0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (3)
  • R250 - R500 (33)
  • R500+ (565)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Information theory > General

Instruction Selection - Principles, Methods, and Applications (Paperback, Softcover reprint of the original 1st ed. 2016):... Instruction Selection - Principles, Methods, and Applications (Paperback, Softcover reprint of the original 1st ed. 2016)
Gabriel Hjort Blindell
R1,652 Discovery Miles 16 520 Ships in 18 - 22 working days

This book presents a comprehensive, structured, up-to-date survey on instruction selection. The survey is structured according to two dimensions: approaches to instruction selection from the past 45 years are organized and discussed according to their fundamental principles, and according to the characteristics of the supported machine instructions. The fundamental principles are macro expansion, tree covering, DAG covering, and graph covering. The machine instruction characteristics introduced are single-output, multi-output, disjoint-output, inter-block, and interdependent machine instructions. The survey also examines problems that have yet to be addressed by existing approaches. The book is suitable for advanced undergraduate students in computer science, graduate students, practitioners, and researchers.

High-Speed Decoders for Polar Codes (Paperback, Softcover reprint of the original 1st ed. 2017): Pascal Giard, Claude... High-Speed Decoders for Polar Codes (Paperback, Softcover reprint of the original 1st ed. 2017)
Pascal Giard, Claude Thibeault, Warren J. Gross
R2,685 Discovery Miles 26 850 Ships in 18 - 22 working days

A new class of provably capacity achieving error-correction codes, polar codes are suitable for many problems, such as lossless and lossy source coding, problems with side information, multiple access channel, etc. The first comprehensive book on the implementation of decoders for polar codes, the authors take a tutorial approach to explain the practical decoder implementation challenges and trade-offs in either software or hardware. They also demonstrate new trade-offs in latency, throughput, and complexity in software implementations for high-performance computing and GPGPUs, and hardware implementations using custom processing elements, full-custom application-specific integrated circuits (ASICs), and field-programmable-gate arrays (FPGAs). Presenting a good overview of this research area and future directions, High-Speed Decoders for Polar Codes is perfect for any researcher or SDR practitioner looking into implementing efficient decoders for polar codes, as well as students and professors in a modern error correction class. As polar codes have been accepted to protect the control channel in the next-generation mobile communication standard (5G) developed by the 3GPP, the audience includes engineers who will have to implement decoders for such codes and hardware engineers designing the backbone of communication networks.

Data and Information Quality - Dimensions, Principles and Techniques (Paperback, Softcover reprint of the original 1st ed.... Data and Information Quality - Dimensions, Principles and Techniques (Paperback, Softcover reprint of the original 1st ed. 2016)
Carlo Batini, Monica Scannapieco
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

This book provides a systematic and comparative description of the vast number of research issues related to the quality of data and information. It does so by delivering a sound, integrated and comprehensive overview of the state of the art and future development of data and information quality in databases and information systems. To this end, it presents an extensive description of the techniques that constitute the core of data and information quality research, including record linkage (also called object identification), data integration, error localization and correction, and examines the related techniques in a comprehensive and original methodological framework. Quality dimension definitions and adopted models are also analyzed in detail, and differences between the proposed solutions are highlighted and discussed. Furthermore, while systematically describing data and information quality as an autonomous research area, paradigms and influences deriving from other areas, such as probability theory, statistical data analysis, data mining, knowledge representation, and machine learning are also included. Last not least, the book also highlights very practical solutions, such as methodologies, benchmarks for the most effective techniques, case studies, and examples. The book has been written primarily for researchers in the fields of databases and information management or in natural sciences who are interested in investigating properties of data and information that have an impact on the quality of experiments, processes and on real life. The material presented is also sufficiently self-contained for masters or PhD-level courses, and it covers all the fundamentals and topics without the need for other textbooks. Data and information system administrators and practitioners, who deal with systems exposed to data-quality issues and as a result need a systematization of the field and practical methods in the area, will also benefit from the combination of concrete practical approaches with sound theoretical formalisms.

