0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (101)
  • R500+ (1,927)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

A Classical Introduction to Cryptography Exercise Book (Paperback, Softcover reprint of hardcover 1st ed. 2006): Thomas... A Classical Introduction to Cryptography Exercise Book (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
R1,341 Discovery Miles 13 410 Ships in 10 - 15 working days

TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY EXERCISE BOOK by Thomas Baignkres, Palcal Junod, Yi Lu, Jean Monnerat and Serge Vaudenay ISBN- 10: 0-387-27934-2 e-ISBN-10: 0-387-28835-X ISBN- 13: 978-0-387-27934-3 e-ISBN- 13: 978-0-387-28835-2 Printed on acid-free paper. O 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America.

Securing Biometrics Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Charles A. Shoniregun, Stephen... Securing Biometrics Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Charles A. Shoniregun, Stephen Crosier
R3,005 Discovery Miles 30 050 Ships in 10 - 15 working days

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. Biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify theft and other security issues, society will have to compromise between security and personal freedoms. Securing Biometrics Applications investigates and identifies key impacts of biometric security applications, while discovering opportunities and challenges presented by the biometric technologies available.

Optical Communication Theory and Techniques (Paperback, Softcover reprint of hardcover 1st ed. 2005): Enrico Forestieri Optical Communication Theory and Techniques (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Enrico Forestieri
R4,228 Discovery Miles 42 280 Ships in 10 - 15 working days

Since the advent of optical communications, a greattechnological effort has been devoted to the exploitation of the huge bandwidth of optical fibers. Sta- ing from a few Mb/s single channel systems, a fast and constant technological development has led to the actual 10 Gb/s per channel dense wavelength - vision multiplexing (DWDM) systems, with dozens of channels on a single fiber. Transmitters and receivers are now ready for 40 Gb/s, whereas hundreds of channels can be simultaneously amplified by optical amplifiers. Nevertheless, despite such a pace in technological progress, optical c- munications are still in a primitive stage if compared, for instance, to radio communications: the widely spread on-off keying (OOK) modulation format is equivalent to the rough amplitude modulation (AM) format, whereas the DWDM technique is nothing more than the optical version of the frequency - vision multiplexing (FDM) technique. Moreover, adaptive equalization, ch- nel coding or maximum likelihood detection are still considered something "exotic" in the optical world. This is mainly due to the favourable char- teristics of the fiber optic channel (large bandwidth, low attenuation, channel stability, ...), which so far allowed us to use very simple transmission and detection techniques.

Information Dynamics and Open Systems - Classical and Quantum Approach (Paperback, Softcover reprint of hardcover 1st ed.... Information Dynamics and Open Systems - Classical and Quantum Approach (Paperback, Softcover reprint of hardcover 1st ed. 1997)
Roman S. Ingarden, A. Kossakowski, M. Ohya
R5,496 Discovery Miles 54 960 Ships in 10 - 15 working days

This book has a long history of more than 20 years. The first attempt to write a monograph on information-theoretic approach to thermodynamics was done by one of the authors (RSI) in 1974 when he published, in the preprint form, two volumes of the book "Information Theory and Thermodynamics" concerning classical and quantum information theory, [153] (220 pp.), [154] (185 pp.). In spite of the encouraging remarks by some of the readers, the physical part of this book was never written except for the first chapter. Now this material is written completely anew and in much greater extent. A few years earlier, in 1970, second author of the present book, (AK), a doctoral student and collaborator of RSI in Toruli, published in Polish, also as a preprint, his habilitation dissertation "Information-theoretical decision scheme in quantum statistical mechanics" [196] (96 pp.). This small monograph presented his original results in the physical part of the theory developed in the Torun school. Unfortunately, this preprint was never published in English. The present book contains all these results in a much more modern and developed form.

Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback,... Information, Coding and Mathematics - Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Mario Blaum, Patrick G. Farrell, Henk C.A. van Tilborg
R4,256 Discovery Miles 42 560 Ships in 10 - 15 working days

Information, Coding and Mathematics is a classic reference for both professional and academic researchers working in error-correction coding and decoding, Shannon theory, cryptography, digital communications, information security, and electronic engineering. The work represents a collection of contributions from leading experts in turbo coding, cryptography and sequences, Shannon theory and coding bounds, and decoding theory and applications. All of the contributors have individually and collectively dedicated their work as a tribute to the outstanding work of Robert J. McEliece. Information, Coding and Mathematics covers the latest advances in the widely used and rapidly developing field of information and communication technology.

