0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (85)
  • R500+ (1,904)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Multi-Carrier Digital Communications - Theory and Applications of OFDM (Paperback, Softcover reprint of the original 2nd ed.... Multi-Carrier Digital Communications - Theory and Applications of OFDM (Paperback, Softcover reprint of the original 2nd ed. 2004)
Ahmad R. S. Bahai, Burton R. Saltzberg, Mustafa Ergen
R2,917 Discovery Miles 29 170 Ships in 18 - 22 working days

ulti-carrier modulation' Orthogonal Frequency Division Multi- Mplexing (OFDM) particularly' has been successfully applied to a wide variety of digital communications applications over the past several years. Although OFDM has been chosen as the physical layer standard for a diversity of important systems' the theory' algorithms' and implementation techniques remain subjects of current interest. This is clear from the high volume of papers appearing in technical journals and conferences. Multi-carrier modulation continues to evolve rapidly. It is hoped that this book will remain a valuable summary of the technology' p- viding an understanding of new advances as well as the present core technology. The Intended Audience This book is intended to be a concise summary of the present state of the art of the theory and practice of OFDM technology. The authors believe that the time is ripe for such a treatment. Particularly based on one of the author's long experience in development of wireless systems (AB), and the other's in wireline systems (BS)' we have - tempted to present a unified presentation of OFDM performance and xviii implementation over a wide variety of channels. It is hoped that this will prove valuable both to developers of such systems and to researchers and graduate students involved in analysis of digital communications.

Agent-Based Models of Social Life - Fundamentals (Paperback): Michael Laver Agent-Based Models of Social Life - Fundamentals (Paperback)
Michael Laver
R589 Discovery Miles 5 890 Ships in 10 - 15 working days

Social interactions are rich, complex, and dynamic. One way to understand these is to model interactions that fascinate us. Some of the more realistic and powerful models are computer simulations. Simple, elegant and powerful, tools are available in user-friendly free software to help you design, build and run your own models of social interactions that intrigue you, and do this on the most basic laptop computer. Focusing on a well-known model of housing segregation, this Element is about how to unleash that power, setting out the fundamentals of what is now known as 'agent based modeling'.

Agent-Based Models of Polarization and Ethnocentrism (Paperback): Michael Laver Agent-Based Models of Polarization and Ethnocentrism (Paperback)
Michael Laver
R586 Discovery Miles 5 860 Ships in 10 - 15 working days

Building on the Cambridge Element Agent Based Models of Social Life: Fundamentals (Cambridge, 2020), we move on to the next level. We do this by building agent based models of polarization and ethnocentrism. In the process, we develop: stochastic models, which add a crucial element of uncertainty to human interaction; models of human interactions structured by social networks; and 'evolutionary' models in which agents using more effective decision rules are more likely to survive and prosper than others. The aim is to leave readers with an effective toolkit for building, running and analyzing agent based modes of social interaction.

Open Problems in Communication and Computation (Paperback, Softcover reprint of the original 1st ed. 1987): Thomas M. Cover, B.... Open Problems in Communication and Computation (Paperback, Softcover reprint of the original 1st ed. 1987)
Thomas M. Cover, B. Gopinath
R2,640 Discovery Miles 26 400 Ships in 18 - 22 working days

Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation conducted in the summers of 1984 and 1985 in Morristown, New Jersey, and the summer of 1986 in Palo Alto. California. The structure of this workshop was unique: no recent results. no surveys. Instead. we asked for outstanding open prob lems in the field. There are many famous open problems, including the question P = NP?, the simplex conjecture in communication theory, the capacity region of the broadcast channel. and the two.helper problem in information theory. Beyond these well-defined problems are certain grand research goals. What is the general theory of information flow in stochastic networks? What is a comprehensive theory of computational complexity? What about a unification of algorithmic complexity and computational complex ity? Is there a notion of energy-free computation? And if so, where do information theory, communication theory, computer science, and physics meet at the atomic level? Is there a duality between computation and communication? Finally. what is the ultimate impact of algorithmic com plexity on probability theory? And what is its relationship to information theory? The idea was to present problems on the first day. try to solve them on the second day, and present the solutions on the third day. In actual fact, only one problem was solved during the meeting -- El Gamal's prob. lem on noisy communication over a common line."

From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994): P.... From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994)
P. Grassberger, J.P. Nadal
R5,168 Discovery Miles 51 680 Ships in 18 - 22 working days

Physicists, when modelling physical systems with a large number of degrees of freedom, and statisticians, when performing data analysis, have developed their own concepts and methods for making the `best' inference. But are these methods equivalent, or not? What is the state of the art in making inferences? The physicists want answers. More: neural computation demands a clearer understanding of how neural systems make inferences; the theory of chaotic nonlinear systems as applied to time series analysis could profit from the experience already booked by the statisticians; and finally, there is a long-standing conjecture that some of the puzzles of quantum mechanics are due to our incomplete understanding of how we make inferences. Matter enough to stimulate the writing of such a book as the present one. But other considerations also arise, such as the maximum entropy method and Bayesian inference, information theory and the minimum description length. Finally, it is pointed out that an understanding of human inference may require input from psychologists. This lively debate, which is of acute current interest, is well summarized in the present work.