Evolution of Cyber Technologies and Operations to 2035 (Paperback, Softcover reprint of the original 1st ed. 2015): Misty... Evolution of Cyber Technologies and Operations to 2035 (Paperback, Softcover reprint of the original 1st ed. 2015)
Misty Blowers
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Quantum Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2015): Song Y. Yan Quantum Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2015)
Song Y. Yan
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture and numerical verification. The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) and for attacking IFP, DLP and ECDLP based cryptographic systems. Chapters also cover various other quantum algorithms for Pell's equation, principal ideal, unit group, class group, Gauss sums, prime counting function, Riemann's hypothesis and the BSD conjecture. Quantum Computational Number Theory is self-contained and intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the related fields. Number theorists, cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset.

World Meliponine Etymology of Taxonomic Nomenclature (Paperback): Abu Hassan Jalil World Meliponine Etymology of Taxonomic Nomenclature (Paperback)
Abu Hassan Jalil
R1,266 Discovery Miles 12 660 Ships in 18 - 22 working days
Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016): Chuankun... Boolean Functions and Their Applications in Cryptography (Paperback, Softcover reprint of the original 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Elements of Information Theory (Hardcover, 2nd Edition): Thomas M. Cover, Joy A. Thomas Elements of Information Theory (Hardcover, 2nd Edition)
Thomas M. Cover, Joy A. Thomas
R2,836 Discovery Miles 28 360 Ships in 9 - 17 working days

The latest edition of this classic is updated with new problem sets and material
The Second Edition of this fundamental textbook maintains the book's tradition of clear, thought-provoking instruction. Readers are provided once again with an instructive mix of mathematics, physics, statistics, and information theory.
All the essential topics in information theory are covered in detail, including entropy, data compression, channel capacity, rate distortion, network information theory, and hypothesis testing. The authors provide readers with a solid understanding of the underlying theory and applications. Problem sets and a telegraphic summary at the end of each chapter further assist readers. The historical notes that follow each chapter recap the main points.
The Second Edition features:
* Chapters reorganized to improve teaching
* 200 new problems
* New material on source coding, portfolio theory, and feedback capacity
* Updated references
Now current and enhanced, the Second Edition of Elements of Information Theory remains the ideal textbook for upper-level undergraduate and graduate courses in electrical engineering, statistics, and telecommunications.

An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department.

Why Cryptography Should Not Rely on Physical Attack Complexity (Paperback, Softcover reprint of the original 1st ed. 2015):... Why Cryptography Should Not Rely on Physical Attack Complexity (Paperback, Softcover reprint of the original 1st ed. 2015)
Juliane Kramer
R2,986 Discovery Miles 29 860 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

La Metaphore par-dela l'infini; Les pou-VOIRS de la metaphore - des benefices et de l'usage des figures analogiques... La Metaphore par-dela l'infini; Les pou-VOIRS de la metaphore - des benefices et de l'usage des figures analogiques dans la recherche et la vulgarisation scientifique (French, Paperback)
Clara Clivaz-Charvet
R1,483 Discovery Miles 14 830 Ships in 10 - 15 working days

Avec une preface de Jean-Pierre Luminet Comment penser un atome ? Qu'est devenue la pomme de Newton ? Sous quelles formes representer l'Univers ? Quelle imagerie est la preferee des scientifiques afin de decrire notre monde ? Comment creer et utiliser les metaphores ? Le changement de paradigme opere par la physique au 20e siecle exige de transformer notre systeme de representations et de repenser notre cadre referentiel. De la simple comparaison didactique a la metaphore heuristique, cet ouvrage recense les " images vedettes " a l'oeuvre dans la diffusion des connaissances et expose les huit benefices principaux inherents a cette imagerie scientifique. L'importance de faire un usage maitrise de ces " reflexions " depasse largement un transfert d'informations. C'est la raison pour laquelle un guide a l'usage des scientifiques est propose. Sous la forme de questions-reponses, ce guide pratique avertit des pieges a eviter tout en indiquant les emplois metaphoriques les plus pertinents pour comprendre et se faire comprendre.