Intelligent Agents - Theory and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2004): Germano Resconi Intelligent Agents - Theory and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Germano Resconi
R4,263 Discovery Miles 42 630 Ships in 10 - 15 working days

This research book presents the agent theory and adaptation of agents in different contexts. Agents of different orders of complexity must be autonomous in the rules used. The agent must have a brain by which it can discover rules contained within the data. Because rules are the instruments by which agents change the environment, any adaptation of the rules can be considered as an evolution of the agents. Because uncertainty is present in every context, we shall describe in this book how it is possible to introduce global uncertainty from the local world into the description of the rules. This book contains ten chapters. Chapter 1 gives a general dscription of the evolutionary adaptation agent. Chapter 2 describes the actions and meta actions of the agent at different orders. Chapter 3 presents in an abstract and formal way the actions at different orders. Chapter 4 connects systems and meta systems with the adaptive agent. Chapter 5 describes the brain of the agent by the morphogenetic neuron theory. Chapter 6 introduces the logic structure of the adaptive agent. Chapter 7 describes the feedback and hyper-feedback in the adaptive agent. Chapter 8 introduces the adaptation field into the modal logic space as logic instrument in the adaptive agent. Chapter 9 describes the action of the agent in the physical domain. Chapter 10 presents the practical application of agents in robots and evolutionary computing."

Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Global Initiatives to Secure Cyberspace - An Emerging Landscape (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michael Portnoy, Seymour Goodman
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions. Concluding with a discussion of the progress made in recent years, the study explores current trends regarding the effectiveness and scope of coverage provided by these organizations and addresses several questions concerning the overall state of international cyber security. The authors would like to thank Mr. Anthony Rutkowski for generously p- viding his time, guidance, and support. The authors would also like to thank the International Telecommunication Union (ITU) Telecommunication Development Sector (ITU-D) and the United States National Science Foundation (NSF Grant R3772) for partially supporting the research conducted in this study. In addition, the authors would like to thank the Georgia Institute of Technology's Center for International Strategy, Technology, and Policy (CISTP) for assistance in hosting the Cyber Security Organization Catalog, and the Georgia Tech Information Se- rity Center (GTISC) for cooperation and promotion of this study. Table of Contents 1 The International Landscape of Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 A Brief History of Global Responses to Cyber Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005): Ezio Biglieri Coding for Wireless Channels (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ezio Biglieri
R1,545 Discovery Miles 15 450 Ships in 10 - 15 working days

Accessible introduction to the theoretical foundations of modern coding theory

Including numerous applications to wireless transmission systems

The author is famous in the field of coding and wireless communications for his work in the area of faded channels & communcations.

The Theory of Partial Algebraic Operations (Paperback, Softcover reprint of hardcover 1st ed. 1997): E.S. Ljapin, A.E. Evseev The Theory of Partial Algebraic Operations (Paperback, Softcover reprint of hardcover 1st ed. 1997)
E.S. Ljapin, A.E. Evseev
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Nowadays algebra is understood basically as the general theory of algebraic oper ations and relations. It is characterised by a considerable intrinsic naturalness of its initial notions and problems, the unity of its methods, and a breadth that far exceeds that of its basic concepts. It is more often that its power begins to be displayed when one moves outside its own limits. This characteristic ability is seen when one investigates not only complete operations, but partial operations. To a considerable extent these are related to algebraic operators and algebraic operations. The tendency to ever greater generality is amongst the reasons that playa role in explaining this development. But other important reasons play an even greater role. Within this same theory of total operations (that is, operations defined everywhere), there persistently arises in its different sections a necessity of examining the emergent feature of various partial operations. It is particularly important that this has been found in those parts of algebra it brings together and other areas of mathematics it interacts with as well as where algebra finds applica tion at the very limits of mathematics. In this connection we mention the theory of the composition of mappings, category theory, the theory of formal languages and the related theory of mathematical linguistics, coding theory, information theory, and algebraic automata theory. In all these areas (as well as in others) from time to time there arises the need to consider one or another partial operation."

Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009): Jose A.... Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jose A. Onieva, Jianying Zhou
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002):... Data Mining for Design and Manufacturing - Methods and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2002)
D. Braha
R4,465 Discovery Miles 44 650 Ships in 10 - 15 working days

Data Mining for Design and Manufacturing: Methods and Applications is the first book that brings together research and applications for data mining within design and manufacturing. The aim of the book is 1) to clarify the integration of data mining in engineering design and manufacturing, 2) to present a wide range of domains to which data mining can be applied, 3) to demonstrate the essential need for symbiotic collaboration of expertise in design and manufacturing, data mining, and information technology, and 4) to illustrate how to overcome central problems in design and manufacturing environments. The book also presents formal tools required to extract valuable information from design and manufacturing data, and facilitates interdisciplinary problem solving for enhanced decision making. Audience: The book is aimed at both academic and practising audiences. It can serve as a reference or textbook for senior or graduate level students in Engineering, Computer, and Management Sciences who are interested in data mining technologies. The book will be useful for practitioners interested in utilizing data mining techniques in design and manufacturing as well as for computer software developers engaged in developing data mining tools.

