0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,943)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Dynamics of Information Systems - Theory and Applications (Paperback, 2010 ed.): Michael Hirsch, Panos M. Pardalos, Robert... Dynamics of Information Systems - Theory and Applications (Paperback, 2010 ed.)
Michael Hirsch, Panos M. Pardalos, Robert Murphey
R4,130 Discovery Miles 41 300 Ships in 10 - 15 working days

Our understanding of information and information dynamics has outgrown classical information theory. The theory does not account for the value or influence of information within the context of a system or network and does not explain how these properties might influence how information flows though and interacts with a system. The invited chapters in this collection present new theories, methods, and applications that address some of these limitations.

Dynamics of Information Systems presents state-of-the-art research explaining the importance of information in the evolution of a distributed or networked system. This book presents techniques for measuring the value or significance of information within the context of a system. Each chapter reveals a unique topic or perspective from experts in this exciting area of research.

These newly developed techniques have numerous applications including: the detection of terrorist networks, the design of highly functioning businesses and computer systems, modeling the distributed sensory and control physiology of animals, quantum entanglement and genome modeling, multi-robotic systems design, as well as industrial and manufacturing safety.

Group Cell Architecture for Cooperative Communications (Paperback, 2012 ed.): Xiaofeng Tao, Qimei Cui, Xiaodong Xu, Ping Zhang Group Cell Architecture for Cooperative Communications (Paperback, 2012 ed.)
Xiaofeng Tao, Qimei Cui, Xiaodong Xu, Ping Zhang
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the authors proposed a cooperative communication architecture-Group Cell architecture, which was initially brought forward in 2001. Years later, Coordinated Multiple-Point Transmission and Reception (CoMP) for LTE-Advanced was put forward in April 2008, as a tool to improve the coverage of cells having high data rates, the cell-edge throughput and/or to increase system throughput. This book mainly focuses on the Group Cell architecture with multi-cell generalized coordination, Contrast Analysis between Group Cell architecture and CoMP, Capacity Analysis, Slide Handover Strategy, Power Allocation schemes of Group Cell architecture to mitigate the inter-cell interference and maximize system capacity and the trial network implementation and performance evaluations of Group Cell architecture.

Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012.... Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings (Paperback, 2012 ed.)
Willy Susilo, Yi Mu, Jennifer Seberry
R1,573 Discovery Miles 15 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Information Theory, Combinatorics, and Search Theory - In Memory of Rudolf Ahlswede (Paperback, 2013 ed.): Harout Aydinian,... Information Theory, Combinatorics, and Search Theory - In Memory of Rudolf Ahlswede (Paperback, 2013 ed.)
Harout Aydinian, Ferdinando Cicalese, Christian Deppe
R1,674 Discovery Miles 16 740 Ships in 10 - 15 working days

This volume is dedicated to the memory of Rudolf Ahlswede, who passed away in December 2010. The Festschrift contains 36 thoroughly refereed research papers from a memorial symposium, which took place in July 2011.

Thefour macro-topics of this workshop: theory of games and strategic planning; combinatorial group testing and database mining; computational biology and string matching; information coding and spreading and patrolling on networks; provide a comprehensive picture of the vision Rudolf Ahlswede put forward of a broad and systematic theory of search.

Sensor Networks - Where Theory Meets Practice (Paperback, 2009 ed.): Gianluigi Ferrari Sensor Networks - Where Theory Meets Practice (Paperback, 2009 ed.)
Gianluigi Ferrari
R4,382 Discovery Miles 43 820 Ships in 10 - 15 working days

The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.

Public Key Cryptography -- PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography,... Public Key Cryptography -- PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings (Paperback, 2012)
Marc Fischlin, Johannes Buchmann, Mark Manulis
R1,652 Discovery Miles 16 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings... Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings (Paperback, 2012 ed.)
Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, …
R1,538 Discovery Miles 15 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on Trust and Trustworthy Computing, TRUST 2012, held in Vienna, Austria, in June 2012. The 19 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in two tracks: a technical track with topics ranging from trusted computing and mobile devices to applied cryptography and physically unclonable functions, and a socio-economic track focusing on the emerging field of usable security.

Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012, Proceedings (Paperback, 2012 ed.)
David Pointcheval, Thomas Johansson
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.

Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on... Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (Paperback, Softcover reprint of the original 1st ed. 2001)
Ralf Steinmetz, Jana Dittmann, Martin Steinebach
R5,621 Discovery Miles 56 210 Ships in 10 - 15 working days

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.

Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.): Ali A. Ghorbani, Wei Lu, Mahbod... Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.)
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
R4,102 Discovery Miles 41 020 Ships in 10 - 15 working days

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Advances in Cryptology - Proceedings of Crypto 83 (Paperback, Softcover reprint of the original 1st ed. 1984): David Chaum Advances in Cryptology - Proceedings of Crypto 83 (Paperback, Softcover reprint of the original 1st ed. 1984)
David Chaum
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO 83 was once again truly the cryptologic event of the year. Many of the most active participants continue to attend each year, and attendance continues to grow at a healthy rate. The informal and collegial atmosphere and the beach side setting which contribute to the popularity of the event were again supported by flawless weather. The absence of parallel sessions seemed to provide a welcome opportunity to keep abreast of developments in the various areas of activity. Each session of the meeting organized by the program committee is repre sented by a section in the present volume. The papers were accepted by the program committee based on abstracts, and appear here without having been otherwise refereed. The last section contains papers presented at the informal rump session. A keyword index and an author index to the papers is provided at the end of the volume."

The LLL Algorithm - Survey and Applications (Paperback, 2010 ed.): Phong Q. Nguyen, Brigitte Vallee The LLL Algorithm - Survey and Applications (Paperback, 2010 ed.)
Phong Q. Nguyen, Brigitte Vallee
R6,378 Discovery Miles 63 780 Ships in 10 - 15 working days

Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ' lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediately recognized as one of the most important algorithmic achievements of the twentieth century, because of its broad applicability and apparent simplicity. Its popularity has kept growing since, as testi ed by the hundreds of citations of the original article, and the ever more frequent use of LLL as a synonym to lattice reduction. As an unfortunate consequence of the pervasiveness of the LLL algorithm, researchers studying and applying it belong to diverse scienti c communities, and seldom meet. While discussing that particular issue with Damien Stehle ' at the 7th Algorithmic Number Theory Symposium (ANTS VII) held in Berlin in July 2006, John Cremona accuratelyremarkedthat 2007would be the 25th anniversaryof LLL and this deserveda meetingto celebrate that event. The year 2007was also involved in another arithmetical story. In 2003 and 2005, Ali Akhavi, Fabien Laguillaumie, and Brigitte Vallee ' with other colleagues organized two workshops on cryptology and algorithms with a strong emphasis on lattice reduction: CAEN '03 and CAEN '05, CAEN denoting both the location and the content (Cryptologie et Algori- miqueEn Normandie). Veryquicklyafterthe ANTSconference,AliAkhavi,Fabien Laguillaumie, and Brigitte Vallee ' were thus readily contacted and reacted very enthusiastically about organizing the LLL birthday conference. The organization committee was formed.

iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April... iNetSec 2009 - Open Research Problems in Network Security - IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Jan Camenisch, Dogan Kesdogan
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand

Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012.... Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings (Paperback, 2012)
Ronald Cramer
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

Innovations in Digital Watermarking Techniques (Paperback, 2009 ed.): Feng-Hsing Wang Innovations in Digital Watermarking Techniques (Paperback, 2009 ed.)
Feng-Hsing Wang
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors, researchers and application engineers who are interested in the area of information security.

Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland,... Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers (Paperback, 2012)
Tuomas Aura, Kimmo Jarvinen, Kaisa Nyberg
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.

Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected... Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers (Paperback, 2012)
Ali Miri, Serge Vaudenay
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993): V.V.... Image Representation and Processing - A Recursive Approach (Paperback, Softcover reprint of the original 1st ed. 1993)
V.V. Alexandrov, Gorsky.
R1,499 Discovery Miles 14 990 Ships in 10 - 15 working days

