0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,945)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Quantum Error Correction - Symmetric, Asymmetric, Synchronizable, and Convolutional Codes (Hardcover, 1st ed. 2020): Giuliano... Quantum Error Correction - Symmetric, Asymmetric, Synchronizable, and Convolutional Codes (Hardcover, 1st ed. 2020)
Giuliano Gadioli La Guardia
R2,523 Discovery Miles 25 230 Ships in 12 - 19 working days

This text presents an algebraic approach to the construction of several important families of quantum codes derived from classical codes by applying the well-known Calderbank-Shor-Steane (CSS), Hermitian, and Steane enlargement constructions to certain classes of classical codes. In addition, the book presents families of asymmetric quantum codes with good parameters and provides a detailed description of the procedures adopted to construct families of asymmetric quantum convolutional codes.Featuring accessible language and clear explanations, the book is suitable for use in advanced undergraduate and graduate courses as well as for self-guided study and reference. It provides an expert introduction to algebraic techniques of code construction and, because all of the constructions are performed algebraically, it enables the reader to construct families of codes, rather than only codes with specific parameters. The text offers an abundance of worked examples, exercises, and open-ended problems to motivate the reader to further investigate this rich area of inquiry. End-of-chapter summaries and a glossary of key terms allow for easy review and reference.

Empowering Teaching for Digital Equity and Agency - IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, Mumbai,... Empowering Teaching for Digital Equity and Agency - IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, Mumbai, India, January 6-8, 2020, Proceedings (Hardcover, 1st ed. 2020)
Torsten Brinda, Don Passey, Therese Keane
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, held in Mumbai, India, in January 2020. The 11 full papers and 4 short papers included in this volume were carefully reviewed and selected from 57 submissions. The papers discuss key emerging topics and evolving practices in the area of educational computing research. They are organized in the following topical sections: computing education; learners' and teachers' perspectives; teacher professional development; the industry perspective; and further aspects.

Quantum Information Processing - Theory and Implementation (Hardcover, 2nd ed. 2021): Janos A. Bergou, Mark Hillery, Mark... Quantum Information Processing - Theory and Implementation (Hardcover, 2nd ed. 2021)
Janos A. Bergou, Mark Hillery, Mark Saffman
R2,876 Discovery Miles 28 760 Ships in 12 - 19 working days

This new edition of a well-received textbook provides a concise introduction to both the theoretical and experimental aspects of quantum information at the graduate level. While the previous edition focused on theory, the book now incorporates discussions of experimental platforms. Several chapters on experimental implementations of quantum information protocols have been added: implementations using neutral atoms, trapped ions, optics, and solidstate systems are each presented in its own chapter. Previous chapters on entanglement, quantum measurements, quantum dynamics, quantum cryptography, and quantum algorithms have been thoroughly updated, and new additions include chapters on the stabilizer formalism and the Gottesman-Knill theorem as well as aspects of classical and quantum information theory. To facilitate learning, each chapter starts with a clear motivation to the topic and closes with exercises and a recommended reading list. Quantum Information Processing: Theory and Implementation will be essential to graduate students studying quantum information as well as and researchers in other areas of physics who wish to gain knowledge in the field.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,435 Discovery Miles 34 350 Ships in 12 - 19 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Construction and Analysis of Cryptographic Functions (Hardcover, 2014 ed.): Lilya Budaghyan Construction and Analysis of Cryptographic Functions (Hardcover, 2014 ed.)
Lilya Budaghyan
R3,471 Discovery Miles 34 710 Ships in 12 - 19 working days

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equivalence relations for these functions and develops several new methods for construction of their infinite families. In addition, the book offers solutions to two longstanding open problems, including the problem on characterization of APN and AB functions via Boolean, and the problem on the relation between two classes of bent functions.

Designs From Linear Codes (Hardcover): Cunsheng Ding Designs From Linear Codes (Hardcover)
Cunsheng Ding
R4,321 Discovery Miles 43 210 Ships in 10 - 15 working days

This monograph aims to provide a well-rounded and detailed account of designs using linear codes. Most chapters of this monograph cover on the designs of linear codes. A few chapters deal with designs obtained from linear codes in other ways. Connections among ovals, hyperovals, maximal arcs, ovoids, linear codes and designs are also investigated. This book consists of both classical results on designs from linear codes and recent results yet published by others.This monograph is intended to be a reference for postgraduates and researchers who work on combinatorics, or coding theory, or digital communications, or finite geometry.