Algebraic Aspects of the Advanced Encryption Standard (Paperback, Softcover reprint of hardcover 1st ed. 2006): Carlos Cid,... Algebraic Aspects of the Advanced Encryption Standard (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Carlos Cid, Sean Murphy, Matthew Robshaw
R3,005 Discovery Miles 30 050 Ships in 10 - 15 working days

It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech- niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work will be of interest to both cryptogra- phers and algebraists and will stimulate future research. During the writing of this monograph we have found reasons to thank many people. We are especially grateful to the British Engineering and Physical Sciences Research Council (EPSRC) for their funding of the research project Security Analysis of the Advanced Encryption System (Grant GR/S42637), and to Susan Lagerstrom-Fifc and Sharon Palleschi at Springer. Wo would also hke to thank Glaus Diem, Maura Paterson, and Ludovic Perret for their valuable comments. Finally, the support of our families at home and our colleagues at work has been invaluable and particularly appreciated.

Information Theory and Statistical Learning (Paperback, Softcover reprint of hardcover 1st ed. 2009): Frank Emmert-Streib,... Information Theory and Statistical Learning (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Frank Emmert-Streib, Matthias Dehmer
R2,834 Discovery Miles 28 340 Ships in 10 - 15 working days

"Information Theory and Statistical Learning" presents theoretical and practical results about information theoretic methods used in the context of statistical learning.

The book will present a comprehensive overview of the large range of different methods that have been developed in a multitude of contexts. Each chapter is written by an expert in the field. The book is intended for an interdisciplinary readership working in machine learning, applied statistics, artificial intelligence, biostatistics, computational biology, bioinformatics, web mining or related disciplines.

Advance Praise for "Information Theory and Statistical Learning"

"A new epoch has arrived for information sciences to integrate various disciplines such as information theory, machine learning, statistical inference, data mining, model selection etc. I am enthusiastic about recommending the present book to researchers and students, because it summarizes most of these new emerging subjects and methods, which are otherwise scattered in many places." Shun-ichi Amari, RIKEN Brain Science Institute, Professor-Emeritus at the University of Tokyo

Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005):... Privacy, Security and Trust within the Context of Pervasive Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Philip Robinson, Harald Vogt, Waleed Wagealla
R2,756 Discovery Miles 27 560 Ships in 10 - 15 working days

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.

The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information... Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (Paperback, Softcover reprint of hardcover 1st ed. 2008)
David Avison, George M. Kasper, Barbara Pernici, Isabel Ramos, Dewald Roode
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.

Introduction to Cryptography - Principles and Applications (Paperback, Softcover reprint of hardcover 2nd ed. 2007): Hans... Introduction to Cryptography - Principles and Applications (Paperback, Softcover reprint of hardcover 2nd ed. 2007)
Hans Delfs, Helmut Knebl
R1,735 Discovery Miles 17 350 Ships in 10 - 15 working days

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.

Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008):... Intelligence and Security Informatics - Techniques and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Hsinchun Chen, Christopher C. Yang
R4,281 Discovery Miles 42 810 Ships in 10 - 15 working days

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response

Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004): Darrel Hankerson, Alfred J.... Guide to Elliptic Curve Cryptography (Paperback, Softcover reprint of the original 1st ed. 2004)
Darrel Hankerson, Alfred J. Menezes, Scott Vanstone
R3,545 Discovery Miles 35 450 Ships in 10 - 15 working days

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.
Features & Benefits:

* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems

* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology

* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic
* Distills complex mathematics and algorithms for easy understanding
* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools
This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007): Arnaldo Garcia,... Topics in Geometry, Coding Theory and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Arnaldo Garcia, Henning Stichtenoth
R1,447 Discovery Miles 14 470 Ships in 10 - 15 working days

The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory. This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles.

Security in E-Learning (Paperback, Softcover reprint of hardcover 1st ed. 2005): Edgar R. Weippl Security in E-Learning (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Edgar R. Weippl
R2,762 Discovery Miles 27 620 Ships in 10 - 15 working days

As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.

Coordinated Multiuser Communications (Paperback, Softcover reprint of hardcover 1st ed. 2006): Christian Schlegel, Alex Grant Coordinated Multiuser Communications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Christian Schlegel, Alex Grant
R2,792 Discovery Miles 27 920 Ships in 10 - 15 working days

Coordinated Multiuser Communications provides for the first time a unified treatment of multiuser detection and multiuser decoding in a single volume.

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access interference, caused by a multitude of users sharing a common transmission medium. The performance of receiver systems in such cases can be greatly improved by the application of joint detection and decoding methods. Multiuser detection and decoding not only improve system reliability and capacity, they also simplify the problem of resource allocation.

Coordinated Multiuser Communications provides the reader with tools for the design and analysis of joint detection and joint decoding methods. These methods are developed within a unified framework of linear multiple-access channels, which includes code-division multiple-access, multiple antenna channels and orthogonal frequency division multiple access.

