Latest version: v0.4.3
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Implementation of an algorithm for a polygon decomposition by Hert, S. and Lumelsky, V., 1998
No known vulnerabilities found
Has known vulnerabilities