Starting with novel algorithms for optimally updating bounding volume hierarchies of objects undergoing arbitrary deformations, the author presents a new data structure that allows, for the first time, the computation of the penetration volume. The penetration volume is related to the water displacement of the overlapping region, and thus...
Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?
Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica fiber with a single wavelength modulated at low data rates, it was quickly demonstrated that fiber can deliver much more bandwidth than any other...
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...
Community-acquired pneumonia is a disease of high morbidity and mortality.
Demographic changes in industrialised countries with a growing
population of elderly persons will add to its significance. In the last years
much progress in the field of community-acquired pneumonia has been
achieved. Vaccination programs against...
Radar and ARPA Manual provides essential information for professional mariners and seagoing marine engineers, including those undertaking electronic navigation system courses and marine operations qualifications internationally.
This fully revised new edition serves as the most comprehensive reference on equipment and techniques...
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers. Distributed Algorithms contains the most significant algorithms and impossibility...
There are many books and monographs on corrosion, such as Corrosion and Corrosion Control by H. H. Uhlig and R. W. Revie; Corrosion Engineering by M. G. Fontana and N. D. Greene; Principles and Prevention of Corrosion by D. A. Jones; An Introduction to Corrosion and Protection of Metals by G. Wranglen; and Corrosion for Science and...
Today's networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead...
Diabetes mellitus is an important public health problem worldwide, and more than 75% of patients who have had diabetes mellitus for more than 20 years will have some sort of retinopathy. Diabetic retinopathy correlates with the duration of diabetes; thus with increasing life expectancy, diabetic retinopathy and the ensuing blindness will tend...
An unparalleled learning tool and guide to error correction coding
Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...