0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (64)
  • R500+ (5,377)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018): Tsuyoshi Takagi,... Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R4,548 Discovery Miles 45 480 Ships in 10 - 15 working days

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,947 Discovery Miles 29 470 Ships in 10 - 15 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

Computer Solution of Large Linear Systems, Volume 28 (Hardcover): Gerard Meurant Computer Solution of Large Linear Systems, Volume 28 (Hardcover)
Gerard Meurant
R4,126 Discovery Miles 41 260 Ships in 12 - 17 working days

Hardbound. This book deals with numerical methods for solving large sparse linear systems of equations, particularly those arising from the discretization of partial differential equations. It covers both direct and iterative methods. Direct methods which are considered are variants of Gaussian elimination and fast solvers for separable partial differential equations in rectangular domains. The book reviews the classical iterative methods like Jacobi, Gauss-Seidel and alternating directions algorithms. A particular emphasis is put on the conjugate gradient as well as conjugate gradient -like methods for non symmetric problems. Most efficient preconditioners used to speed up convergence are studied. A chapter is devoted to the multigrid method and the book ends with domain decomposition algorithms that are well suited for solving linear systems on parallel computers.

Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018):... Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018)
Marco Baldi, Stefano Tomasin, Elizabeth A. Quaglia
R5,148 R4,802 Discovery Miles 48 020 Save R346 (7%) Ships in 12 - 17 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

Reduced Order Methods for Modeling and Computational Reduction (Hardcover, 2014 ed.): Alfio Quarteroni, Gianluigi Rozza Reduced Order Methods for Modeling and Computational Reduction (Hardcover, 2014 ed.)
Alfio Quarteroni, Gianluigi Rozza
R3,654 Discovery Miles 36 540 Ships in 12 - 17 working days

This monograph addresses the state of the art of reduced order methods for modeling and computational reduction of complex parametrized systems, governed by ordinary and/or partial differential equations, with a special emphasis on real time computing techniques and applications in computational mechanics, bioengineering and computer graphics.

Several topics are covered, including: design, optimization, and control theory in real-time with applications in engineering; data assimilation, geometry registration, and parameter estimation with special attention to real-time computing in biomedical engineering and computational physics; real-time visualization of physics-based simulations in computer science; the treatment of high-dimensional problems in state space, physical space, or parameter space; the interactions between different model reduction and dimensionality reduction approaches; the development of general error estimation frameworks which take into account both model and discretization effects.

This book is primarily addressed to computational scientists interested in computational reduction techniques for large scale differential problems.

Symmetric Cryptographic Protocols (Hardcover, 2014 ed.): Mahalingam Ramkumar Symmetric Cryptographic Protocols (Hardcover, 2014 ed.)
Mahalingam Ramkumar
R4,398 R3,545 Discovery Miles 35 450 Save R853 (19%) Ships in 12 - 17 working days

This book focuseson protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees."

Tensor Eigenvalues and Their Applications (Hardcover, 1st ed. 2018): Liqun Qi, Haibin Chen, Yannan Chen Tensor Eigenvalues and Their Applications (Hardcover, 1st ed. 2018)
Liqun Qi, Haibin Chen, Yannan Chen
R4,234 Discovery Miles 42 340 Ships in 12 - 17 working days

This book offers an introduction to applications prompted by tensor analysis, especially by the spectral tensor theory developed in recent years. It covers applications of tensor eigenvalues in multilinear systems, exponential data fitting, tensor complementarity problems, and tensor eigenvalue complementarity problems. It also addresses higher-order diffusion tensor imaging, third-order symmetric and traceless tensors in liquid crystals, piezoelectric tensors, strong ellipticity for elasticity tensors, and higher-order tensors in quantum physics. This book is a valuable reference resource for researchers and graduate students who are interested in applications of tensor eigenvalues.

A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018): Thant Zin Oo, Nguyen H. Tran,... A Survey on Coordinated Power Management in Multi-Tenant Data Centers (Hardcover, 1st ed. 2018)
Thant Zin Oo, Nguyen H. Tran, Shaolei Ren, Choong Seon Hong
R3,472 Discovery Miles 34 720 Ships in 12 - 17 working days

This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.

