LEADER 04527nam 2200673Ia 450 001 9910456676003321 005 20200520144314.0 010 $a1-282-44229-5 010 $a9786612442292 010 $a981-283-624-1 035 $a(CKB)2550000000000083 035 $a(EBL)477109 035 $a(OCoLC)536309692 035 $a(SSID)ssj0000334522 035 $a(PQKBManifestationID)11241564 035 $a(PQKBTitleCode)TC0000334522 035 $a(PQKBWorkID)10260078 035 $a(PQKB)11070926 035 $a(MiAaPQ)EBC477109 035 $a(WSP)00007074 035 $a(Au-PeEL)EBL477109 035 $a(CaPaEBR)ebr10361777 035 $a(CaONFJC)MIL244229 035 $a(EXLCZ)992550000000000083 100 $a20090206d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aAlgorithms, architectures and information systems security$b[electronic resource] /$feditors, Bhargab B. Bhattacharya ... [et al.] 210 $aNew Jersey $cWorld Scientific$dc2009 215 $a1 online resource (384 p.) 225 1 $aStatistical science and interdisciplinary research,$x1793-6195 ;$vv. 3 225 0 $aPlatinum jubilee series 300 $a"This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Pref. 311 $a981-283-623-3 320 $aIncludes bibliographical references. 327 $aForeword; Preface; Contents; 1. Euclidean Shortest Paths in a Simple Polygon F. Li and R. Klette; 2. Theory of a Practical Delaunay Meshing Algorithm for a Large Class of Domains S.-W. Cheng, T. K. Dey and J. Levine; 3. Families of Convex Sets not Representable by Points J. Pach and G. T ?o th; 4. Some Generalizations of Least-Squares Algorithms T. Asano, N. Katoh, K. Mehlhorn and T. Tokuyama; 5. On Depth Recovery from Gradient Vector Fields T. Wei and R. Klette; 6. Convolutional Compactors for Guaranteed 6-Bit Error Detection F. B ?o rner, A. Leininger and M. G ?o ssel 327 $a7. Low-Energy Pattern Generator for Random Testing B. B. Bhattacharya, S. C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B. P. Sinha and G. K. Audhya; 10. Range Assignment Problem in Wireless Network G. K. Das, S. Das and S. C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati and P. Samarati; 12. Risk-Based Access Control for Personal Data Services S. A. Chun and V. Atluri 327 $a13. Topological Vulnerability Analysis S. Jajodia and S. Noel14. New Malicious Code Detection Using Variable Length n-Grams S. K. Dash, D. K. S. Reddy and A. K. Pujari; 15. Overview of State-of-the-Art in Digital Image Forensics H. T. Sencar and N. Memon; 16. Privacy PreservingWeb-Based Email K. Butler, W. Enck, P. Traynor, J. Plasterr and P. D. McDaniel; Appendix 330 $aThis volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security coverin 410 0$aStatistical science and interdisciplinary research ;$vv. 3. 606 $aComputer security$vCongresses 606 $aInformation technology 608 $aElectronic books. 615 0$aComputer security 615 0$aInformation technology. 676 $a005.8 701 $aBhattacharya$b Bhargab B$01052079 712 12$aICISS 2005$f(2005 :$eCalcutta, India) 712 12$aInternational Conference on Computing: Theory and Applications$f(2007 :$eCalcutta, India) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910456676003321 996 $aAlgorithms, architectures and information systems security$92483024 997 $aUNINA