Starting with novel algorithms for optimally updating bounding volume hierarchies of objects undergoing arbitrary deformations, the author presents a new data structure that allows, for the first time, the computation of the penetration volume. The penetration volume is related to the water displacement of the overlapping region, and thus...
A major limitation of conventional web sites is their unorganized and isolated contents, which is created mainly for human consumption. This limitation can be addressed by organizing and publishing data, using powerful formats that add structure and meaning to the content of web pages and link related data to one another. Computers can...
This invaluable book has been designed to be useful to most practising scientists and engineers, whatever their field and however rusty their mathematics and programming might be. The approach taken is largely practical, with algorithms being presented in full and working code (in Basic, Fortran, Pascal And C) included on a floppy disk to...
Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...
This text is an introduction to the basic principles of electrical engineering. It is the outgrowth of
lecture notes prepared by this author while teaching for the electrical engineering and computer
engineering departments at San José State University, DeAnza college, and the College of San Mateo,...
This book discusses an emerging area in computer science, IT and management, i.e., decision sciences and management. It includes studies that employ various computing techniques like machine learning to generate insights from huge amounts of available data; and which explore decision-making for cross-platforms that contain...
The book is intended to be an “industrial strength” introduction to digital image processing to be used as a text for an electrical engineering or computer science course in the subject. Also, it can be used as a reference manual for scientists who are engaged in image processing research, developers of image processing...
Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?
Despite people’s best efforts information systems are particularly prone to failure. Some systems never materialize, others appear late and/or over budget and those that are implemented often fail to deliver the promised levels of performance. The consequences of these failures affect people throughout the organization concerned and beyond,...
On any given day there are more than 7 million items listed for auction at ebay (ebay), the world's largest online trading community. At the end of its last fiscal quarter, ebay had 49.7 million registered users, more than double the number of users just two years previous. It is estimated that $9.3 billion worth of merchandise, in more than 423...
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic...