Algorithms, architectures and information systems security:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Hackensack, NJ
World Scientific
©2009
|
Schriftenreihe: | Statistical science and interdisciplinary research
v. 3 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Preface. - "Platinum jubilee series." This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering .. Includes bibliographical references 7. Low-Energy Pattern Generator for Random Testing B.B. Bhattacharya, S.C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B.P. Sinha and G.K. Audhya; 10. Range Assignment Problem in Wireless Network G.K. Das, S. Das and S.C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C.A. Arda |
Beschreibung: | 1 Online-Ressource (xii, 371 pages) |
ISBN: | 9789812836236 9789812836243 9812836233 9812836241 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043130565 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 9789812836236 |9 978-981-283-623-6 | ||
020 | |a 9789812836243 |c electronic bk. |9 978-981-283-624-3 | ||
020 | |a 9812836233 |9 981-283-623-3 | ||
020 | |a 9812836241 |c electronic bk. |9 981-283-624-1 | ||
035 | |a (OCoLC)536309692 | ||
035 | |a (DE-599)BVBBV043130565 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Algorithms, architectures and information systems security |c editors, Bhargab B. Bhattacharya [and others] |
264 | 1 | |a Hackensack, NJ |b World Scientific |c ©2009 | |
300 | |a 1 Online-Ressource (xii, 371 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Statistical science and interdisciplinary research |v v. 3 | |
500 | |a "This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Preface. - "Platinum jubilee series." | ||
500 | |a This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering .. | ||
500 | |a Includes bibliographical references | ||
500 | |a 7. Low-Energy Pattern Generator for Random Testing B.B. Bhattacharya, S.C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B.P. Sinha and G.K. Audhya; 10. Range Assignment Problem in Wireless Network G.K. Das, S. Das and S.C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C.A. Arda | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Bhattacharya, Bhargab B. |e Sonstige |4 oth | |
710 | 2 | |a ICISS (Conference) < 2006, Kolkata, India> |e Sonstige |4 oth | |
710 | 2 | |a International Conference on Computing: Theory and Applications <2007, Kolkata, India> |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028554756 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175569437327360 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043130565 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)536309692 (DE-599)BVBBV043130565 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03517nmm a2200505zcb4500</leader><controlfield tag="001">BV043130565</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812836236</subfield><subfield code="9">978-981-283-623-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812836243</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-981-283-624-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812836233</subfield><subfield code="9">981-283-623-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812836241</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">981-283-624-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)536309692</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043130565</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Algorithms, architectures and information systems security</subfield><subfield code="c">editors, Bhargab B. Bhattacharya [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hackensack, NJ</subfield><subfield code="b">World Scientific</subfield><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 371 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Statistical science and interdisciplinary research</subfield><subfield code="v">v. 3</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Preface. - "Platinum jubilee series."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering ..</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">7. Low-Energy Pattern Generator for Random Testing B.B. Bhattacharya, S.C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B.P. Sinha and G.K. Audhya; 10. Range Assignment Problem in Wireless Network G.K. Das, S. Das and S.C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C.A. Arda</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhattacharya, Bhargab B.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ICISS (Conference) < 2006, Kolkata, India></subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Conference on Computing: Theory and Applications <2007, Kolkata, India></subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028554756</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043130565 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:22Z |
institution | BVB |
isbn | 9789812836236 9789812836243 9812836233 9812836241 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028554756 |
oclc_num | 536309692 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xii, 371 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | World Scientific |
record_format | marc |
series2 | Statistical science and interdisciplinary research |
spelling | Algorithms, architectures and information systems security editors, Bhargab B. Bhattacharya [and others] Hackensack, NJ World Scientific ©2009 1 Online-Ressource (xii, 371 pages) txt rdacontent c rdamedia cr rdacarrier Statistical science and interdisciplinary research v. 3 "This volume includes the extended version of a few papers which were presented at the Second International Conference on Information Systems Security (December 18-20, 2006), and Track I of the International Conference on Computing: Theory and Applications (March 5-7, 2007)"--Preface. - "Platinum jubilee series." This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security covering .. Includes bibliographical references 7. Low-Energy Pattern Generator for Random Testing B.B. Bhattacharya, S.C. Seth and S. Zhang8. New Methodologies for Congestion Estimation and Reduction T. Taghavi and M. Sarrafzadeh; 9. Multimedia Channel Assignment in Cellular Networks B.P. Sinha and G.K. Audhya; 10. Range Assignment Problem in Wireless Network G.K. Das, S. Das and S.C. Nandy; 11. Privacy in the Electronic Society: Emerging Problems and Solutions C.A. Arda COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Congresses (DE-588)1071861417 Konferenzschrift gnd-content Bhattacharya, Bhargab B. Sonstige oth ICISS (Conference) < 2006, Kolkata, India> Sonstige oth International Conference on Computing: Theory and Applications <2007, Kolkata, India> Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257 Aggregator Volltext |
spellingShingle | Algorithms, architectures and information systems security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Congresses |
subject_GND | (DE-588)1071861417 |
title | Algorithms, architectures and information systems security |
title_auth | Algorithms, architectures and information systems security |
title_exact_search | Algorithms, architectures and information systems security |
title_full | Algorithms, architectures and information systems security editors, Bhargab B. Bhattacharya [and others] |
title_fullStr | Algorithms, architectures and information systems security editors, Bhargab B. Bhattacharya [and others] |
title_full_unstemmed | Algorithms, architectures and information systems security editors, Bhargab B. Bhattacharya [and others] |
title_short | Algorithms, architectures and information systems security |
title_sort | algorithms architectures and information systems security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security Congresses |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Computer security Congresses Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=305257 |
work_keys_str_mv | AT bhattacharyabhargabb algorithmsarchitecturesandinformationsystemssecurity AT icissconference2006kolkataindia algorithmsarchitecturesandinformationsystemssecurity AT internationalconferenceoncomputingtheoryandapplications2007kolkataindia algorithmsarchitecturesandinformationsystemssecurity |