0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (85)
  • R500+ (1,909)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II... NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II (Paperback, Edition.)
Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont, Caterina Scoglio
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in May 2011. The 64 revised full papers presented were carefully reviewed and selected from a total of 294 submissions. The papers feature innovative research in the areas of applications and services, next generation Internet, wireless and sensor networks, and network science. The second volume includes 28 papers organized in topical sections on peer-to-peer, pricing, resource allocation, resource allocation radio, resource allocation wireless, social networks, and TCP.

Privacy-Preserving Data Mining - Models and Algorithms (Paperback, Softcover reprint of hardcover 1st ed. 2008): Charu C.... Privacy-Preserving Data Mining - Models and Algorithms (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Charu C. Aggarwal, Philip S. Yu
R5,639 Discovery Miles 56 390 Ships in 18 - 22 working days

Advances in hardware technology have increased the capability to store and record personal data. This has caused concerns that personal data may be abused. This book proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy. The book is designed for researchers, professors, and advanced-level students in computer science, but is also suitable for practitioners in industry.

Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008): Roberto Di Pietro, Luigi V. Mancini Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Roberto Di Pietro, Luigi V. Mancini
R4,215 Discovery Miles 42 150 Ships in 18 - 22 working days

To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.

Minds Alive - Libraries and Archives Now (Hardcover): Patricia A Demers, Toni Samek Minds Alive - Libraries and Archives Now (Hardcover)
Patricia A Demers, Toni Samek
R2,058 Discovery Miles 20 580 Ships in 10 - 15 working days

Minds Alive explores the enduring role and intrinsic value of libraries, archives, and public institutions in the digital age. Featuring international contributors, this volume delves into libraries and archives as institutions and institutional partners, the professional responsibilities of librarians and archivists, and the ways in which librarians and archivists continue to respond to the networked age, digital culture, and digitization. The endless possibilities and robust importance of libraries and archives are at the heart of this optimistic collection. Topics include transformations in the networked digital age; Indigenous issues and challenges in custodianship, ownership, and access; the importance of the harmonization of memory institutions today; and the overarching significance of libraries and archives in the public sphere. Libraries and archives - at once public institutions providing both communal and private havens of discovery - are being repurposed and transformed in intercultural contexts. Only by keeping pace with users' changing needs can they continue to provide the richest resources for an informed citizenry.

Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International... Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers (Paperback, Edition.)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009.

The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.

Information and Automation - International Symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010. Revised Selected... Information and Automation - International Symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010. Revised Selected Papers (Paperback, Edition.)
Luo Qi
R2,806 Discovery Miles 28 060 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Symposium on Information and Automation, ISIA 2010, held in Guangzhou, China, in November 2010. The 110 revised full papers presented were carefully reviewed and selected from numerous submissions. The symposium provides a forum for researchers, educators, engineers, and government officials to present and discuss their latest research results and exchange views on the future research directions in the general areas of Information and Automation.

Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007): Arnaldo Garcia,... Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Arnaldo Garcia, Henning Stichtenoth
R1,388 Discovery Miles 13 880 Ships in 18 - 22 working days

The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory. This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles.

Handbook of Biometrics (Paperback, Softcover reprint of hardcover 1st ed. 2008): Anil K. Jain, Patrick Flynn, Arun A. Ross Handbook of Biometrics (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Anil K. Jain, Patrick Flynn, Arun A. Ross
R4,289 Discovery Miles 42 890 Ships in 18 - 22 working days

Biometrics is a rapidly evolving field with applications ranging from accessing one 's computer to gaining entry into a country. The deployment of large-scale biometric systems in both commercial and government applications has increased public awareness of this technology. Recent years have seen significant growth in biometric research resulting in the development of innovative sensors, new algorithms, enhanced test methodologies and novel applications. This book addresses this void by inviting some of the prominent researchers in Biometrics to contribute chapters describing the fundamentals as well as the latest innovations in their respective areas of expertise.

Video Coding with Superimposed Motion-Compensated Signals - Applications to H.264 and Beyond (Paperback, Softcover reprint of... Video Coding with Superimposed Motion-Compensated Signals - Applications to H.264 and Beyond (Paperback, Softcover reprint of the original 1st ed. 2004)
Markus Flierl, Bernd Girod
R2,621 Discovery Miles 26 210 Ships in 18 - 22 working days

Appendices 133 A Mathematical Results 133 A.1 Singularities of the Displacement Error Covariance Matrix 133 A.2 A Class of Matrices and their Eigenvalues 134 A.3 Inverse of the Power Spectral Density Matrix 134 A.4 Power Spectral Density of a Frame 136 Glossary 137 References 141 Index 159 Preface This book aims to capture recent advances in motion compensation for - ficient video compression. It investigates linearly combined motion comp- sated signals and generalizes the well known superposition for bidirectional prediction in B-pictures. The number of superimposed signals and the sel- tion of reference pictures will be important aspects of the discussion. The application oriented part of the book employs this concept to the well known ITU-T Recommendation H.263 and continues with the improvements by superimposed motion-compensated signals for the emerging ITU-T R- ommendation H.264 and ISO/IEC MPEG-4 (Part 10). In addition, it discusses a new approach for wavelet-based video coding. This technology is currently investigated by MPEG to develop a new video compression standard for the mid-term future.