Estimating Functional Connectivity and Topology in Large-Scale Neuronal Assemblies - Statistical and Computational Methods... Estimating Functional Connectivity and Topology in Large-Scale Neuronal Assemblies - Statistical and Computational Methods (Hardcover, 1st ed. 2021)
Vito Paolo Pastore
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book describes a set of novel statistical algorithms designed to infer functional connectivity of large-scale neural assemblies. The algorithms are developed with the aim of maximizing computational accuracy and efficiency, while faithfully reconstructing both the inhibitory and excitatory functional links. The book reports on statistical methods to compute the most significant functional connectivity graph, and shows how to use graph theory to extract the topological features of the computed network. A particular feature is that the methods used and extended at the purpose of this work are reported in a fairly completed, yet concise manner, together with the necessary mathematical fundamentals and explanations to understand their application. Furthermore, all these methods have been embedded in the user-friendly open source software named SpiCoDyn, which is also introduced here. All in all, this book provides researchers and graduate students in bioengineering, neurophysiology and computer science, with a set of simplified and reduced models for studying functional connectivity in in silico biological neuronal networks, thus overcoming the complexity of brain circuits.

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.): Czeslaw Koscielny,... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,701 Discovery Miles 27 010 Ships in 12 - 19 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Partially Homomorphic Encryption (Hardcover, 1st ed. 2021): Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger Partially Homomorphic Encryption (Hardcover, 1st ed. 2021)
Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger
R3,602 Discovery Miles 36 020 Ships in 10 - 15 working days

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.

Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine,... Information Technology in Disaster Risk Reduction - 4th IFIP TC 5 DCITDRR International Conference, ITDRR 2019, Kyiv, Ukraine, October 9-10, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Yuko Murayama, Dimiter Velev, Plamena Zlateva
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R4,259 Discovery Miles 42 590 Ships in 12 - 19 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.): Surya Nepal, Mukaddim Pathan Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.)
Surya Nepal, Mukaddim Pathan
R4,682 R3,820 Discovery Miles 38 200 Save R862 (18%) Ships in 12 - 19 working days

The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes
- Cloud security fundamentals and related technologies to-date, with a comprehensive
coverage of evolution, current landscape, and future roadmap.
- A smooth organization with introductory, advanced and specialist content, i.e. from basics
of security, privacy and trust in cloud systems, to advanced cartographic techniques,
case studies covering both social and technological aspects, and advanced platforms.
- Case studies written by professionals and/or industrial researchers.
- Inclusion of a section on Cloud security and eGovernance tutorial that can be used
for knowledge transfer and teaching purpose.
- Identification of open research issues to help practitioners and researchers.
The book is a timely topic for readers, including practicing engineers and
academics, in the domains related to the engineering, science, and art of building networks and
networked applications. Specifically, upon reading this book, audiences will perceive the following
benefits:
1. Learn the state-of-the-art in research and development on cloud security, privacy and
trust.
2. Obtain a future roadmap by learning open research issues.
3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.

Storing and Transmitting Data - Rudolf Ahlswede's Lectures on Information Theory 1 (Hardcover, 2014 ed.): Rudolf Ahlswede Storing and Transmitting Data - Rudolf Ahlswede's Lectures on Information Theory 1 (Hardcover, 2014 ed.)
Rudolf Ahlswede; Edited by Alexander Ahlswede, Ingo Althoefer, Christian Deppe, Ulrich Tamm
R2,609 R2,083 Discovery Miles 20 830 Save R526 (20%) Ships in 12 - 19 working days

The volume "Storing and Transmitting Data" is based on Rudolf Ahlswede's introductory course on "Information Theory I" and presents an introduction to Shannon Theory. Readers, familiar or unfamiliar with the technical intricacies of Information Theory, will benefit considerably from working through the book; especially Chapter VI with its lively comments and uncensored insider views from the world of science and research offers informative and revealing insights. This is the first of several volumes that will serve as a collected research documentation of Rudolf Ahlswede's lectures on information theory. Each volume includes comments from an invited well-known expert. Holger Boche contributed his insights in the supplement of the present volume. Classical information processing concerns the main tasks of gaining knowledge, storage, transmitting and hiding data. The first task is the prime goal of Statistics. For the two next, Shannon presented an impressive mathematical theory called Information Theory, which he based on probabilistic models. The theory largely involves the concept of codes with small error probabilities in spite of noise in the transmission, which is modeled by channels. The lectures presented in this work are suitable for graduate students in Mathematics, and also in Theoretical Computer Science, Physics, and Electrical Engineering with background in basic Mathematics. The lectures can be used as the basis for courses or to supplement courses in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find the basis of entire research programs.

