What is included with this book?
Foreword | p. v |
Preface | p. vii |
Euclidean Shortest Paths in a Simple Polygon | p. 1 |
Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains | p. 25 |
Families of Convex Sets not Representable by Points | p. 43 |
Some Generalizations of Least-Squares Algorithms | p. 55 |
On Depth Recovery from Gradient Vector Fields | p. 75 |
Convolutional Compactors for Guaranteed 6-Bit Error Detection | p. 97 |
Low-Energy Pattern Generator for Random Testing | p. 117 |
New Methodologies for Congestion Estimation and Reduction | p. 139 |
Multimedia Channel Assignment in Cellular Networks | p. 161 |
Range Assignment Problem in Wireless Network | p. 195 |
Privacy in the Electronic Society: Emerging Problems and Solutions | p. 225 |
Risk-Based Access Control for Personal Data Services | p. 263 |
Topological Vulnerability Analysis | p. 285 |
New Malicious Code Detection Using Variable Length n-Grams | p. 307 |
Overview of State-of-the-Art in Digital Image Forensics | p. 325 |
Privacy Preserving Web-Based Email | p. 349 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.