skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Digital Image Watermarking : Theoretical and Computational Advances. Preview this item
ClosePreview this item
Checking...

Digital Image Watermarking : Theoretical and Computational Advances.

Author: Surekha Borra; Rohit Thanki; Nilanjan Dey
Publisher: Milton : Chapman and Hall/CRC, 2018.
Series: Intelligent Signal Processing and Data Analysis Ser.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Borra, Surekha.
Digital Image Watermarking : Theoretical and Computational Advances.
Milton : Chapman and Hall/CRC, ©2018
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Surekha Borra; Rohit Thanki; Nilanjan Dey
ISBN: 9780429751578 0429751575
OCLC Number: 1078565489
Description: 1 online resource (175 pages)
Contents: Cover; Half Title; Series Page; Title Page; Copyright Page; Table of Contents; Preface; Authors; Abbreviations; 1: Introduction; 1.1 Digital Rights Management; 1.2 Digital Image Watermarking; 1.3 Classification of Copyright Marking; 1.4 General Framework of Digital Watermarking; 1.5 Performance Criteria; 1.6 Performance Metrics; 1.7 Attacks on Watermarks; 1.8 Digital Image Watermarking Tools; References; 2: Advanced Watermarking Techniques; 2.1 Introduction; 2.2 Watermarking in the Spatial Domain; 2.2.1 Least-Significant-Bit Substitution Technique; 2.2.2 Patchwork Technique 2.2.3 Texture Mapping Coding Technique2.2.4 Predictive Coding Technique; 2.2.5 Additive Watermarking Technique; 2.2.6 Other Spatial Domain Watermarking Techniques; 2.3 Watermarking in the Transform Domain; 2.4 Watermarking in the Discrete Cosine Transform; 2.5 Watermarking in the Discrete Wavelet Transform; 2.6 Watermarking Using Singular Value Decomposition; 2.7 Compressive Sensing and QR Decomposition Methods; 2.8 Schur Decomposition-Based Watermarking; 2.9 Hessenberg Matrix Factorization in Watermarking; 2.10 Visible and Reversible Watermarking 2.11 Machine Learning-Based Image Watermarking2.12 Challenges; References; 3: Watermarking Using Bio-Inspired Algorithms; 3.1 Optimization and Its Application to Digital Image Watermarking; 3.2 Image Watermarking Using Genetic Algorithm (GA) and Genetic Programming; 3.3 Image Watermarking Using Differential Evolution (DE); 3.4 Image Watermarking Using Swarm Algorithms; 3.4.1 Image Watermarking Using Ant Colony and Bee Colony; 3.4.2 Image Watermarking Using Cuckoo Search Algorithm; 3.4.3 Image Watermarking Using Particle Swarm Optimization; 3.4.4 Image Watermarking Using Firefly Algorithm 3.5 Image Watermarking using Simulated Annealing (SA)3.6 Image Watermarking Using Tabu Search; References; 4: Hardware-Based Implementation of Watermarking; 4.1 Introduction; 4.2 Hardware-Based Implementation of Digital Image Watermarking; 4.2.1 Hardware-Based Implementation of Watermarking Using DSP Boards; 4.2.2 Hardware-Based Implementation of Watermarking Using FPGA/ASIC Chip; 4.2.3 Hardware-Software Co-Simulation; 4.3 Performance of Hardware-Based Implementation; 4.4 Challenges and Future Directions; References; 5: Applied Examples and Future Prospectives 5.1 Applications of Watermarking5.2 Watermarking in Telemedicine; 5.3 Role of Watermarking in Remote-Sensing Military; 5.4 Industrial and Miscellaneous Applications; 5.5 Future PrOspectives; References; 6: Case Study; 6.1 Embedding Algorithm; 6.2 Extraction Algorithm; 6.3 Simulation Results; 6.4 Main Features of Proposed Scheme; References; Index
Series Title: Intelligent Signal Processing and Data Analysis Ser.

Abstract:

