Algorithms, Architectures And Information Systems Security

Algorithms, Architectures And Information Systems Security

by Bhargab B Bhattacharya
ISBN-10:
9812836233
ISBN-13:
9789812836236
Pub. Date:
11/07/2008
Publisher:
World Scientific Publishing Company, Incorporated
ISBN-10:
9812836233
ISBN-13:
9789812836236
Pub. Date:
11/07/2008
Publisher:
World Scientific Publishing Company, Incorporated
Algorithms, Architectures And Information Systems Security

Algorithms, Architectures And Information Systems Security

by Bhargab B Bhattacharya

Hardcover

$159.0 Current price is , Original price is $159.0. You
$159.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering privacy issues, access control, enterprise and network security, and digital image forensics.

Product Details

ISBN-13: 9789812836236
Publisher: World Scientific Publishing Company, Incorporated
Publication date: 11/07/2008
Series: Statistical Science And Interdisciplinary Research , #3
Pages: 384
Product dimensions: 6.30(w) x 9.00(h) x 1.00(d)

Table of Contents

Foreword v

Preface vii

1 Euclidean Shortest Paths in a Simple Polygon F. Li R. Klette 1

2 Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng T. K. Dey J. Levine 25

3 Families of Convex Sets not Representable by Points J. Pach G. Toth 43

4 Some Generalizations of Least-Squares Algorithms T. Asano N. Katoh K. Mehlhorn T. Tokuyama 55

5 On Depth Recovery from Gradient Vector Fields T. Wei R. Klette 75

6 Convolutional Compactors for Guaranteed 6-Bit Error Detection F. Borner A. Leininger M. Gossel 97

7 Low-Energy Pattern Generator for Random Testing B. B. Bhattacharya S. C. Seth S. Zhang 117

8 New Methodologies for Congestion Estimation and Reduction T. Taghavi M. Sarrafzadeh 139

9 Multimedia Channel Assignment in Cellular Networks B. P. Sinha G. K. Audhya 161

10 Range Assignment Problem in Wireless Network G. K. Das S. Das S. C. Nandy 195

11 Privacy in the Electronic Society: Emerging Problems and Solutions C. A. Ardagna M. Cremonini E. Damiani S. De Capitani di Vimercati P. Samarati 225

12 Risk-Based Access Control for Personal Data Services S. A. Chun V. Atluri 263

13 Topological Vulnerability Analysis S. Jajodia S. Noel 285

14 New Malicious Code Detection Using Variable Length n-Grams S. K. Dash D. K. S. Reddy A. K. Pujari 307

15 Overview of State-of-the-Art in Digital Image Forensics H. T. Sencar N. Memon 325

16 Privacy Preserving Web-Based Email K. Butler W. Enck P. Traynor J. Plasterr P. D. McDaniel 349

From the B&N Reads Blog

Customer Reviews