Cargando…

Algorithms, architectures and information systems security /

This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores Corporativos: ICISS (Conference), International Conference on Computing: Theory and Applications
Otros Autores: Bhattacharya, Bhargab B.
Formato: Electrónico Congresos, conferencias eBook
Idioma:Inglés
Publicado: Hackensack, NJ : World Scientific, ©2009.
Colección:Statistical science and interdisciplinary research ; v. 3.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn536309692
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|---|||||
008 100212s2009 njua ob 100 0 eng d
010 |z  2009288047 
040 |a MERUC  |b eng  |e pn  |c MERUC  |d YDXCP  |d OSU  |d N$T  |d EBLCP  |d IDEBK  |d E7B  |d OCLCQ  |d MHW  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCA  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d LOA  |d OCLCO  |d JBG  |d AZK  |d AGLDB  |d MOR  |d PIFAG  |d ZCU  |d OTZ  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d WRM  |d VTS  |d CEF  |d ICG  |d INT  |d NRAMU  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d TKN  |d OCLCQ  |d DKC  |d OCLCQ  |d M8D  |d UKAHL  |d HS0  |d OCLCQ  |d UKCRE  |d VLY  |d AJS  |d OCLCO  |d OCLCQ  |d VHC  |d QGK  |d INARC 
015 |a GBA911436  |2 bnb 
016 7 |a 014897833  |2 Uk 
019 |a 586163215  |a 647851151  |a 960206364  |a 961494153  |a 962684136  |a 988496607  |a 991960206  |a 995003806  |a 1037913647  |a 1038665622  |a 1045522737  |a 1062930425  |a 1064143352  |a 1081211106  |a 1153556926  |a 1162501033  |a 1228568360  |a 1241903745  |a 1259226002  |a 1290074668  |a 1300632345  |a 1303323587  |a 1303442918  |a 1330343055  |a 1390927142 
020 |a 9789812836243  |q (electronic bk.) 
020 |a 9812836241  |q (electronic bk.) 
020 |a 1282442295 
020 |a 9781282442290 
020 |a 9786612442292 
020 |a 6612442298 
020 |z 9789812836236 
020 |z 9812836233 
029 1 |a AU@  |b 000051429651 
029 1 |a DEBBG  |b BV043130565 
029 1 |a DEBBG  |b BV044141320 
029 1 |a DEBSZ  |b 421914734 
029 1 |a DEBSZ  |b 430803478 
029 1 |a NZ1  |b 13340987 
035 |a (OCoLC)536309692  |z (OCoLC)586163215  |z (OCoLC)647851151  |z (OCoLC)960206364  |z (OCoLC)961494153  |z (OCoLC)962684136  |z (OCoLC)988496607  |z (OCoLC)991960206  |z (OCoLC)995003806  |z (OCoLC)1037913647  |z (OCoLC)1038665622  |z (OCoLC)1045522737  |z (OCoLC)1062930425  |z (OCoLC)1064143352  |z (OCoLC)1081211106  |z (OCoLC)1153556926  |z (OCoLC)1162501033  |z (OCoLC)1228568360  |z (OCoLC)1241903745  |z (OCoLC)1259226002  |z (OCoLC)1290074668  |z (OCoLC)1300632345  |z (OCoLC)1303323587  |z (OCoLC)1303442918  |z (OCoLC)1330343055  |z (OCoLC)1390927142 
050 4 |a QA76.9.A25  |b A453 2009eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Algorithms, architectures and information systems security /  |c editors, Bhargab B. Bhattacharya [and others]. 
260 |a Hackensack, NJ :  |b World Scientific,  |c ©2009. 
300 |a 1 online resource (xii, 371 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a Statistical science and interdisciplinary research,  |x 1793-6195 ;  |v v. 3 
500 |a "This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Preface 
500 |a "Platinum jubilee series." 
520 |a This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering ... 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
505 0 |a Foreword; Preface; Contents; 1. Euclidean Shortest Paths in a Simple Polygon F. Li and R. Klette; 2. Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T.K. Dey and J. Levine; 3. Families of Convex Sets not Representable by Points J. Pach and G.T ́o th; 4. Some Generalizations of Least-Squares Algorithms T. Asano, N. Katoh, K. Mehlhorn and T. Tokuyama; 5. On Depth Recovery from Gradient Vector Fields T. Wei and R. Klette; 6. Convolutional Compactors for Guaranteed 6-Bit Error Detection F.B ̈o rner, A. Leininger and M.G ̈o ssel 
505 8 |a 7. Low-Energy Pattern Generator for Random Testing B.B. Bhattacharya, S.C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B.P. Sinha and G.K. Audhya; 10. Range Assignment Problem in Wireless Network G.K. Das, S. Das and S.C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati and P. Samarati; 12. Risk-Based Access Control for Personal Data Services S.A. Chun and V. Atluri 
505 8 |a 13. Topological Vulnerability Analysis S. Jajodia and S. Noel14. New Malicious Code Detection Using Variable Length n-Grams S.K. Dash, D.K.S. Reddy and A.K. Pujari; 15. Overview of State-of-the-Art in Digital Image Forensics H.T. Sencar and N. Memon; 16. Privacy PreservingWeb-Based Email K. Butler, W. Enck, P. Traynor, J. Plasterr and P.D. McDaniel; Appendix 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |v Congresses. 
650 6 |a Sécurité informatique  |v Congrès. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a information technology.  |2 aat 
653 1 |a Algorithms 
653 1 |a Architectures 
653 1 |a Information systems security 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Bhattacharya, Bhargab B. 
711 2 |a ICISS (Conference)  |n (2nd :  |d 2006 :  |c Kolkata, India) 
711 2 |a International Conference on Computing: Theory and Applications  |d (2007 :  |c Kolkata, India) 
776 0 8 |i Print version:  |t Algorithms, architectures and information systems security.  |d Hackensack, NJ ; London : World Scientific, ©2009  |z 9789812836236  |w (DLC) 2009288047  |w (OCoLC)244765936 
830 0 |a Statistical science and interdisciplinary research ;  |v v. 3. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=305257  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24686149 
938 |a EBL - Ebook Library  |b EBLB  |n EBL477109 
938 |a EBSCOhost  |b EBSC  |n 305257 
938 |a YBP Library Services  |b YANK  |n 3161693 
938 |a Internet Archive  |b INAR  |n algorithmsarchit0000unse_g0c3 
994 |a 92  |b IZTAP