did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9789812836236

Algorithms, Architectures and Information Systems Security

by ; ; ;
  • ISBN13:

    9789812836236

  • ISBN10:

    9812836233

  • Format: Hardcover
  • Copyright: 2008-11-04
  • Publisher: World Scientific Pub Co Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $159.00
  • Digital
    $268.88
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering privacy issues, access control, enterprise and network security, and digital image forensics.

Table of Contents

Forewordp. v
Prefacep. vii
Euclidean Shortest Paths in a Simple Polygonp. 1
Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domainsp. 25
Families of Convex Sets not Representable by Pointsp. 43
Some Generalizations of Least-Squares Algorithmsp. 55
On Depth Recovery from Gradient Vector Fieldsp. 75
Convolutional Compactors for Guaranteed 6-Bit Error Detectionp. 97
Low-Energy Pattern Generator for Random Testingp. 117
New Methodologies for Congestion Estimation and Reductionp. 139
Multimedia Channel Assignment in Cellular Networksp. 161
Range Assignment Problem in Wireless Networkp. 195
Privacy in the Electronic Society: Emerging Problems and Solutionsp. 225
Risk-Based Access Control for Personal Data Servicesp. 263
Topological Vulnerability Analysisp. 285
New Malicious Code Detection Using Variable Length n-Gramsp. 307
Overview of State-of-the-Art in Digital Image Forensicsp. 325
Privacy Preserving Web-Based Emailp. 349
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program