The Resource Algorithms, architectures and information systems security, editors, Bhargab B. Bhattacharya ... [et al.], (electronic resource)

Algorithms, architectures and information systems security, editors, Bhargab B. Bhattacharya ... [et al.], (electronic resource)

Label
Algorithms, architectures and information systems security
Title
Algorithms, architectures and information systems security
Statement of responsibility
editors, Bhargab B. Bhattacharya ... [et al.]
Contributor
Subject
Genre
Language
  • eng
  • eng
Summary
This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security coverin
Member of
Cataloging source
MiAaPQ
Dewey number
005.8
Illustrations
illustrations
Index
no index present
Language note
English
LC call number
QA76.9.A25
LC item number
A44 2009
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
  • 2005
  • 2007
http://library.link/vocab/relatedWorkOrContributorName
  • Bhattacharya, Bhargab B
  • ICISS 2005
  • International Conference on Computing: Theory and Applications
Series statement
  • Statistical science and interdisciplinary research,
  • Platinum jubilee series
Series volume
v. 3
http://library.link/vocab/subjectName
  • Computer security
  • Information technology
Label
Algorithms, architectures and information systems security, editors, Bhargab B. Bhattacharya ... [et al.], (electronic resource)
Instantiates
Publication
Note
"This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Pref
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Foreword; Preface; Contents; 1. Euclidean Shortest Paths in a Simple Polygon F. Li and R. Klette; 2. Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T. K. Dey and J. Levine; 3. Families of Convex Sets not Representable by Points J. Pach and G. T ́o th; 4. Some Generalizations of Least-Squares Algorithms T. Asano, N. Katoh, K. Mehlhorn and T. Tokuyama; 5. On Depth Recovery from Gradient Vector Fields T. Wei and R. Klette; 6. Convolutional Compactors for Guaranteed 6-Bit Error Detection F. B ̈o rner, A. Leininger and M. G ̈o ssel
  • 7. Low-Energy Pattern Generator for Random Testing B. B. Bhattacharya, S. C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B. P. Sinha and G. K. Audhya; 10. Range Assignment Problem in Wireless Network G. K. Das, S. Das and S. C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati and P. Samarati; 12. Risk-Based Access Control for Personal Data Services S. A. Chun and V. Atluri
  • 13. Topological Vulnerability Analysis S. Jajodia and S. Noel14. New Malicious Code Detection Using Variable Length n-Grams S. K. Dash, D. K. S. Reddy and A. K. Pujari; 15. Overview of State-of-the-Art in Digital Image Forensics H. T. Sencar and N. Memon; 16. Privacy PreservingWeb-Based Email K. Butler, W. Enck, P. Traynor, J. Plasterr and P. D. McDaniel; Appendix
Dimensions
unknown
Extent
1 online resource (384 p.)
Form of item
online
Isbn
9786612442292
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (CKB)2550000000000083
  • (EBL)477109
  • (OCoLC)536309692
  • (SSID)ssj0000334522
  • (PQKBManifestationID)11241564
  • (PQKBTitleCode)TC0000334522
  • (PQKBWorkID)10260078
  • (PQKB)11070926
  • (MiAaPQ)EBC477109
  • (WSP)00007074
  • (EXLCZ)992550000000000083
Label
Algorithms, architectures and information systems security, editors, Bhargab B. Bhattacharya ... [et al.], (electronic resource)
Publication
Note
"This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Pref
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Foreword; Preface; Contents; 1. Euclidean Shortest Paths in a Simple Polygon F. Li and R. Klette; 2. Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T. K. Dey and J. Levine; 3. Families of Convex Sets not Representable by Points J. Pach and G. T ́o th; 4. Some Generalizations of Least-Squares Algorithms T. Asano, N. Katoh, K. Mehlhorn and T. Tokuyama; 5. On Depth Recovery from Gradient Vector Fields T. Wei and R. Klette; 6. Convolutional Compactors for Guaranteed 6-Bit Error Detection F. B ̈o rner, A. Leininger and M. G ̈o ssel
  • 7. Low-Energy Pattern Generator for Random Testing B. B. Bhattacharya, S. C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B. P. Sinha and G. K. Audhya; 10. Range Assignment Problem in Wireless Network G. K. Das, S. Das and S. C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati and P. Samarati; 12. Risk-Based Access Control for Personal Data Services S. A. Chun and V. Atluri
  • 13. Topological Vulnerability Analysis S. Jajodia and S. Noel14. New Malicious Code Detection Using Variable Length n-Grams S. K. Dash, D. K. S. Reddy and A. K. Pujari; 15. Overview of State-of-the-Art in Digital Image Forensics H. T. Sencar and N. Memon; 16. Privacy PreservingWeb-Based Email K. Butler, W. Enck, P. Traynor, J. Plasterr and P. D. McDaniel; Appendix
Dimensions
unknown
Extent
1 online resource (384 p.)
Form of item
online
Isbn
9786612442292
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (CKB)2550000000000083
  • (EBL)477109
  • (OCoLC)536309692
  • (SSID)ssj0000334522
  • (PQKBManifestationID)11241564
  • (PQKBTitleCode)TC0000334522
  • (PQKBWorkID)10260078
  • (PQKB)11070926
  • (MiAaPQ)EBC477109
  • (WSP)00007074
  • (EXLCZ)992550000000000083

