 000051429651
|
029 |
1 |
|
|a DEBBG
|b BV043130565
|
029 |
1 |
|
|a DEBBG
|b BV044141320
|
029 |
1 |
|
|a DEBSZ
|b 421914734
|
029 |
1 |
|
|a DEBSZ
|b 430803478
|
029 |
1 |
|
|a NZ1
|b 13340987
|
035 |
|
|
|a (OCoLC)536309692
|z (OCoLC)586163215
|z (OCoLC)647851151
|z (OCoLC)960206364
|z (OCoLC)961494153
|z (OCoLC)962684136
|z (OCoLC)988496607
|z (OCoLC)991960206
|z (OCoLC)995003806
|z (OCoLC)1037913647
|z (OCoLC)1038665622
|z (OCoLC)1045522737
|z (OCoLC)1062930425
|z (OCoLC)1064143352
|z (OCoLC)1081211106
|z (OCoLC)1153556926
|z (OCoLC)1162501033
|z (OCoLC)1228568360
|z (OCoLC)1241903745
|z (OCoLC)1259226002
|z (OCoLC)1290074668
|z (OCoLC)1300632345
|z (OCoLC)1303323587
|z (OCoLC)1303442918
|z (OCoLC)1330343055
|z (OCoLC)1390927142
|
050 |
|
4 |
|a QA76.9.A25
|b A453 2009eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Algorithms, architectures and information systems security /
|c editors, Bhargab B. Bhattacharya [and others].
|
260 |
|
|
|a Hackensack, NJ :
|b World Scientific,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xii, 371 pages) :
|b illustrations (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Statistical science and interdisciplinary research,
|x 1793-6195 ;
|v v. 3
|
500 |
|
|
|a "This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Preface
|
500 |
|
|
|a "Platinum jubilee series."
|
520 |
|
|
|a This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering ...
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Foreword; Preface; Contents; 1. Euclidean Shortest Paths in a Simple Polygon F. Li and R. Klette; 2. Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T.K. Dey and J. Levine; 3. Families of Convex Sets not Representable by Points J. Pach and G.T ́o th; 4. Some Generalizations of Least-Squares Algorithms T. Asano, N. Katoh, K. Mehlhorn and T. Tokuyama; 5. On Depth Recovery from Gradient Vector Fields T. Wei and R. Klette; 6. Convolutional Compactors for Guaranteed 6-Bit Error Detection F.B ̈o rner, A. Leininger and M.G ̈o ssel
|
505 |
8 |
|
|a 7. Low-Energy Pattern Generator for Random Testing B.B. Bhattacharya, S.C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B.P. Sinha and G.K. Audhya; 10. Range Assignment Problem in Wireless Network G.K. Das, S. Das and S.C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati and P. Samarati; 12. Risk-Based Access Control for Personal Data Services S.A. Chun and V. Atluri
|
505 |
8 |
|
|a 13. Topological Vulnerability Analysis S. Jajodia and S. Noel14. New Malicious Code Detection Using Variable Length n-Grams S.K. Dash, D.K.S. Reddy and A.K. Pujari; 15. Overview of State-of-the-Art in Digital Image Forensics H.T. Sencar and N. Memon; 16. Privacy PreservingWeb-Based Email K. Butler, W. Enck, P. Traynor, J. Plasterr and P.D. McDaniel; Appendix
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
6 |
|a Sécurité informatique
|v Congrès.
|
650 |
|
6 |
|a Technologie de l'information.
|
650 |
|
7 |
|a information technology.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
653 |
1 |
|
|a Algorithms
|
653 |
1 |
|
|a Architectures
|
653 |
1 |
|
|a Information systems security
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
700 |
1 |
|
|a Bhattacharya, Bhargab B.
|
711 |
2 |
|
|a ICISS (Conference)
|n (2nd :
|d 2006 :
|c Kolkata, India)
|
711 |
2 |
|
|a International Conference on Computing: Theory and Applications
|d (2007 :
|c Kolkata, India)
|
758 |
|
|
|i has work:
|a Algorithms, architectures and information systems security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGgFKY3RfDKCwRKp3YqwQ3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Algorithms, architectures and information systems security.
|d Hackensack, NJ ; London : World Scientific, ©2009
|z 9789812836236
|w (DLC) 2009288047
|w (OCoLC)244765936
|
830 |
|
0 |
|a Statistical science and interdisciplinary research ;
|v v. 3.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=477109
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24686149
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL477109
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 305257
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3161693
|
938 |
|
|
|a Internet Archive
|b INAR
|n algorithmsarchit0000unse_g0c3
|
994 |
|
|
|a 92
|b IZTAP
|