Probleme und Ergebnisse aus der Arbeitsgruppe Kybernetik, Informationsverarbeitung der Klasse Mathematik 1977/78 (German,... Probleme und Ergebnisse aus der Arbeitsgruppe Kybernetik, Informationsverarbeitung der Klasse Mathematik 1977/78 (German, Hardcover, Reprint 2021 ed.)
No Contributor
R3,172 Discovery Miles 31 720 Ships in 18 - 22 working days
Harmonic Analysis and Rational Approximation - Their Roles in Signals, Control and Dynamical Systems (Paperback, 2006 ed.):... Harmonic Analysis and Rational Approximation - Their Roles in Signals, Control and Dynamical Systems (Paperback, 2006 ed.)
Jean-Daniel Fournier, Jose Grimm, Juliette Leblond, Jonathan R. Partington
R2,761 Discovery Miles 27 610 Ships in 18 - 22 working days

This book - an outgrowth of a topical summer school - sets out to introduce non-specialists from physics and engineering to the basic mathematical concepts of approximation and Fourier theory. After a general introduction, Part II of this volume contains basic material on the complex and harmonic analysis underlying the further developments presented. Part III deals with the essentials of approximation theory while Part IV completes the foundations by a tour of probability theory. Part V reviews some major applications in signal and control theory. In Part VI mathematical aspects of dynamical systems theory are discussed. Part VII, finally, is devoted to a modern approach to two physics problems: turbulence and the control and noise analysis in gravitational waves measurements.

Effective Threat Intelligence - Building and running an intel team for your organization (Paperback): James Dietle Effective Threat Intelligence - Building and running an intel team for your organization (Paperback)
James Dietle
R287 Discovery Miles 2 870 Ships in 18 - 22 working days
Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.):... Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.)
Friedrich L. Bauer
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung fur den Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihre Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("public keys") treten mehr und mehr rechnerinterne Anwendungen, wie Zugriffsberechtigungen und der Quellenschutz von Software. - Der erste Teil des Buches behandelt die Geheimschriften und ihren Gebrauch - die Kryptographie. Dabei wird auch auf das aktuelle Thema "Kryptographie und Grundrechte des Burgers" eingegangen. Im zweiten Teil wird das Vorgehen zum unbefugten Entziffern einer Geheimschrift - die Kryptanalyse - besprochen, wobei insbesondere Hinweise zur Beurteilung der Verfahrenssicherheit gegeben werden. Mit der vorliegenden dritten Auflage wurde das Werk auf den neuesten Stand gebracht. - Das Buch setzt nur mathematische Grundkenntnisse voraus. Mit einer Fulle spannender, lustiger und bisweilen anzuglicher Geschichten aus der historischen Kryptologie gewurzt, ist es auch fur Laien reizvoll zu lesen."

Information, Interaction, and Agency (Paperback, 2005 ed.): Wiebe van der Hoek Information, Interaction, and Agency (Paperback, 2005 ed.)
Wiebe van der Hoek
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

Contemporary epistemological and cognitive studies, as well as recent trends in computer science and game theory have revealed an increasingly important and intimate relationship between Information, Interaction, and Agency.

Agents perform actions based on the available information and in the presence of other interacting agents. From this perspective Information, Interaction, and Agency neatly ties together classical themes like rationality, decision-making and belief revision with games, strategies and learning in a multi-agent setting.

Unified by the central notions Information, Interaction, and Agency, the essays in this volume provide refreshing methodological perspectives on belief revision, dynamic epistemic logic, von Neumann games, and evolutionary game theory; all of which in turn are central approaches to understanding our own rationality and that of other agents.