Emphasis is placed on practical implementation aspects and modern iterative processing techniques for systems both with, and without integrated error control coding.

Focusing on the theory and practice of unifying accessing and transmission aspects of communications, this book is a valuable reference for students, researchers and practicing engineers.

Propositional, Probabilistic and Evidential Reasoning - Integrating Numerical and Symbolic Approaches (Paperback, Softcover... Propositional, Probabilistic and Evidential Reasoning - Integrating Numerical and Symbolic Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2001)
Weiru Liu
R2,788 Discovery Miles 27 880 Ships in 10 - 15 working days

How to draw plausible conclusions from uncertain and conflicting sources of evidence is one of the major intellectual challenges of Artificial Intelligence. It is a prerequisite of the smart technology needed to help humans cope with the information explosion of the modern world. In addition, computational modelling of uncertain reasoning is a key to understanding human rationality. Previous computational accounts of uncertain reasoning have fallen into two camps: purely symbolic and numeric. This book represents a major advance by presenting a unifying framework which unites these opposing camps. The Incidence Calculus can be viewed as both a symbolic and a numeric mechanism. Numeric values are assigned indirectly to evidence via the possible worlds in which that evidence is true. This facilitates purely symbolic reasoning using the possible worlds and numeric reasoning via the probabilities of those possible worlds. Moreover, the indirect assignment solves some difficult technical problems, like the combinat ion of dependent sources of evidcence, which had defeated earlier mechanisms. Weiru Liu generalises the Incidence Calculus and then compares it to a succes sion of earlier computational mechanisms for uncertain reasoning: Dempster-Shafer Theory, Assumption-Based Truth Maintenance, Probabilis tic Logic, Rough Sets, etc. She shows how each of them is represented and interpreted in Incidence Calculus. The consequence is a unified mechanism which includes both symbolic and numeric mechanisms as special cases. It provides a bridge between symbolic and numeric approaches, retaining the advantages of both and overcoming some of their disadvantages."

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Keith Mayes, Konstantinos Markantonakis
R3,525 Discovery Miles 35 250 Ships in 10 - 15 working days

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in a smart card related project.

Error Correction Codes for Non-Volatile Memories (Paperback, Softcover reprint of hardcover 1st ed. 2008): Rino Micheloni, A.... Error Correction Codes for Non-Volatile Memories (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Rino Micheloni, A. Marelli, R. Ravasio
R4,245 Discovery Miles 42 450 Ships in 10 - 15 working days

Nowadays it is hard to find an electronic device which does not use codes: for example, we listen to music via heavily encoded audio CD's and we watch movies via encoded DVD's. There is at least one area where the use of encoding/decoding is not so developed, yet: Flash non-volatile memories. Flash memory high-density, low power, cost effectiveness, and scalable design make it an ideal choice to fuel the explosion of multimedia products, like USB keys, MP3 players, digital cameras and solid-state disk.

In ECC for Non-Volatile Memories the authors expose the basics of coding theory needed to understand the application to memories, as well as the relevant design topics, with reference to both NOR and NAND Flash architectures. A collection of software routines is also included for better understanding.

The authors form a research group (now at Qimonda) which is the typical example of a fruitful collaboration between mathematicians and engineers.

Groebner Bases, Coding, and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009): Massimiliano Sala, Teo Mora,... Groebner Bases, Coding, and Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Massimiliano Sala, Teo Mora, Ludovic Perret, Shojiro Sakata, Carlo Traverso
R2,833 Discovery Miles 28 330 Ships in 10 - 15 working days

Coding theory and cryptography allow secure and reliable data transmission, which is at the heart of modern communication. Nowadays, it is hard to find an electronic device without some code inside. Grobner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in theoretical contexts and in practical situations.

This book is the first book ever giving a comprehensive overview on the application of commutative algebra to coding theory and cryptography. For example, all important properties of algebraic/geometric coding systems (including encoding, construction, decoding, list decoding) are individually analysed, reporting all significant approaches appeared in the literature. Also, stream ciphers, PK cryptography, symmetric cryptography and Polly Cracker systems deserve each a separate chapter, where all the relevant literature is reported and compared. While many short notes hint at new exciting directions, the reader will find that all chapters fit nicely within a unified notation."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Economics of Blockchain and…
James L. Caton Hardcover R2,745 Discovery Miles 27 450
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Information Theory - Poincare Seminar…
Bertrand Duplantier, Vincent Rivasseau Hardcover R3,518 Discovery Miles 35 180
Blockchain - Novice to Expert - 2…
Keizer Soeze Hardcover R1,081 R875 Discovery Miles 8 750
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R712 R590 Discovery Miles 5 900
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,559 Discovery Miles 15 590
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030

 

Partners