Oversampled Delta-Sigma Modulators - Analysis, Applications and Novel Topologies (Paperback, Softcover reprint of the original... Oversampled Delta-Sigma Modulators - Analysis, Applications and Novel Topologies (Paperback, Softcover reprint of the original 1st ed. 2003)
Mucahit Kozak, Izzet Kale
R3,317 Discovery Miles 33 170 Ships in 18 - 22 working days

Oversampled Delta-Sigma Modulators: Analysis, Applications, and Novel Topologies presents theorems and their mathematical proofs for the exact analysis of the quantization noise in delta-sigma modulators. Extensive mathematical equations are included throughout the book to analyze both single-stage and multi-stage architectures. It has been proved that appropriately set initial conditions generate tone free output, provided that the modulator order is at least three. These results are applied to the design of a Fractional-N PLL frequency synthesizer to produce spurious free RF waveforms. Furthermore, the book also presents time-interleaved topologies to increase the conversion bandwidth of delta-sigma modulators. The topologies have been generalized for any interleaving number and modulator order.
The book is full of design and analysis techniques and contains sufficient detail that enables readers with little background in the subject to easily follow the material in it.

German Yearbook on Business History 1987 (Paperback, Softcover reprint of the original 1st ed. 1988): Bernd Rudolph German Yearbook on Business History 1987 (Paperback, Softcover reprint of the original 1st ed. 1988)
Bernd Rudolph; Edited by (editors-in-chief) Hans Pohl; Edited by (associates) Beate Brunninghaus, Monika Pohle, Manfred Pohl
R2,647 Discovery Miles 26 470 Ships in 18 - 22 working days

Contents Practical Corner: The Evolution of the Exchange Rate from "Sacrosanct" Parity to Flexible Monetary Policy Instrument.- Historical Studies: The Society for Business History: A Decade of Work. The Bankers Simon and Abraham Oppenheim 1812-1880. The Private Background to Their Professional Activity, their Role in Politics and Ennoblement. Russian Business in the Bruning Era.- Reviews of Literature: A Review of the New Literature on Business History.- A Review of the New Literature on Banking History. Reports on Conferences. The "German Yearbook on Business " "History" is a source of insights into the entrepreneurial economy of the 19th and 20th centuries. It contains translations of topical journal articles and informative reviews of results and trends in business history research. As in the previous Yearbooks, the authors of this volume are experts in economic theory and practice whose contributions cover a wide spectrum."

Multiple Access Communications - 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings... Multiple Access Communications - 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings (Paperback, 2012 ed.)
Boris Bellalta, Alexey Vinel, Magnus Jonsson, Jaume Barcelo, Roman Maslennikov, …
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications, MACOM 2012, held in Maynooth, Ireland, in November 2012. The 13 full papers and 5 demo and poster papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on network coding, handling interference and localization techniques at PHY/MAC layers, wireless access networks, and medium access control.

Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings... Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings (Paperback, 2012 ed.)
Venkat Venkatakrishnan, Diganta Goswami
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Data Privacy and Security (Paperback, Softcover reprint of the original 1st ed. 2003): David Salomon Data Privacy and Security (Paperback, Softcover reprint of the original 1st ed. 2003)
David Salomon
R2,486 Discovery Miles 24 860 Ships in 18 - 22 working days

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.

Cooperative Networking in a Heterogeneous Wireless Medium (Paperback, 2013 ed.): Muhammad Ismail, Weihua Zhuang Cooperative Networking in a Heterogeneous Wireless Medium (Paperback, 2013 ed.)
Muhammad Ismail, Weihua Zhuang
R1,356 Discovery Miles 13 560 Ships in 18 - 22 working days

This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.

OFDM - Concepts for Future Communication Systems (Paperback, 2011 ed.): Hermann Rohling OFDM - Concepts for Future Communication Systems (Paperback, 2011 ed.)
Hermann Rohling
R2,646 Discovery Miles 26 460 Ships in 18 - 22 working days

(Preliminary): The Orthogonal Frequency Division Multiplexing (OFDM) digital transmission technique has several advantages in broadcast and mobile communications applications. The main objective of this book is to give a good insight into these efforts, and provide the reader with a comprehensive overview of the scientific progress which was achieved in the last decade. Besides topics of the physical layer, such as coding, modulation and non-linearities, a special emphasis is put on system aspects and concepts, in particular regarding cellular networks and using multiple antenna techniques. The work extensively addresses challenges of link adaptation, adaptive resource allocation and interference mitigation in such systems. Moreover, the domain of cross-layer design, i.e. the combination of physical layer aspects and issues of higher layers, are considered in detail. These results will facilitate and stimulate further innovation and development in the design of modern communication systems, based on the powerful OFDM transmission technique.

Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12,... Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Aikaterini Mitrokotsa, Serge Vaudenay
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland... Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings (Paperback, Softcover reprint of the original 1st ed. 2003)
Jerzy Soldek, Leszek Drobiazgiewicz
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings... Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings (Paperback, 2013 ed.)
Amit Sahai
R1,510 Discovery Miles 15 100 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.

Recursive Source Coding - A Theory for the Practice of Waveform Coding (Paperback, Softcover reprint of the original 1st ed.... Recursive Source Coding - A Theory for the Practice of Waveform Coding (Paperback, Softcover reprint of the original 1st ed. 1986)
G. Gabor, Z. Gyoerfi
R2,604 Discovery Miles 26 040 Ships in 18 - 22 working days

The spreading of digital technology has resulted in a dramatic increase in the demand for data compression (DC) methods. At the same time, the appearance of highly integrated elements has made more and more com plicated algorithms feasible. It is in the fields of speech and image trans mission and the transmission and storage of biological signals (e.g., ECG, Body Surface Mapping) where the demand for DC algorithms is greatest. There is, however, a substantial gap between the theory and the practice of DC: an essentially nonconstructive information theoretical attitude and the attractive mathematics of source coding theory are contrasted with a mixture of ad hoc engineering methods. The classical Shannonian infor mation theory is fundamentally different from the world of practical pro cedures. Theory places great emphasis on block-coding while practice is overwhelmingly dominated by theoretically intractable, mostly differential predictive coding (DPC), algorithms. A dialogue between theory and practice has been hindered by two pro foundly different conceptions of a data source: practice, mostly because of speech compression considerations, favors non stationary models, while the theory deals mostly with stationary ones."

Principles of Secure Network Systems Design (Paperback, Softcover reprint of the original 1st ed. 2002): H. Lawson Principles of Secure Network Systems Design (Paperback, Softcover reprint of the original 1st ed. 2002)
H. Lawson; Sumit Ghosh
R1,393 Discovery Miles 13 930 Ships in 18 - 22 working days

A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.

Coding Theorems of Information Theory (Paperback, 3rd ed. 1978. Softcover reprint of the original 3rd ed. 1978): J. Wolfowitz Coding Theorems of Information Theory (Paperback, 3rd ed. 1978. Softcover reprint of the original 3rd ed. 1978)
J. Wolfowitz
R2,633 Discovery Miles 26 330 Ships in 18 - 22 working days

The objective of the present edition of this monograph is the same as that of earlier editions, namely, to provide readers with some mathemati cal maturity a rigorous and modern introduction to the ideas and principal theorems of probabilistic information theory. It is not necessary that readers have any prior knowledge whatever of information theory. The rapid development of the subject has had the consequence that any one book can now cover only a fraction of the literature. The latter is often written by engineers for engineers, and the mathematical reader may have some difficulty with it. The mathematician who understands the content and methods of this monograph should be able to read the literature and start on research of his own in a subject of mathematical beauty and interest. The present edition differs from the second in the following: Chapter 6 has been completely replaced by one on arbitrarily varying channels. Chapter 7 has been greatly enlarged. Chapter 8 on semi-continuous channels has been drastically shortened, and Chapter 11 on sequential decoding completely removed. The new Chapters 11-15 consist entirely of material which has been developed only in the last few years. The topics discussed are rate distortion, source coding, multiple access channels, and degraded broadcast channels. Even the specialist will find a new approach in the treatment of these subjects. Many of the proofs are new, more perspicuous, and considerably shorter than the original ones."

Security for Wireless Implantable Medical Devices (Paperback, 2013 ed.): Xiali Hei, Xiaojiang Du Security for Wireless Implantable Medical Devices (Paperback, 2013 ed.)
Xiali Hei, Xiaojiang Du
R1,518 Discovery Miles 15 180 Ships in 18 - 22 working days

In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing security schemes, modeling, security analysis, and performance evaluation, thus keeping pace with quickly-evolving wireless security research.

Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993): Eli... Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993)
Eli Biham, Adi Shamir
R2,855 Discovery Miles 28 550 Ships in 18 - 22 working days

DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the fields leading researchers, and describes state-of-the-art research in a clear and completely contained manner.

Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November... Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings (Paperback, 2012)
Goichiro Hanaoka, Toshihiro Yamauchi
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.