The Theory of Partial Algebraic Operations (Paperback, Softcover reprint of hardcover 1st ed. 1997): E.S. Ljapin, A.E. Evseev The Theory of Partial Algebraic Operations (Paperback, Softcover reprint of hardcover 1st ed. 1997)
E.S. Ljapin, A.E. Evseev
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Nowadays algebra is understood basically as the general theory of algebraic oper ations and relations. It is characterised by a considerable intrinsic naturalness of its initial notions and problems, the unity of its methods, and a breadth that far exceeds that of its basic concepts. It is more often that its power begins to be displayed when one moves outside its own limits. This characteristic ability is seen when one investigates not only complete operations, but partial operations. To a considerable extent these are related to algebraic operators and algebraic operations. The tendency to ever greater generality is amongst the reasons that playa role in explaining this development. But other important reasons play an even greater role. Within this same theory of total operations (that is, operations defined everywhere), there persistently arises in its different sections a necessity of examining the emergent feature of various partial operations. It is particularly important that this has been found in those parts of algebra it brings together and other areas of mathematics it interacts with as well as where algebra finds applica tion at the very limits of mathematics. In this connection we mention the theory of the composition of mappings, category theory, the theory of formal languages and the related theory of mathematical linguistics, coding theory, information theory, and algebraic automata theory. In all these areas (as well as in others) from time to time there arises the need to consider one or another partial operation."

Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009): Jose A.... Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jose A. Onieva, Jianying Zhou
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

Computer Viruses and Malware (Paperback, Softcover reprint of hardcover 1st ed. 2006): John Aycock Computer Viruses and Malware (Paperback, Softcover reprint of hardcover 1st ed. 2006)
John Aycock
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.

Statistical and Inductive Inference by Minimum Message Length (Paperback, Softcover reprint of hardcover 1st ed. 2005): C.S.... Statistical and Inductive Inference by Minimum Message Length (Paperback, Softcover reprint of hardcover 1st ed. 2005)
C.S. Wallace
R2,921 Discovery Miles 29 210 Ships in 18 - 22 working days

Mythanksareduetothemanypeoplewhohaveassistedintheworkreported here and in the preparation of this book. The work is incomplete and this account of it rougher than it might be. Such virtues as it has owe much to others; the faults are all mine. MyworkleadingtothisbookbeganwhenDavidBoultonandIattempted to develop a method for intrinsic classi?cation. Given data on a sample from some population, we aimed to discover whether the population should be considered to be a mixture of di?erent types, classes or species of thing, and, if so, how many classes were present, what each class looked like, and which things in the sample belonged to which class. I saw the problem as one of Bayesian inference, but with prior probability densities replaced by discrete probabilities re?ecting the precision to which the data would allow parameters to be estimated. Boulton, however, proposed that a classi?cation of the sample was a way of brie?y encoding the data: once each class was described and each thing assigned to a class, the data for a thing would be partially implied by the characteristics of its class, and hence require little further description. After some weeks' arguing our cases, we decided on the maths for each approach, and soon discovered they gave essentially the same results. Without Boulton's insight, we may never have made the connection between inference and brief encoding, which is the heart of this work.

CryptoGraphics - Exploiting Graphics Cards For Security (Paperback, Softcover reprint of hardcover 1st ed. 2006): Debra Cook,... CryptoGraphics - Exploiting Graphics Cards For Security (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Debra Cook, Angelos D. Keromytis
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.

Autonomic Computing and Networking (Paperback, Softcover reprint of hardcover 1st ed. 2009): Mieso Denko, Laurence Tianruo... Autonomic Computing and Networking (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Mieso Denko, Laurence Tianruo Yang, Yan Zhang
R4,059 Discovery Miles 40 590 Ships in 18 - 22 working days

Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds. Autonomic computing and networking are new computing and networking paradigms that allow the creation of self-managing and self-controlling computing and networking environments using techniques such as distributed algorithms and context-awareness to dynamically control networking functions without human interventions. Autonomic networking is characterized by recovery from failures and malfunctions, agility to changing networking environment, self-optimization and self-awareness. The self-control and management features can help to overcome the growing complexity and heterogeneity of exiting communication networks and systems. The realization of fully autonomic heterogeneous networking introduces several research challenges in all aspects of computing and networking and related fields.

Information Criteria and Statistical Modeling (Paperback, 1st ed. Softcover of orig. ed. 2008): Sadanori Konishi, Genshiro... Information Criteria and Statistical Modeling (Paperback, 1st ed. Softcover of orig. ed. 2008)
Sadanori Konishi, Genshiro Kitagawa
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Statistical modeling is a critical tool in scientific research. This book provides comprehensive explanations of the concepts and philosophy of statistical modeling, together with a wide range of practical and numerical examples. The authors expect this work to be of great value not just to statisticians but also to researchers and practitioners in various fields of research such as information science, computer science, engineering, bioinformatics, economics, marketing and environmental science. It 's a crucial area of study, as statistical models are used to understand phenomena with uncertainty and to determine the structure of complex systems. They re also used to control such systems, as well as to make reliable predictions in various natural and social science fields.

