Cargando…
Algorithms, architectures and information systems security
This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image...
Autores principales: | , , , |
---|---|
Lenguaje: | eng |
Publicado: |
World Scientific
2008
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1206871 |
_version_ | 1780917938977505280 |
---|---|
author | Bhattacharya, Bhargab B Sur-Kolay, Susmita Nandy, Subhas C Bagchi, Aditya |
author_facet | Bhattacharya, Bhargab B Sur-Kolay, Susmita Nandy, Subhas C Bagchi, Aditya |
author_sort | Bhattacharya, Bhargab B |
collection | CERN |
description | This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security coverin |
id | cern-1206871 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2008 |
publisher | World Scientific |
record_format | invenio |
spelling | cern-12068712021-04-22T01:33:12Zhttp://cds.cern.ch/record/1206871engBhattacharya, Bhargab BSur-Kolay, SusmitaNandy, Subhas CBagchi, AdityaAlgorithms, architectures and information systems securityComputing and ComputersThis volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security coverinWorld Scientificoai:cds.cern.ch:12068712008 |
spellingShingle | Computing and Computers Bhattacharya, Bhargab B Sur-Kolay, Susmita Nandy, Subhas C Bagchi, Aditya Algorithms, architectures and information systems security |
title | Algorithms, architectures and information systems security |
title_full | Algorithms, architectures and information systems security |
title_fullStr | Algorithms, architectures and information systems security |
title_full_unstemmed | Algorithms, architectures and information systems security |
title_short | Algorithms, architectures and information systems security |
title_sort | algorithms, architectures and information systems security |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1206871 |
work_keys_str_mv | AT bhattacharyabhargabb algorithmsarchitecturesandinformationsystemssecurity AT surkolaysusmita algorithmsarchitecturesandinformationsystemssecurity AT nandysubhasc algorithmsarchitecturesandinformationsystemssecurity AT bagchiaditya algorithmsarchitecturesandinformationsystemssecurity |