Dynamics and Randomness (Paperback, Softcover reprint of the original 1st ed. 2002): Alejandro Maass, Servet Martinez, Jaime... Dynamics and Randomness (Paperback, Softcover reprint of the original 1st ed. 2002)
Alejandro Maass, Servet Martinez, Jaime San Martin
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

This book contains the lectures given at the Conference on Dynamics and Randomness held at the Centro de Modelamiento Matematico of the Universidad de Chile from December 11th to 15th, 2000. This meeting brought together mathematicians, theoretical physicists and theoretical computer scientists, and graduate students interested in fields re lated to probability theory, ergodic theory, symbolic and topological dynam ics. We would like to express our gratitude to all the participants of the con ference and to the people who contributed to its organization. In particular, to Pierre Collet, Bernard Host and Mike Keane for their scientific advise. VVe want to thank especially the authors of each chapter for their well prepared manuscripts and the stimulating conferences they gave at Santiago. We are also indebted to our sponsors and supporting institutions, whose interest and help was essential to organize this meeting: ECOS-CONICYT, FONDAP Program in Applied Mathematics, French Cooperation, Fundacion Andes, Presidential Fellowship and Universidad de Chile. We are grateful to Ms. Gladys Cavallone for their excellent work during the preparation of the meeting as well as for the considerable task of unifying the typography of the different chapters of this book.

Disequilibrium and Self-Organisation (Paperback, Softcover reprint of the original 1st ed. 1986): C. W. Kilmister Disequilibrium and Self-Organisation (Paperback, Softcover reprint of the original 1st ed. 1986)
C. W. Kilmister
R2,665 Discovery Miles 26 650 Ships in 18 - 22 working days

Approach your problems from the right end It isn't that they can't see the solution. It is and begin with the answers. Then one day, that they can't see the problem. perhaps you will find the final question. G. K. Chesterton. The Scandal of Father 'The Hermit Clad in Crane Feathers' in R. Brown 'The point of a Pin'. van Gulik's The Chif1ese Maze Murders. Growing specialization and diversification have brought a host of monographs and textbooks on increasingly specialized topics. However, the "tree" of knowledge of mathematics and related fields does not grow only by putting forth new branches. It also happens, quite often in fact, that branches which were thought to be completely disparate are suddenly seen to be related. Further, the kind and level of sophistication of mathematics applied in various sciences has changed drastically in recent years: measure theory is used (non trivially) in regional and theoretical economics; algebraic geometry interacts with physics; the Minkowsky lemma, coding theory and the structure of water meet one another in packing and covering theory; quantum fields, crystal defects and mathematical programming profit from homotopy theory; Lie algebras are relevant to filtering; and prediction and electrical engineering can use Stein spaces. And in addition to this there are such new emerging subdisciplines as "experimental mathematics", "CFD", "completely integrable systems", "chaos, synergetics and large-scale order", which are almost impossible to fit into the existing classification schemes. They draw upon widely different sections of mathematics.

Relative Information - Theories and Applications (Paperback, Softcover reprint of the original 1st ed. 1990): Guy Jumarie Relative Information - Theories and Applications (Paperback, Softcover reprint of the original 1st ed. 1990)
Guy Jumarie; Foreword by G. J. Klir, H. Haken
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usually referred to as Shannon entropy. Since the publication of Shannon's seminal paper in 1948, the theory has grown extremely rapidly and has been applied with varied success in almost all areas of human endeavor. At this time, the Shannon information theory is a well established and developed body of knowledge. Among its most significant recent contributions have been the use of the complementary principles of minimum and maximum entropy in dealing with a variety of fundamental systems problems such as predic tive systems modelling, pattern recognition, image reconstruction, and the like. Since its inception in 1948, the Shannon theory has been viewed as a restricted information theory. It has often been argued that the theory is capable of dealing only with syntactic aspects of information, but not with its semantic and pragmatic aspects. This restriction was considered a v~rtue by some experts and a vice by others. More recently, however, various arguments have been made that the theory can be appropriately modified to account for semantic aspects of in formation as well. Some of the most convincing arguments in this regard are in cluded in Fred Dretske's Know/edge & Flow of Information (The M.LT. Press, Cambridge, Mass., 1981) and in this book by Guy lumarie.

The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno,... The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Paperback, 2009)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,536 Discovery Miles 45 360
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
System-on-Chip Architectures and…
Maire McLoone, John V. McCanny Hardcover R2,745 Discovery Miles 27 450
Improving Image Quality in Visual…
Bin Yan, Yong Xiang, … Hardcover R2,653 Discovery Miles 26 530
Cooperative Communications and…
Y -W Peter Hong, Wan-Jen Huang, … Hardcover R4,237 Discovery Miles 42 370

 

Partners