Statistical Applications from Clinical Trials and Personalized Medicine to Finance and Business Analytics - Selected Papers... Statistical Applications from Clinical Trials and Personalized Medicine to Finance and Business Analytics - Selected Papers from the 2015 ICSA/Graybill Applied Statistics Symposium, Colorado State University, Fort Collins (Hardcover, 1st ed. 2016)
Jianchang Lin, Bushi Wang, Xiaowen Hu, Kun Chen, Ray Liu
R6,566 Discovery Miles 65 660 Ships in 10 - 15 working days

The papers in this volume represent a broad, applied swath of advanced contributions to the 2015 ICSA/Graybill Applied Statistics Symposium of the International Chinese Statistical Association, held at Colorado State University in Fort Collins. The contributions cover topics that range from statistical applications in business and finance to applications in clinical trials and biomarker analysis. Each papers was peer-reviewed by at least two referees and also by an editor. The conference was attended by over 400 participants from academia, industry, and government agencies around the world, including from North America, Asia, and Europe.

Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016): Jiuwen Cao, Kezhi Mao,... Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016)
Jiuwen Cao, Kezhi Mao, Jonathan Wu, Amaury Lendasse
R6,936 Discovery Miles 69 360 Ships in 12 - 17 working days

This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.

Computational Intelligence and Optimization Methods for Control Engineering (Hardcover, 1st ed. 2019): Maude Josee Blondin,... Computational Intelligence and Optimization Methods for Control Engineering (Hardcover, 1st ed. 2019)
Maude Josee Blondin, Panos M. Pardalos, Javier Sanchis Saez
R2,633 R2,084 Discovery Miles 20 840 Save R549 (21%) Ships in 12 - 17 working days

This volume presents some recent and principal developments related to computational intelligence and optimization methods in control. Theoretical aspects and practical applications of control engineering are covered by 14 self-contained contributions. Additional gems include the discussion of future directions and research perspectives designed to add to the reader's understanding of both the challenges faced in control engineering and the insights into the developing of new techniques. With the knowledge obtained, readers are encouraged to determine the appropriate control method for specific applications.

Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015): Hans Delfs, Helmut Knebl Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015)
Hans Delfs, Helmut Knebl
R2,834 Discovery Miles 28 340 Ships in 12 - 17 working days

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.): Czeslaw Koscielny,... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,690 Discovery Miles 26 900 Ships in 12 - 17 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Nature-Inspired Computation in Navigation and Routing Problems - Algorithms, Methods and Applications (Hardcover, 1st ed.... Nature-Inspired Computation in Navigation and Routing Problems - Algorithms, Methods and Applications (Hardcover, 1st ed. 2020)
Xin-She Yang, Yuxin Zhao
R2,961 Discovery Miles 29 610 Ships in 10 - 15 working days

This book discusses all the major nature-inspired algorithms with a focus on their application in the context of solving navigation and routing problems. It also reviews the approximation methods and recent nature-inspired approaches for practical navigation, and compares these methods with traditional algorithms to validate the approach for the case studies discussed. Further, it examines the design of alternative solutions using nature-inspired techniques, and explores the challenges of navigation and routing problems and nature-inspired metaheuristic approaches.

Iterative Learning Control - An Optimization Paradigm (Hardcover, 1st ed. 2016): David H. Owens Iterative Learning Control - An Optimization Paradigm (Hardcover, 1st ed. 2016)
David H. Owens
R4,835 Discovery Miles 48 350 Ships in 12 - 17 working days

This book develops a coherent and quite general theoretical approach to algorithm design for iterative learning control based on the use of operator representations and quadratic optimization concepts including the related ideas of inverse model control and gradient-based design. Using detailed examples taken from linear, discrete and continuous-time systems, the author gives the reader access to theories based on either signal or parameter optimization. Although the two approaches are shown to be related in a formal mathematical sense, the text presents them separately as their relevant algorithm design issues are distinct and give rise to different performance capabilities. Together with algorithm design, the text demonstrates the underlying robustness of the paradigm and also includes new control laws that are capable of incorporating input and output constraints, enable the algorithm to reconfigure systematically in order to meet the requirements of different reference and auxiliary signals and also to support new properties such as spectral annihilation. Iterative Learning Control will interest academics and graduate students working in control who will find it a useful reference to the current status of a powerful and increasingly popular method of control. The depth of background theory and links to practical systems will be of use to engineers responsible for precision repetitive processes.

Optimization Techniques in Computer Vision - Ill-Posed Problems and Regularization (Hardcover, 1st ed. 2016): Mongi A. Abidi,... Optimization Techniques in Computer Vision - Ill-Posed Problems and Regularization (Hardcover, 1st ed. 2016)
Mongi A. Abidi, Andrei V. Gribok, Joonki Paik
R4,297 Discovery Miles 42 970 Ships in 12 - 17 working days

This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc. Optimization plays a major role in a wide variety of theories for image processing and computer vision. Various optimization techniques are used at different levels for these problems, and this volume summarizes and explains these techniques as applied to image processing and computer vision.