OFDM - Concepts for Future Communication Systems (Hardcover, 2011 Ed.): Hermann Rohling OFDM - Concepts for Future Communication Systems (Hardcover, 2011 Ed.)
Hermann Rohling
R2,896 Discovery Miles 28 960 Ships in 10 - 15 working days

(Preliminary): The Orthogonal Frequency Division Multiplexing (OFDM) digital transmission technique has several advantages in broadcast and mobile communications applications. The main objective of this book is to give a good insight into these efforts, and provide the reader with a comprehensive overview of the scientific progress which was achieved in the last decade. Besides topics of the physical layer, such as coding, modulation and non-linearities, a special emphasis is put on system aspects and concepts, in particular regarding cellular networks and using multiple antenna techniques. The work extensively addresses challenges of link adaptation, adaptive resource allocation and interference mitigation in such systems. Moreover, the domain of cross-layer design, i.e. the combination of physical layer aspects and issues of higher layers, are considered in detail. These results will facilitate and stimulate further innovation and development in the design of modern communication systems, based on the powerful OFDM transmission technique.

Cooperative Communications and Networking - Technologies and System Design (Hardcover, 2010 Ed.): Y -W Peter Hong, Wan-Jen... Cooperative Communications and Networking - Technologies and System Design (Hardcover, 2010 Ed.)
Y -W Peter Hong, Wan-Jen Huang, C.-C.Jay Kuo
R4,593 Discovery Miles 45 930 Ships in 10 - 15 working days

Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional transmission techniques gradually reach their limits. Cooperative and relay technologies have also made their way toward next generation wireless standards, such as IEEE802.16 (WiMAX) or LTE, and have been incorporated into many modern wireless applications, such as cognitive radio and secret communications.

"Cooperative Communications and Networking: Technologies and System Design" provides a systematic introduction to the fundamental concepts of cooperative communications and relays technology to enable engineers, researchers or graduate students to conduct advanced research and development in this area.

"Cooperative Communications and Networking: Technologies and System Design" provides researchers, graduate students, and practical engineers with sufficient knowledge of both the background of cooperative communications and networking, and potential research directions.

Recent Advances in Multimedia Signal Processing and Communications (Hardcover, 2010 ed.): Mislav Grgic, Kresimir Delac,... Recent Advances in Multimedia Signal Processing and Communications (Hardcover, 2010 ed.)
Mislav Grgic, Kresimir Delac, Mohammed Ghanbari
R4,479 Discovery Miles 44 790 Ships in 10 - 15 working days

The rapid increase in computing power and communication speed, coupled with computer storage facilities availability, has led to a new age of multimedia app- cations. Multimedia is practically everywhere and all around us we can feel its presence in almost all applications ranging from online video databases, IPTV, - teractive multimedia and more recently in multimedia based social interaction. These new growing applications require high-quality data storage, easy access to multimedia content and reliable delivery. Moving ever closer to commercial - ployment also aroused a higher awareness of security and intellectual property management issues. All the aforementioned requirements resulted in higher demands on various - eas of research (signal processing, image/video processing and analysis, com- nication protocols, content search, watermarking, etc.). This book covers the most prominent research issues in multimedia and is divided into four main sections: i) content based retrieval, ii) storage and remote access, iii) watermarking and co- right protection and iv) multimedia applications. Chapter 1 of the first section presents an analysis on how color is used and why is it crucial in nowadays multimedia applications. In chapter 2 the authors give an overview of the advances in video abstraction for fast content browsing, transm- sion, retrieval and skimming in large video databases and chapter 3 extends the discussion on video summarization even further. Content retrieval problem is tackled in chapter 4 by describing a novel method for producing meaningful s- ments suitable for MPEG-7 description based on binary partition trees (BPTs).