The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms. Includes a case study along with its MATLAB code and simulation results.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1078565489<\/a>> # Digital Image Watermarking : Theoretical and Computational Advances.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1078565489<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Place\/milton<\/a>> ; # Milton<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/security_auditing<\/a>> ; # Security Auditing<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/technology_&_engineering_imaging_systems<\/a>> ; # TECHNOLOGY & ENGINEERING--Imaging Systems<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/computer_security_technological_innovations<\/a>> ; # Computer security--Technological innovations<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/marks_of_origin_technological_innovations<\/a>> ; # Marks of origin--Technological innovations<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/computer_graphics<\/a>> ; # Computer Graphics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/computers_security_general<\/a>> ; # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/watermarks_technological_innovations<\/a>> ; # Watermarks--Technological innovations<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/bio_inspired_algorithim<\/a>> ; # Bio-inspired Algorithim<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/hardware_implementation<\/a>> ; # Hardware Implementation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/machine_learning<\/a>> ; # Machine Learning<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/image_processing_digital_techniques<\/a>> ; # Image processing--Digital techniques<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Person\/thanki_rohit<\/a>> ; # Rohit Thanki<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Person\/dey_nilanjan<\/a>> ; # Nilanjan Dey<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Person\/borra_surekha<\/a>> ; # Surekha Borra<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types, domain in which it is implemented and the application of machine learning algorithms onto digital watermarking Reviews hardware implementation of watermarking Discusses optimization problems and solutions in watermarking with a special focus on bio-inspired algorithms. Includes a case study along with its MATLAB code and simulation results.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Cover; Half Title; Series Page; Title Page; Copyright Page; Table of Contents; Preface; Authors; Abbreviations; 1: Introduction; 1.1 Digital Rights Management; 1.2 Digital Image Watermarking; 1.3 Classification of Copyright Marking; 1.4 General Framework of Digital Watermarking; 1.5 Performance Criteria; 1.6 Performance Metrics; 1.7 Attacks on Watermarks; 1.8 Digital Image Watermarking Tools; References; 2: Advanced Watermarking Techniques; 2.1 Introduction; 2.2 Watermarking in the Spatial Domain; 2.2.1 Least-Significant-Bit Substitution Technique; 2.2.2 Patchwork Technique<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5591395823<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Series\/intelligent_signal_processing_and_data_analysis_ser<\/a>> ; # Intelligent Signal Processing and Data Analysis Ser.<\/span>\n\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/5591395823#CreativeWork\/digital_image_watermarking_theoretical_and_computational_advances<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Digital Image Watermarking : Theoretical and Computational Advances.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1078565489<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1078565489#PublicationEvent\/milton_chapman_and_hall_crc_2018<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Agent\/chapman_and_hall_crc<\/a>> ; # Chapman and Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5606288<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9780429751578<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1078565489<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Agent\/chapman_and_hall_crc<\/a>> # Chapman and Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Chapman and Hall\/CRC<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Person\/borra_surekha<\/a>> # Surekha Borra<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Borra<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Surekha<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Surekha Borra<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Person\/dey_nilanjan<\/a>> # Nilanjan Dey<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Dey<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Nilanjan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Nilanjan Dey<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Person\/thanki_rohit<\/a>> # Rohit Thanki<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Thanki<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Rohit<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rohit Thanki<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Place\/milton<\/a>> # Milton<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Milton<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Series\/intelligent_signal_processing_and_data_analysis_ser<\/a>> # Intelligent Signal Processing and Data Analysis Ser.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1078565489<\/a>> ; # Digital Image Watermarking : Theoretical and Computational Advances.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Intelligent Signal Processing and Data Analysis Ser.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/bio_inspired_algorithim<\/a>> # Bio-inspired Algorithim<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Bio-inspired Algorithim<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/computer_graphics<\/a>> # Computer Graphics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer Graphics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/computer_security_technological_innovations<\/a>> # Computer security--Technological innovations<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security--Technological innovations<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/computers_security_general<\/a>> # COMPUTERS--Security--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/hardware_implementation<\/a>> # Hardware Implementation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Hardware Implementation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/image_processing_digital_techniques<\/a>> # Image processing--Digital techniques<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Image processing--Digital techniques<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/machine_learning<\/a>> # Machine Learning<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Machine Learning<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/marks_of_origin_technological_innovations<\/a>> # Marks of origin--Technological innovations<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Marks of origin--Technological innovations<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/security_auditing<\/a>> # Security Auditing<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Security Auditing<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/technology_&_engineering_imaging_systems<\/a>> # TECHNOLOGY & ENGINEERING--Imaging Systems<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"TECHNOLOGY & ENGINEERING--Imaging Systems<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Topic\/watermarks_technological_innovations<\/a>> # Watermarks--Technological innovations<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Watermarks--Technological innovations<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/5591395823#CreativeWork\/digital_image_watermarking_theoretical_and_computational_advances<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Digital Image Watermarking : Theoretical and Computational Advances.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1078565489<\/a>> ; # Digital Image Watermarking : Theoretical and Computational Advances.<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9780429751578<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"0429751575<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9780429751578<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1078565489<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1078565489<\/a>> ; # Digital Image Watermarking : Theoretical and Computational Advances.<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-04-13<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1078565489#PublicationEvent\/milton_chapman_and_hall_crc_2018<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Place\/milton<\/a>> ; # Milton<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5591395823#Agent\/chapman_and_hall_crc<\/a>> ; # Chapman and Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2018<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n