Reprinted from Synthese, 139:2 and 142:2 (2004), Special Section Knowledge, Rationality, and Action.

An Introduction to Auction Theory (Hardcover): Flavio M. Menezes, Paulo K. Monteiro An Introduction to Auction Theory (Hardcover)
Flavio M. Menezes, Paulo K. Monteiro
R2,259 Discovery Miles 22 590 Ships in 18 - 22 working days

Auction theory is now an important component of an economist's training. The techniques and insights gained from the study of auction theory provide a useful starting point for those who want to venture into the economics of information, mechanism design, and regulatory economics. This book provides a step-by-step, self-contained treatment of the theory of auctions. It allows students and readers with a calculus background to work through all the basic results, covering the basic independent-private-model; the effects of introducing correlation in valuations on equilibrium behaviour and the seller's expected revenue; mechanism design; and the theory of multi-object auctions.

Model Checking Quantum Systems - Principles and Algorithms (Hardcover): Mingsheng Ying, Yuan Feng Model Checking Quantum Systems - Principles and Algorithms (Hardcover)
Mingsheng Ying, Yuan Feng
R1,685 Discovery Miles 16 850 Ships in 10 - 15 working days

Model checking is one of the most successful verification techniques and has been widely adopted in traditional computing and communication hardware and software industries. This book provides the first systematic introduction to model checking techniques applicable to quantum systems, with broad potential applications in the emerging industry of quantum computing and quantum communication as well as quantum physics. Suitable for use as a course textbook and for self-study, graduate and senior undergraduate students will appreciate the step-by-step explanations and the exercises included. Researchers and engineers in the related fields can further develop these techniques in their own work, with the final chapter outlining potential future applications.

The Social Study of Information and Communication Technology - Innovation, Actors, and Contexts (Paperback): Chrisanthi... The Social Study of Information and Communication Technology - Innovation, Actors, and Contexts (Paperback)
Chrisanthi Avgerou, Claudio Ciborra; Frank Land
R1,781 Discovery Miles 17 810 Ships in 10 - 15 working days

This book is a useful text for advanced students of MIS and ICT courses, and for those studying ICT in related areas: Management and Organization Studies, Cultural Studies, and Technology and Innovation. As ICTs permeate every sphere of society - business, education, leisure, government, etc. - it is important to reflect the character and complexity of the interaction between people and computers, between society and technology. For example, the user may represent a much broader set of actors than 'the user' conventionally found in many texts: the operator, the customer, the citizen, the gendered individual, the entrepreneur, the 'poor', the student. Each actor uses ICT in different ways. This book examines these issues, deploying a number of methods such as Actor Network Theory, Socio-Technical Systems, and phenomenological approaches. Management concerns about strategy and productivity are covered together with issues of power, politics, and globalization. Topics range from long-standing themes in the study of IT in organizations such as implementation, strategy, and evaluation, to general analysis of IT as socio-economic change A distinguished group of contributors, including Bruno Latour, Saskia Sassen, Robert Galliers, Frank Land, Ian Angel, and Richard Boland, offer the reader a rich set of perspectives and ideas on the relationship between ICT and society, organizational knowledge and innovation.

Codeless Data Structures and Algorithms - Learn DSA Without Writing a Single Line of Code (Paperback, 1st ed.): Armstrong Subero Codeless Data Structures and Algorithms - Learn DSA Without Writing a Single Line of Code (Paperback, 1st ed.)
Armstrong Subero
R988 R842 Discovery Miles 8 420 Save R146 (15%) Ships in 18 - 22 working days