GPS - Theory, Algorithms and Applications (Hardcover, 3rd ed. 2016): Guochang Xu, Yan Xu GPS - Theory, Algorithms and Applications (Hardcover, 3rd ed. 2016)
Guochang Xu, Yan Xu
R5,559 Discovery Miles 55 590 Ships in 12 - 17 working days

This reference and handbook describes theory, algorithms and applications of the Global Positioning System (GPS/Glonass/Galileo/Compass). It is primarily based on source-code descriptions of the KSGsoft program developed at the GFZ in Potsdam. The theory and algorithms are extended and verified for a new development of a multi-functional GPS/Galileo software. Besides the concepts such as the unified GPS data processing method, the diagonalisation algorithm, the adaptive Kalman filter, the general ambiguity search criteria, and the algebraic solution of variation equation reported in the first edition, the equivalence theorem of the GPS algorithms, the independent parameterisation method, and the alternative solar radiation model reported in the second edition, the modernisation of the GNSS system, the new development of the theory and algorithms, and research in broad applications are supplemented in this new edition. Mathematically rigorous, the book begins with the introduction, the basics of coordinate and time systems and satellite orbits, as well as GPS observables, and deals with topics such as physical influences, observation equations and their parameterisation, adjustment and filtering, ambiguity resolution, software development and data processing and the determination of perturbed orbits.

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R4,242 Discovery Miles 42 420 Ships in 12 - 17 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Proceedings of International Scientific Conference on Telecommunications, Computing and Control - TELECCON 2019 (Hardcover, 1st... Proceedings of International Scientific Conference on Telecommunications, Computing and Control - TELECCON 2019 (Hardcover, 1st ed. 2021)
Nikita Voinov, Tobias Schreck, Sanowar Khan
R7,675 Discovery Miles 76 750 Ships in 12 - 17 working days

This book provides a platform for academics and practitioners for sharing innovative results, approaches, developments, and research projects in computer science and information technology, focusing on the latest challenges in advanced computing and solutions introducing mathematical and engineering approaches. The book presents discussions in the area of advances and challenges of modern computer science, including telecommunications and signal processing, machine learning and artificial intelligence, intelligent control systems, modeling and simulation, data science and big data, data visualization and graphics systems, distributed, cloud and high-performance computing, and software engineering. The papers included are presented at TELECCON 2019 organized by Peter the Great St. Petersburg University during November 18-19, 2019.

Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018): Sukhendu Kanrar, Nabendu Chaki,... Concurrency Control in Distributed System Using Mutual Exclusion (Hardcover, 1st ed. 2018)
Sukhendu Kanrar, Nabendu Chaki, Samiran Chattopadhyay
R2,947 Discovery Miles 29 470 Ships in 10 - 15 working days

The book presents various state-of-the-art approaches for process synchronization in a distributed environment. The range of algorithms discussed in the book starts from token based mutual exclusion algorithms that work on tree based topology. Then there are interesting solutions for more flexible logical topology like a directed graph, with or without cycle. In a completely different approach, one of the chapters presents two recent voting-based DME algorithms. All DME algorithms presented in the book aim to ensure fairness in terms of first come first serve (FCFS) order among equal priority processes. At the same time, the solutions consider the priority of the requesting processes and allocate resource for the earliest request when no such request from a higher priority process is pending.

Algorithms as a Basis of Modern Applied Mathematics (Hardcover, 1st ed. 2021): Sarka Hoskova-Mayerova, Cristina Flaut, Fabrizio... Algorithms as a Basis of Modern Applied Mathematics (Hardcover, 1st ed. 2021)
Sarka Hoskova-Mayerova, Cristina Flaut, Fabrizio Maturo
R5,621 Discovery Miles 56 210 Ships in 12 - 17 working days

This book offers a self-contained guide to advanced algorithms and their applications in various fields of science. Gathering contributions by authoritative researchers in the field of mathematics, statistics and computer science, it aims at offering a comprehensive and up-to-date view of algorithms, including the theory behind them, as well as practical considerations, current limitations and solutions. It covers applications in energy management, decision making, computer networks, materials science, mechanics and process optimization. It offers an integrated and timely guide to important algorithms, and represents a valuable reference resource for graduate students and researchers in various fields of applied mathematics, statistics and engineering.