Cybersecurity Exposed - The Cyber House Rules (Hardcover): Raef Meeuwisse Cybersecurity Exposed - The Cyber House Rules (Hardcover)
Raef Meeuwisse
R706 Discovery Miles 7 060 Ships in 10 - 15 working days
Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.): Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.)
Ehab Al-Shaer
R3,440 Discovery Miles 34 400 Ships in 12 - 19 working days

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover): Satoshi Nakamoto Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover)
Satoshi Nakamoto
R4,069 R3,280 Discovery Miles 32 800 Save R789 (19%) Ships in 10 - 15 working days
Handbook on Ontologies (Hardcover, 2nd ed. 2009): Steffen Staab, Rudi Studer Handbook on Ontologies (Hardcover, 2nd ed. 2009)
Steffen Staab, Rudi Studer
R10,483 Discovery Miles 104 830 Ships in 12 - 19 working days

An ontology is a formal description of concepts and relationships that can exist for a community of human and/or machine agents. The notion of ontologies is crucial for the purpose of enabling knowledge sharing and reuse. The Handbook on Ontologies provides a comprehensive overview of the current status and future prospectives of the field of ontologies considering ontology languages, ontology engineering methods, example ontologies, infrastructures and technologies for ontologies, and how to bring this all into ontology-based infrastructures and applications that are among the best of their kind. The field of ontologies has tremendously developed and grown in the five years since the first edition of the "Handbook on Ontologies." Therefore, its revision includes 21 completely new chapters as well as a major re-working of 15 chapters transferred to this second edition.

Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March... Critical Infrastructure Protection III - Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers (Hardcover, 2009 ed.)
Charles Palmer, Sujeet Shenoi
R2,899 Discovery Miles 28 990 Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.

Directed Information Measures in Neuroscience (Hardcover, 2014): Michael Wibral, Raul Vicente, Joseph T. Lizier Directed Information Measures in Neuroscience (Hardcover, 2014)
Michael Wibral, Raul Vicente, Joseph T. Lizier
R4,402 R3,545 Discovery Miles 35 450 Save R857 (19%) Ships in 12 - 19 working days

Analysis of information transfer has found rapid adoption in neuroscience, where a highly dynamic transfer of information continuously runs on top of the brain's slowly-changing anatomical connectivity. Measuring such transfer is crucial to understanding how flexible information routing and processing give rise to higher cognitive function. "Directed Information Measures in Neuroscience" reviews recent developments of concepts and tools for measuring information transfer, their application to neurophysiological recordings and analysis of interactions. Written by the most active researchers in the field the book discusses the state of the art, future prospects and challenges on the way to an efficient assessment of neuronal information transfer. Highlights include the theoretical quantification and practical estimation of information transfer, description of transfer locally in space and time, multivariate directed measures, information decomposition among a set of stimulus/responses variables and the relation between interventional and observational causality. Applications to neural data sets and pointers to open source software highlight the usefulness of these measures in experimental neuroscience. With state-of-the-art mathematical developments, computational techniques and applications to real data sets, this book will be of benefit to all graduate students and researchers interested in detecting and understanding the information transfer between components of complex systems.

Computational Information Geometry - For Image and Signal Processing (Hardcover, 1st ed. 2017): Frank Nielsen, Frank Critchley,... Computational Information Geometry - For Image and Signal Processing (Hardcover, 1st ed. 2017)
Frank Nielsen, Frank Critchley, Christopher T. J. Dodson
R5,352 Discovery Miles 53 520 Ships in 12 - 19 working days

This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

Applications of Cryptography and Network Security (Hardcover): Stephen Mason Applications of Cryptography and Network Security (Hardcover)
Stephen Mason
R3,412 R3,083 Discovery Miles 30 830 Save R329 (10%) Ships in 10 - 15 working days
Identity-Based Encryption (Hardcover, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Hardcover, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
New Frontiers in Cryptography - Quantum…
Khaled Salah Mohamed Hardcover R3,611 Discovery Miles 36 110
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,611 Discovery Miles 16 110
Quantum Computing for High School…
Yuly Billig Hardcover R848 R732 Discovery Miles 7 320
New Research on the Voynich Manuscript…
National Security Agency Hardcover R568 Discovery Miles 5 680
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
The Economics of Blockchain and…
James L. Caton Hardcover R3,044 Discovery Miles 30 440
Introduction to Bitcoin
David Ricardo Hardcover R799 Discovery Miles 7 990
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,551 Discovery Miles 25 510
Bitcoin - Guide Book for Beginners
Keizer Soeze Hardcover R1,151 R967 Discovery Miles 9 670

 

Partners