0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Finite Commutative Rings and Their Applications (Paperback, Softcover reprint of the original 1st ed. 2002): Gilberto Bini,... Finite Commutative Rings and Their Applications (Paperback, Softcover reprint of the original 1st ed. 2002)
Gilberto Bini, Flaminio Flamini
R2,625 Discovery Miles 26 250 Ships in 18 - 22 working days

Foreword by Dieter Jungnickel Finite Commutative Rings and their Applications answers a need for an introductory reference in finite commutative ring theory as applied to information and communication theory. This book will be of interest to both professional and academic researchers in the fields of communication and coding theory. The book is a concrete and self-contained introduction to finite commutative local rings, focusing in particular on Galois and Quasi-Galois rings. The reader is provided with an active and concrete approach to the study of the purely algebraic structure and properties of finite commutative rings (in particular, Galois rings) as well as to their applications to coding theory. Finite Commutative Rings and their Applications is the first to address both theoretical and practical aspects of finite ring theory. The authors provide a practical approach to finite rings through explanatory examples, thereby avoiding an abstract presentation of the subject. The section on Quasi-Galois rings presents new and unpublished results as well. The authors then introduce some applications of finite rings, in particular Galois rings, to coding theory, using a solid algebraic and geometric theoretical background.

Computer Applications for Security, Control and System Engineering - International Conferences, SecTech, CA, CES3 2012, Held in... Computer Applications for Security, Control and System Engineering - International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Adrian Stoica, Wai-Chi Fang, Thanos Vasilakos, Javier Garcia Villalba, …
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.

Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001)
Stefan Katzenbeisser
R2,616 Discovery Miles 26 160 Ships in 18 - 22 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Maximum Entropy and Bayesian Methods Garching, Germany 1998 - Proceedings of the 18th International Workshop on Maximum Entropy... Maximum Entropy and Bayesian Methods Garching, Germany 1998 - Proceedings of the 18th International Workshop on Maximum Entropy and Bayesian Methods of Statistical Analysis (Paperback, Softcover reprint of the original 1st ed. 1999)
Wolfgang Von Der Linden, Volker Dose, Rainer Fischer, Roland Preuss
R4,040 Discovery Miles 40 400 Ships in 18 - 22 working days

In 1978 Edwin T. Jaynes and Myron Tribus initiated a series of workshops to exchange ideas and recent developments in technical aspects and applications of Bayesian probability theory. The first workshop was held at the University of Wyoming in 1981 organized by C.R. Smith and W.T. Grandy. Due to its success, the workshop was held annually during the last 18 years. Over the years, the emphasis of the workshop shifted gradually from fundamental concepts of Bayesian probability theory to increasingly realistic and challenging applications. The 18th international workshop on Maximum Entropy and Bayesian Methods was held in Garching / Munich (Germany) (27-31. July 1998). Opening lectures by G. Larry Bretthorst and by Myron Tribus were dedicated to one of th the pioneers of Bayesian probability theory who died on the 30 of April 1998: Edwin Thompson Jaynes. Jaynes revealed and advocated the correct meaning of 'probability' as the state of knowledge rather than a physical property. This inter pretation allowed him to unravel longstanding mysteries and paradoxes. Bayesian probability theory, "the logic of science" - as E.T. Jaynes called it - provides the framework to make the best possible scientific inference given all available exper imental and theoretical information. We gratefully acknowledge the efforts of Tribus and Bretthorst in commemorating the outstanding contributions of E.T. Jaynes to the development of probability theory."

Advances in Information Technology - 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012,... Advances in Information Technology - 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012, Proceedings (Paperback, 2012 ed.)
Borworn Papasratorn, Nipon Charoenkitkarn, Kittichai Lavangnananda, Wichian Chutimaskul, Vajirasak Vanijja
R1,384 Discovery Miles 13 840 Ships in 18 - 22 working days

This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology, IAIT 2012, held in Bangkok, Thailand, in December 2012. The 18 revised papers presented in this volume were carefully reviewed and selected from 37 submissions. They deal with all areas related to applied information technology, such as e-service; information and communication technology; intelligent systems; information management; and platform technology.