Recently, much attention has been paid to image processing with multiresolution and hierarchical structures such as pyramids and trees. This volume deals with recursive pyramids, which combine the advantages of available multiresolution structures and which are convenient both for global and local image processing. Recursive pyramids are based on regular hierarchical (recursive) structures containing data on image fragments of different sizes. Such an image representation technique enables the effective manipulation of pictorial information as well as the development of special hardware or data structures. The major aspects of this book are two original mathematical models of greyscale and binary images represented by recursive structures. Image compression, transmission and processing are discussed using these models. A number of applications are presented, including optical character recognition, expert systems and special computer architecture for pictorial data processing. The majority of results are presented as algorithms applicable to discrete information fields of arbitrary dimensions (e.g. 2-D or 3-D images). The book is divided into six chapters: Chapter 1 provides a brief introduction. Chapter 2 then deals with recursive structures and their properties. Chapter 3 introduces pyramidal image models. Image coding and the progressive transmission of images with gradual refinement are discussed in Chapter 4. Chapters 5 and 6 are devoted to image processing with pyramidal-recursive structures and applications. The volume concludes with a comprehensive bibliography. For applied mathematicians and computer scientists whose work involves computer vision, information theory and other aspects of image representation techniques.

Multi-Carrier Digital Communications - Theory and Applications of OFDM (Paperback, Softcover reprint of the original 2nd ed.... Multi-Carrier Digital Communications - Theory and Applications of OFDM (Paperback, Softcover reprint of the original 2nd ed. 2004)
Ahmad R. S. Bahai, Burton R. Saltzberg, Mustafa Ergen
R3,160 Discovery Miles 31 600 Ships in 10 - 15 working days

ulti-carrier modulation' Orthogonal Frequency Division Multi- Mplexing (OFDM) particularly' has been successfully applied to a wide variety of digital communications applications over the past several years. Although OFDM has been chosen as the physical layer standard for a diversity of important systems' the theory' algorithms' and implementation techniques remain subjects of current interest. This is clear from the high volume of papers appearing in technical journals and conferences. Multi-carrier modulation continues to evolve rapidly. It is hoped that this book will remain a valuable summary of the technology' p- viding an understanding of new advances as well as the present core technology. The Intended Audience This book is intended to be a concise summary of the present state of the art of the theory and practice of OFDM technology. The authors believe that the time is ripe for such a treatment. Particularly based on one of the author's long experience in development of wireless systems (AB), and the other's in wireline systems (BS)' we have - tempted to present a unified presentation of OFDM performance and xviii implementation over a wide variety of channels. It is hoped that this will prove valuable both to developers of such systems and to researchers and graduate students involved in analysis of digital communications.

Open Problems in Communication and Computation (Paperback, Softcover reprint of the original 1st ed. 1987): Thomas M. Cover, B.... Open Problems in Communication and Computation (Paperback, Softcover reprint of the original 1st ed. 1987)
Thomas M. Cover, B. Gopinath
R2,859 Discovery Miles 28 590 Ships in 10 - 15 working days

Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation conducted in the summers of 1984 and 1985 in Morristown, New Jersey, and the summer of 1986 in Palo Alto. California. The structure of this workshop was unique: no recent results. no surveys. Instead. we asked for outstanding open prob lems in the field. There are many famous open problems, including the question P = NP?, the simplex conjecture in communication theory, the capacity region of the broadcast channel. and the two.helper problem in information theory. Beyond these well-defined problems are certain grand research goals. What is the general theory of information flow in stochastic networks? What is a comprehensive theory of computational complexity? What about a unification of algorithmic complexity and computational complex ity? Is there a notion of energy-free computation? And if so, where do information theory, communication theory, computer science, and physics meet at the atomic level? Is there a duality between computation and communication? Finally. what is the ultimate impact of algorithmic com plexity on probability theory? And what is its relationship to information theory? The idea was to present problems on the first day. try to solve them on the second day, and present the solutions on the third day. In actual fact, only one problem was solved during the meeting -- El Gamal's prob. lem on noisy communication over a common line."

From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994): P.... From Statistical Physics to Statistical Inference and Back (Paperback, Softcover reprint of the original 1st ed. 1994)
P. Grassberger, J.P. Nadal
R5,604 Discovery Miles 56 040 Ships in 10 - 15 working days

Physicists, when modelling physical systems with a large number of degrees of freedom, and statisticians, when performing data analysis, have developed their own concepts and methods for making the `best' inference. But are these methods equivalent, or not? What is the state of the art in making inferences? The physicists want answers. More: neural computation demands a clearer understanding of how neural systems make inferences; the theory of chaotic nonlinear systems as applied to time series analysis could profit from the experience already booked by the statisticians; and finally, there is a long-standing conjecture that some of the puzzles of quantum mechanics are due to our incomplete understanding of how we make inferences. Matter enough to stimulate the writing of such a book as the present one. But other considerations also arise, such as the maximum entropy method and Bayesian inference, information theory and the minimum description length. Finally, it is pointed out that an understanding of human inference may require input from psychologists. This lively debate, which is of acute current interest, is well summarized in the present work.

Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012):... Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012)
Chris J. Mitchell, Allan Tomlinson
R1,939 Discovery Miles 19 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.

Oversampled Delta-Sigma Modulators - Analysis, Applications and Novel Topologies (Paperback, Softcover reprint of the original... Oversampled Delta-Sigma Modulators - Analysis, Applications and Novel Topologies (Paperback, Softcover reprint of the original 1st ed. 2003)
Mucahit Kozak, Izzet Kale
R3,595 Discovery Miles 35 950 Ships in 10 - 15 working days

Oversampled Delta-Sigma Modulators: Analysis, Applications, and Novel Topologies presents theorems and their mathematical proofs for the exact analysis of the quantization noise in delta-sigma modulators. Extensive mathematical equations are included throughout the book to analyze both single-stage and multi-stage architectures. It has been proved that appropriately set initial conditions generate tone free output, provided that the modulator order is at least three. These results are applied to the design of a Fractional-N PLL frequency synthesizer to produce spurious free RF waveforms. Furthermore, the book also presents time-interleaved topologies to increase the conversion bandwidth of delta-sigma modulators. The topologies have been generalized for any interleaving number and modulator order.
The book is full of design and analysis techniques and contains sufficient detail that enables readers with little background in the subject to easily follow the material in it.

German Yearbook on Business History 1987 (Paperback, Softcover reprint of the original 1st ed. 1988): Bernd Rudolph German Yearbook on Business History 1987 (Paperback, Softcover reprint of the original 1st ed. 1988)
Bernd Rudolph; Edited by (editors-in-chief) Hans Pohl; Edited by (associates) Beate Brunninghaus, Monika Pohle, Manfred Pohl
R2,866 Discovery Miles 28 660 Ships in 10 - 15 working days

Contents Practical Corner: The Evolution of the Exchange Rate from "Sacrosanct" Parity to Flexible Monetary Policy Instrument.- Historical Studies: The Society for Business History: A Decade of Work. The Bankers Simon and Abraham Oppenheim 1812-1880. The Private Background to Their Professional Activity, their Role in Politics and Ennoblement. Russian Business in the Bruning Era.- Reviews of Literature: A Review of the New Literature on Business History.- A Review of the New Literature on Banking History. Reports on Conferences. The "German Yearbook on Business " "History" is a source of insights into the entrepreneurial economy of the 19th and 20th centuries. It contains translations of topical journal articles and informative reviews of results and trends in business history research. As in the previous Yearbooks, the authors of this volume are experts in economic theory and practice whose contributions cover a wide spectrum."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Proceedings of the 4th International…
Yong Qin, Limin Jia, … Hardcover R5,748 Discovery Miles 57 480
Advancing Computing, Communication…
Qi Luo Hardcover R8,326 Discovery Miles 83 260
A Generalized Framework of Linear…
Liansheng Tan Paperback R2,474 R2,339 Discovery Miles 23 390
Distributed Artificial Intelligence - A…
Satya Prakash Yadav, Dharmendra Prasad Mahato, … Hardcover R4,945 Discovery Miles 49 450
Human-Machine Interface Technology…
Ravichander Janapati, Usha Desai, … Hardcover R5,220 Discovery Miles 52 200
Recent Advances in Technology Acceptance…
Mostafa Al-Emran, Khaled Shaalan Hardcover R5,645 Discovery Miles 56 450
Social Media Analytics for User Behavior…
Arun Reddy Nelakurthi, Jingrui He Paperback R1,566 Discovery Miles 15 660
Assisted Eco-Driving - A Practical Guide…
Craig K. Allison, James M Fleming, … Hardcover R5,224 Discovery Miles 52 240
Machine Learning and Artificial…
Tawseef Ayoub Shaikh, Saqib Hakak, … Hardcover R4,833 Discovery Miles 48 330
Microbiorobotics - Biologically Inspired…
Minjun Kim, Agung Julius, … Hardcover R3,415 Discovery Miles 34 150

 

Partners