The Application of Artificial Intelligence - Step-by-Step Guide from Beginner to Expert (Hardcover, 1st ed. 2021): Zoltan... The Application of Artificial Intelligence - Step-by-Step Guide from Beginner to Expert (Hardcover, 1st ed. 2021)
Zoltan Somogyi
R3,223 Discovery Miles 32 230 Ships in 12 - 17 working days

This book presents a unique, understandable view of machine learning using many practical examples and access to free professional software and open source code. The user-friendly software can immediately be used to apply everything you learn in the book without the need for programming. After an introduction to machine learning and artificial intelligence, the chapters in Part II present deeper explanations of machine learning algorithms, performance evaluation of machine learning models, and how to consider data in machine learning environments. In Part III the author explains automatic speech recognition, and in Part IV biometrics recognition, face- and speaker-recognition. By Part V the author can then explain machine learning by example, he offers cases from real-world applications, problems, and techniques, such as anomaly detection and root cause analyses, business process improvement, detecting and predicting diseases, recommendation AI, several engineering applications, predictive maintenance, automatically classifying datasets, dimensionality reduction, and image recognition. Finally, in Part VI he offers a detailed explanation of the AI-TOOLKIT, software he developed that allows the reader to test and study the examples in the book and the application of machine learning in professional environments. The author introduces core machine learning concepts and supports these with practical examples of their use, so professionals will appreciate his approach and use the book for self-study. It will also be useful as a supplementary resource for advanced undergraduate and graduate courses on machine learning and artificial intelligence.

Spatial Gems, Volume 1 (Hardcover): John Krumm, Andreas Zufle, Cyrus Shahabi Spatial Gems, Volume 1 (Hardcover)
John Krumm, Andreas Zufle, Cyrus Shahabi
R1,907 Discovery Miles 19 070 Ships in 10 - 15 working days

This book presents fundamental new techniques for understanding and processing geospatial data. These "spatial gems" articulate and highlight insightful ideas that often remain unstated in graduate textbooks, and which are not the focus of research papers. They teach us how to do something useful with spatial data, in the form of algorithms, code, or equations. Unlike a research paper, Spatial Gems, Volume 1 does not focus on "Look what we have done!" but rather shows "Look what YOU can do!" With contributions from researchers at the forefront of the field, this volume occupies a unique position in the literature by serving graduate students, professional researchers, professors, and computer developers in the field alike.

Parallel Architectures and Bioinspired Algorithms (Hardcover, 2012 ed.): Francisco Fernandez De Vega, Jose Ignacio Hidalgo... Parallel Architectures and Bioinspired Algorithms (Hardcover, 2012 ed.)
Francisco Fernandez De Vega, Jose Ignacio Hidalgo Perez, Juan Lanchares
R4,492 Discovery Miles 44 920 Ships in 10 - 15 working days

This monograph presents examples of best practices when combining bioinspired algorithms with parallel architectures. The book includes recent work by leading researchers in the field and offers a map with the main paths already explored and new ways towards the future. Parallel Architectures and Bioinspired Algorithms will be of value to both specialists in Bioinspired Algorithms, Parallel and Distributed Computing, as well as computer science students trying to understand the present and the future of Parallel Architectures and Bioinspired Algorithms.

Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Hardcover, 2013 ed.): Eric Peeters Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Hardcover, 2013 ed.)
Eric Peeters
R3,716 R3,435 Discovery Miles 34 350 Save R281 (8%) Ships in 12 - 17 working days

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sound Innovations Concert Band - Bb…
Robert Sheldon, Peter Boonshaft, … Sheet music R312 R293 Discovery Miles 2 930
How To Dryland Train For Swimming - Your…
Howexpert Hardcover R796 Discovery Miles 7 960
Advanced Introduction to Public Policy
B G Peters Paperback R806 Discovery Miles 8 060
Transactions of the American Institute…
American Institute of the City of York Paperback R787 Discovery Miles 7 870
Elgar Encyclopedia of European Union…
Paolo R Graziano, Jale Tosun Hardcover R8,169 Discovery Miles 81 690
Talpa - Or, the Chronicles of a Clay…
Chandos Wren Hoskyns Paperback R560 Discovery Miles 5 600
Pitfalls in Cervical Spine Surgery…
Luca Denaro, Domenico D'Avella, … Hardcover R3,139 Discovery Miles 31 390
Astrology: Scorpio
Ammonite Hardcover R234 Discovery Miles 2 340
Road And Bridges
Glynnis Hayward Paperback R271 Discovery Miles 2 710
Dala Sun Colour - 11 Olive (250ml…
R54 Discovery Miles 540

 

Partners