Maximum Entropy and Bayesian Methods - Boise, Idaho, USA, 1997 Proceedings of the 17th International Workshop on Maximum... Maximum Entropy and Bayesian Methods - Boise, Idaho, USA, 1997 Proceedings of the 17th International Workshop on Maximum Entropy and Bayesian Methods of Statistical Analysis (Paperback, Softcover reprint of the original 1st ed. 1998)
G. Erickson, Joshua T. Rychert, C.R. Smith
R4,021 Discovery Miles 40 210 Ships in 18 - 22 working days

This volume has its origin in the Seventeenth International Workshop on Maximum Entropy and Bayesian Methods, MAXENT 97. The workshop was held at Boise State University in Boise, Idaho, on August 4 -8, 1997. As in the past, the purpose of the workshop was to bring together researchers in different fields to present papers on applications of Bayesian methods (these include maximum entropy) in science, engineering, medicine, economics, and many other disciplines. Thanks to significant theoretical advances and the personal computer, much progress has been made since our first Workshop in 1981. As indicated by several papers in these proceedings, the subject has matured to a stage in which computational algorithms are the objects of interest, the thrust being on feasibility, efficiency and innovation. Though applications are proliferating at a staggering rate, some in areas that hardly existed a decade ago, it is pleasing that due attention is still being paid to foundations of the subject. The following list of descriptors, applicable to papers in this volume, gives a sense of its contents: deconvolution, inverse problems, instrument (point-spread) function, model comparison, multi sensor data fusion, image processing, tomography, reconstruction, deformable models, pattern recognition, classification and group analysis, segmentation/edge detection, brain shape, marginalization, algorithms, complexity, Ockham's razor as an inference tool, foundations of probability theory, symmetry, history of probability theory and computability. MAXENT 97 and these proceedings could not have been brought to final form without the support and help of a number of people.

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3,... Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Chuankun Wu, Moti Yung, Dongdai Lin
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

The Mathematics of Information Coding, Extraction and Distribution (Paperback, Softcover reprint of the original 1st ed. 1999):... The Mathematics of Information Coding, Extraction and Distribution (Paperback, Softcover reprint of the original 1st ed. 1999)
George Cybenko, Dianne P O'Leary, Jorma Rissanen
R2,614 Discovery Miles 26 140 Ships in 18 - 22 working days

High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission of this data are major obstacles to effective use of computing power. Challenges inherent in all of these operations are security, speed, reliability, authentication and reproducibility. This workshop focused on a wide variety of technical results aimed at meeting these challenges. Topics ranging from the mathematics of coding theory to the practicalities of copyright preservation for Internet resources drew spirited discussion and interaction among experts in diverse but related fields. We hope this volume contributes to continuing this dialogue.

Information Systems Analysis and Modeling - An Informational Macrodynamics Approach (Paperback, Softcover reprint of the... Information Systems Analysis and Modeling - An Informational Macrodynamics Approach (Paperback, Softcover reprint of the original 1st ed. 2000)
Vladimir S. Lerner
R4,023 Discovery Miles 40 230 Ships in 18 - 22 working days

Informational Macrodynamics (IMD) presents the unified information systemic approach with common information language for modeling, analysis and optimization of a variety of interactive processes, such as physical, biological, economical, social, and informational, including human activities. Comparing it with thermodynamics, which deals with transformation energy and represents a theoretical foundation of physical technology, IMD deals with transformation information, and can be considered a theoretical foundation of Information Computer Technology (ICT). ICT includes but is not limited to applied computer science, computer information systems, computer and data communications, software engineering, and artificial intelligence. In ICT, information flows from different data sources, and interacts to create new information products. The information flows may interact physically or via their virtual connections, initiating an information dynamic process that can be distributed in space. As in physics, a problem is understanding general regularities of the information processes in terms of information law, for the engineering and technological design, control, optimization, and development of computer technology, operations, manipulations, and management of real information objects. Information Systems Analysis and Modeling: An Informational Macrodynamics Approach belongs to an interdisciplinary science that represents the new theoretical and computer-based methodology for system informational description and improvement, including various activities in such interdisciplinary areas as thinking, intelligent processes, management, and other nonphysical subjects with their mutual interactions, informational superimpositions, and the information transferred between interactions. Information Systems Analysis and Modeling: An Informational Macrodynamics Approach can be used as a textbook or secondary text in courses on computer science, engineering, business, management, education, and psychology and as a reference for research and industry.

Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings... Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings (Paperback, 2012 ed.)
Li Xu, Elisa Bertino, Yi Mu
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Number Theoretic Methods in Cryptography - Complexity lower bounds (Paperback, Softcover reprint of the original 1st ed. 1999):... Number Theoretic Methods in Cryptography - Complexity lower bounds (Paperback, Softcover reprint of the original 1st ed. 1999)
Igor Shparlinski
R1,382 Discovery Miles 13 820 Ships in 18 - 22 working days

The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of logp, on the de grees and orders of * polynomials; * algebraic functions; * Boolean functions; * linear recurring sequences; coinciding with values of the discrete logarithm modulo a prime p at suf ficiently many points (the number of points can be as small as pI/He). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the right most bit of the discrete logarithm and defines whether the argument is a quadratic residue. We also obtain non-trivial upper bounds on the de gree, sensitivity and Fourier coefficients of Boolean functions on bits of x deciding whether x is a quadratic residue. These results are used to obtain lower bounds on the parallel arithmetic and Boolean complexity of computing the discrete logarithm. For example, we prove that any unbounded fan-in Boolean circuit. of sublogarithmic depth computing the discrete logarithm modulo p must be of superpolynomial size.

Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November... Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings (Paperback, 2012 ed.)
Andrey Bogdanov, Somitra Sanadhya
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012.

The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.

Progress on Cryptography - 25 Years of Cryptography in China (Paperback, Softcover reprint of the original 1st ed. 2004): Kefei... Progress on Cryptography - 25 Years of Cryptography in China (Paperback, Softcover reprint of the original 1st ed. 2004)
Kefei Chen
R2,646 Discovery Miles 26 460 Ships in 18 - 22 working days

Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.

Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012,... Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings (Paperback, 2012 ed.)
Tat Wing Chim, Tsz Hon Yuen
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Mathematics and Computer Science II - Algorithms, Trees, Combinatorics and Probabilities (Paperback, Softcover reprint of the... Mathematics and Computer Science II - Algorithms, Trees, Combinatorics and Probabilities (Paperback, Softcover reprint of the original 1st ed. 2002)
Brigitte Chauvin, Philippe Flajolet, Daniele Gardy, Abdelkader Mokkadem
R2,725 Discovery Miles 27 250 Ships in 18 - 22 working days

This is the second volume in a series of innovative proceedings entirely devoted to the connections between mathematics and computer science. Here mathematics and computer science are directly confronted and joined to tackle intricate problems in computer science with deep and innovative mathematical approaches.

The book serves as an outstanding tool and a main information source for a large public in applied mathematics, discrete mathematics and computer science, including researchers, teachers, graduate students and engineers. It provides an overview of the current questions in computer science and the related modern and powerful mathematical methods. The range of applications is very wide and reaches beyond computer science.

Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings... Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings (Paperback, 2012 ed.)
Audun Josang, Bengt Carlsson
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.

Information Dynamics - Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2001): Gustavo Deco,... Information Dynamics - Foundations and Applications (Paperback, Softcover reprint of the original 1st ed. 2001)
Gustavo Deco, Bernd Schurmann
R1,409 Discovery Miles 14 090 Ships in 18 - 22 working days

This book offers a new, theoretical approach to information dynamics, i.e., information processing in complex dynamical systems. The presentation establishes a consistent theoretical framework for the problem of discovering knowledge behind empirical, dynamical data and addresses applications in information processing and coding in dynamical systems. This will be an essential reference for those in neural computing, information theory, nonlinear dynamics and complex systems modeling.

E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback,... E-Voting and Identity - 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings (Paperback, 2013 ed.)
James Heather, Steve Schneider, Vanessa Teague
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.

Multisensor Decision And Estimation Fusion (Paperback, Softcover reprint of the original 1st ed. 2003): Yunmin Zhu Multisensor Decision And Estimation Fusion (Paperback, Softcover reprint of the original 1st ed. 2003)
Yunmin Zhu
R4,003 Discovery Miles 40 030 Ships in 18 - 22 working days

YUNMIN ZHU In the past two decades, multi sensor or multi-source information fusion tech niques have attracted more and more attention in practice, where observations are processed in a distributed manner and decisions or estimates are made at the individual processors, and processed data (or compressed observations) are then transmitted to a fusion center where the final global decision or estimate is made. A system with multiple distributed sensors has many advantages over one with a single sensor. These include an increase in the capability, reliability, robustness and survivability of the system. Distributed decision or estimation fusion prob lems for cases with statistically independent observations or observation noises have received significant attention (see Varshney's book Distributed Detec tion and Data Fusion, New York: Springer-Verlag, 1997, Bar-Shalom's book Multitarget-Multisensor Tracking: Advanced Applications, vol. 1-3, Artech House, 1990, 1992,2000). Problems with statistically dependent observations or observation noises are more difficult and have received much less study. In practice, however, one often sees decision or estimation fusion problems with statistically dependent observations or observation noises. For instance, when several sensors are used to detect a random signal in the presence of observation noise, the sensor observations could not be statistically independent when the signal is present. This book provides a more complete treatment of the fundamentals of multi sensor decision and estimation fusion in order to deal with general random ob servations or observation noises that are correlated across the sensors."

Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network... Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings (Paperback, 2012 ed.)
Igor Kotenko, Victor Skormin
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings (Paperback, 2013):... Trusted Systems - 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings (Paperback, 2013)
Roderick Bloem, Peter Lipp
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.

Introduction to Convolutional Codes with Applications (Paperback, Softcover reprint of the original 1st ed. 1994): Ajay Dholakia Introduction to Convolutional Codes with Applications (Paperback, Softcover reprint of the original 1st ed. 1994)
Ajay Dholakia
R4,003 Discovery Miles 40 030 Ships in 18 - 22 working days

Introduction to Convolutional Codes with Applications is an introduction to the basic concepts of convolutional codes, their structure and classification, various error correction and decoding techniques for convolutionally encoded data, and some of the most common applications. The definition and representations, distance properties, and important classes of convolutional codes are also discussed in detail. The book provides the first comprehensive description of table-driven correction and decoding of convolutionally encoded data. Complete examples of Viterbi, sequential, and majority-logic decoding technique are also included, allowing a quick comparison among the different decoding approaches. Introduction to Convolutional Codes with Applications summarizes the research of the last two decades on applications of convolutional codes in hybrid ARQ protocols. A new classification allows a natural way of studying the underlying concepts of hybrid schemes and accommodates all of the new research. A novel application of fast decodable invertible convolutional codes for lost packet recovery in high speed networks is described. This opens the door for using convolutional coding for error recovery in high speed networks. Practicing communications, electronics, and networking engineers who want to get a better grasp of the underlying concepts of convolutional coding and its applications will greatly benefit by the simple and concise style of explanation. An up-to-date bibliography of over 300 papers is included. Also suitable for use as a textbook or a reference text in an advanced course on coding theory with emphasis on convolutional codes.

Digital Communication - Principles and System Modelling (Paperback, 2010 ed.): Apurba Das Digital Communication - Principles and System Modelling (Paperback, 2010 ed.)
Apurba Das
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

"Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems.

The Salient features of the book are:

1. The foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language.

2. The application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally.

3. Elegant exercise section is designed in such a way that, the readers can get the flavor of the subject and get attracted towards the future scopes of the subject.

4. Unparallel tabular, flow chart based and pictorial methodology description will be there for sustained impression of the proposed design/algorithms in mind.

From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994): P.... From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994)
P. Grassberger, J.P. Nadal
R5,168 Discovery Miles 51 680 Ships in 18 - 22 working days

Physicists, when modelling physical systems with a large number of degrees of freedom, and statisticians, when performing data analysis, have developed their own concepts and methods for making the `best' inference. But are these methods equivalent, or not? What is the state of the art in making inferences? The physicists want answers. More: neural computation demands a clearer understanding of how neural systems make inferences; the theory of chaotic nonlinear systems as applied to time series analysis could profit from the experience already booked by the statisticians; and finally, there is a long-standing conjecture that some of the puzzles of quantum mechanics are due to our incomplete understanding of how we make inferences. Matter enough to stimulate the writing of such a book as the present one. But other considerations also arise, such as the maximum entropy method and Bayesian inference, information theory and the minimum description length. Finally, it is pointed out that an understanding of human inference may require input from psychologists. This lively debate, which is of acute current interest, is well summarized in the present work.

Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers... Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers (Paperback, 2013 ed.)
Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao
R2,502 Discovery Miles 25 020 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Practical Cryptography
Jamie White Hardcover R3,284 R2,971 Discovery Miles 29 710
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Improving Image Quality in Visual…
Bin Yan, Yong Xiang, … Hardcover R2,653 Discovery Miles 26 530
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Permutation Polynomial Interleavers for…
Lucian Trifina, Daniela Tarniceriu Hardcover R4,046 Discovery Miles 40 460
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Computational Information Geometry - For…
Frank Nielsen, Frank Critchley, … Hardcover R5,036 Discovery Miles 50 360
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980

 

Partners