Library Locations

  • Albert D. Cohen Management LibraryBorrow it
    181 Freedman Crescent, Winnipeg, MB, R3T 5V4, CA
    49.807878 -97.129961
  • Architecture/Fine Arts LibraryBorrow it
    84 Curry Place, Winnipeg, MB, CA
    49.807716 -97.136226
  • Archives and Special CollectionsBorrow it
    25 Chancellors Circle (Elizabeth Dafoe Library), Room 330, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Bibliothèque Alfred-Monnin (Université de Saint-Boniface)Borrow it
    200, avenue de la Cathédrale, Local 2110, Winnipeg, MB, R2H 0H7, CA
    49.888861 -97.119735
  • Bill Larson Library (Grace Hospital)Borrow it
    300 Booth Drive, G-227, Winnipeg, MB, R3J 3M7, CA
    49.882400 -97.276436
  • Carolyn Sifton - Helene Fuld Library (St. Boniface General Hospital)Borrow it
    409 Tache Avenue, Winnipeg, MB, R2H 2A6, CA
    49.883388 -97.126050
  • Concordia Hospital LibraryBorrow it
    1095 Concordia Avenue, Winnipeg, MB, R2K 3S8, CA
    49.913252 -97.064683
  • Donald W. Craik Engineering LibraryBorrow it
    75B Chancellors Circle (Engineering Building E3), Room 361, Winnipeg, MB, R3T 2N2, CA
    49.809053 -97.133292
  • E.K. Williams Law LibraryBorrow it
    224 Dysart Road, Winnipeg, MB, R3T 5V4, CA
    49.811829 -97.131017
  • Eckhardt-Gramatté Music LibraryBorrow it
    136 Dafoe Road (Taché Arts Complex), Room 257, Winnipeg, MB, R3T 2N2, CA
    49.807964 -97.132222
  • Elizabeth Dafoe LibraryBorrow it
    25 Chancellors Circle, Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Fr. H. Drake Library (St. Paul's College)Borrow it
    70 Dysart Road, Winnipeg, MB, R3T 2M6, CA
    49.810605 -97.138184
  • J.W. Crane Memorial Library (Deer Lodge Centre)Borrow it
    2109 Portage Avenue, Winnipeg, MB, R3J 0L3, CA
    49.878000 -97.235520
  • Libraries Annex (not open to the public; please see web page for details)Borrow it
    25 Chancellors Circle (in the Elizabeth Dafoe Library), Winnipeg, MB, R3T 2N2, CA
    49.809961 -97.131878
  • Neil John Maclean Health Sciences LibraryBorrow it
    727 McDermot Avenue (Brodie Centre), 200 Level, Winnipeg, MB, R3E 3P5, CA
    49.903563 -97.160554
  • Sciences and Technology LibraryBorrow it
    186 Dysart Road, Winnipeg, MB, R3T 2M8, CA
    49.811526 -97.133257
  • Seven Oaks General Hospital LibraryBorrow it
    2300 McPhillips Street, Winnipeg, MB, R2V 3M3, CA
    49.955177 -97.148865
  • Sister St. Odilon Library (Misericordia Health Centre)Borrow it
    99 Cornish Avenue, Winnipeg, MB, R3C 1A2, CA
    49.879592 -97.160425
  • St. John's College LibraryBorrow it
    92 Dysart Road, Winnipeg, MB, R3T 2M5, CA
    49.811242 -97.137156
  • Victoria General Hospital LibraryBorrow it
    2340 Pembina Highway, Winnipeg, MB, R3T 2E8, CA
    49.806755 -97.152739
  • William R Newman Library (Agriculture)Borrow it
    66 Dafoe Road, Winnipeg, MB, R3T 2R3, CA
    49.806936 -97.135525
Processing Feedback ...