Data Warehousing and Data Mining Techniques for Cyber Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Anoop... Data Warehousing and Data Mining Techniques for Cyber Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Anoop Singhal
R3,989 Discovery Miles 39 890 Ships in 18 - 22 working days

The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single computers, computer networks, wireless networks, databases, or authentication compromises. This book describes data warehousing and data mining techniques that can be used to detect attacks. It is designed to be a useful handbook for practitioners and researchers in industry, and is also suitable as a text for advanced-level students in computer science.

Binary Quadratic Forms - An Algorithmic Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007): Johannes Buchmann,... Binary Quadratic Forms - An Algorithmic Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Johannes Buchmann, Ulrich Vollmer
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

The book deals with algorithmic problems related to binary quadratic forms. It uniquely focuses on the algorithmic aspects of the theory. The book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography and requires only basic mathematical knowledge. The author is a world leader in number theory.

Entropy, Search, Complexity (Paperback, Softcover reprint of hardcover 1st ed. 2007): Imre Csisz ar, Gyula O.H. Katona, Gabor... Entropy, Search, Complexity (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Imre Csisz ar, Gyula O.H. Katona, Gabor Tardos
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book collects survey papers in the fields of entropy, search and complexity, summarizing the latest developments in their respective areas. More than half of the papers belong to search theory which lies on the borderline of mathematics and computer science, information theory and combinatorics, respectively. The book will be useful to experienced researchers as well as young scientists and students both in mathematics and computer science.

Network Security Policies and Procedures (Paperback, Softcover reprint of hardcover 1st ed. 2007): Douglas W. Frye Network Security Policies and Procedures (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Douglas W. Frye
R3,762 Discovery Miles 37 620 Ships in 18 - 22 working days

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will thus be better equipped to act in a way that forwards an organization s goals.

Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering."

Optical Communication Theory and Techniques (Paperback, Softcover reprint of hardcover 1st ed. 2005): Enrico Forestieri Optical Communication Theory and Techniques (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Enrico Forestieri
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

Since the advent of optical communications, a greattechnological effort has been devoted to the exploitation of the huge bandwidth of optical fibers. Sta- ing from a few Mb/s single channel systems, a fast and constant technological development has led to the actual 10 Gb/s per channel dense wavelength - vision multiplexing (DWDM) systems, with dozens of channels on a single fiber. Transmitters and receivers are now ready for 40 Gb/s, whereas hundreds of channels can be simultaneously amplified by optical amplifiers. Nevertheless, despite such a pace in technological progress, optical c- munications are still in a primitive stage if compared, for instance, to radio communications: the widely spread on-off keying (OOK) modulation format is equivalent to the rough amplitude modulation (AM) format, whereas the DWDM technique is nothing more than the optical version of the frequency - vision multiplexing (FDM) technique. Moreover, adaptive equalization, ch- nel coding or maximum likelihood detection are still considered something "exotic" in the optical world. This is mainly due to the favourable char- teristics of the fiber optic channel (large bandwidth, low attenuation, channel stability, ...), which so far allowed us to use very simple transmission and detection techniques.

Computer Security in the 21st Century (Paperback, Softcover reprint of hardcover 1st ed. 2005): D. T. Lee, S. P Shieh, J. Doug... Computer Security in the 21st Century (Paperback, Softcover reprint of hardcover 1st ed. 2005)
D. T. Lee, S. P Shieh, J. Doug Tygar
R2,649 Discovery Miles 26 490 Ships in 18 - 22 working days

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

RFID Security - Techniques, Protocols and System-On-Chip Design (Paperback, Softcover reprint of hardcover 1st ed. 2008): Paris... RFID Security - Techniques, Protocols and System-On-Chip Design (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Paris Kitsos, Yan Zhang
R4,055 Discovery Miles 40 550 Ships in 18 - 22 working days

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips.

Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International... Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers (Paperback, Edition.)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.

Optimal Time-Domain Noise Reduction Filters - A Theoretical Study (Paperback, 2011 ed.): Jacob Benesty, Jingdong Chen Optimal Time-Domain Noise Reduction Filters - A Theoretical Study (Paperback, 2011 ed.)
Jacob Benesty, Jingdong Chen
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Additive noise is ubiquitous in acoustics environments and can affect the intelligibility and quality of speech signals. Therefore, a so-called noise reduction algorithm is required to mitigate the effect of the noise that is picked up by the microphones. This work proposes a general framework in the time domain for the single and multiple microphone cases, from which it is very convenient to derive, study, and analyze all kind of optimal noise reduction filters. Not only that all known algorithms can be deduced from this approach, shedding more light on how they function, but new ones can be discovered as well.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,356 Discovery Miles 23 560
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Real Life Cryptology - Ciphers and…
Benedek Lang Hardcover R3,336 Discovery Miles 33 360
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R952 Discovery Miles 9 520
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820

 

Partners