In the era of self-taught developers and programmers, essential topics in the industry are frequently learned without a formal academic foundation. A solid grasp of data structures and algorithms (DSA) is imperative for anyone looking to do professional software development and engineering, but classes in the subject can be dry or spend too much time on theory and unnecessary readings. Regardless of your programming language background, Codeless Data Structures and Algorithms has you covered. In this book, author Armstrong Subero will help you learn DSAs without writing a single line of code. Straightforward explanations and diagrams give you a confident handle on the topic while ensuring you never have to open your code editor, use a compiler, or look at an integrated development environment. Subero introduces you to linear, tree, and hash data structures and gives you important insights behind the most common algorithms that you can directly apply to your own programs. Codeless Data Structures and Algorithms provides you with the knowledge about DSAs that you will need in the professional programming world, without using any complex mathematics or irrelevant information. Whether you are a new developer seeking a basic understanding of the subject or a decision-maker wanting a grasp of algorithms to apply to your projects, this book belongs on your shelf. Quite often, a new, refreshing, and unpretentious approach to a topic is all you need to get inspired. What You'll Learn Understand tree data structures without delving into unnecessary details or going into too much theory Get started learning linear data structures with a basic discussion on computer memory Study an overview of arrays, linked lists, stacks and queues Who This Book Is ForThis book is for beginners, self-taught developers and programmers, and anyone who wants to understand data structures and algorithms but don't want to wade through unnecessary details about quirks of a programming language or don't have time to sit and read a massive book on the subject. This book is also useful for non-technical decision-makers who are curious about how algorithms work.

Information and Coding Theory (Paperback, 2000 ed.): Gareth A. Jones, J.Mary Jones Information and Coding Theory (Paperback, 2000 ed.)
Gareth A. Jones, J.Mary Jones
R1,361 Discovery Miles 13 610 Ships in 18 - 22 working days

This book provides an elementary introduction to Information Theory and Coding Theory - two related aspects of the problem of how to transmit information efficiently and accurately. The first part of the book focuses on Information Theory, covering uniquely decodable and instantaneous codes, Huffman coding, entropy, information channels, and Shannon's Fundamental Theorem. In the second part, on Coding Theory, linear algebra is used to construct examples of such codes, such as the Hamming, Hadamard, Golay and Reed-Muller codes.The book emphasises carefully explained proofs and worked examples; exercises (with solutions) are integrated into the text as part of the learning process. Only some basic probability theory and linear algebra, together with a little calculus (as covered in most first-year university syllabuses), is assumed, making it suitable for second- and third-year undergraduates in mathematics, electronics and computer science.

Computer Media and Communication - A Reader (Paperback, New): Paul Mayer Computer Media and Communication - A Reader (Paperback, New)
Paul Mayer
R1,566 Discovery Miles 15 660 Ships in 18 - 22 working days

Computer Media and Communication: A Reader is a collection of key texts selected for their significance to thought about computers as media. The book is divided into two parts. The chapters in the first part offer a chronological overview of how thinking about computers as a means of communication developed, while the second part offers far-reaching analyses of the implications of computer media for culture and society, while highlighting significant directions of current research. The book not only provides an insight into how thinking about computers as media has developed but also is an excellent guide for students and others interested in the field of media and communication studies. (This book is the first in the Oxford Readers in Media and Communication series under the General Editorship of Professors Brian Winston and Everette Dennis which will be an authoritative wide-ranging series of readings for media students. There are more than eighty institutions in the UK offering courses in the field at present and in the USA this number is ten times as great.)

Acquiring Interpersonal Skills - A Handbook of Experiential Learning for Health Professionals (Paperback, 2 Revised Edition):... Acquiring Interpersonal Skills - A Handbook of Experiential Learning for Health Professionals (Paperback, 2 Revised Edition)
Philip Burnard
R1,395 Discovery Miles 13 950 Ships in 18 - 22 working days

The development of interpersonal skills in all health professions is of increasing interest to a wide range of teachers, students, practioners and managers. This expanded and revised edition, includes further information on reflection and counselling, and provides many activities and exercises to help the reader to devise learning strategies in the interpersonal domain. The author draws on a range of literature and research to provide a guide to teaching and learning interpersonal skills. This guide offers both the theory and practice of how to draw on people's life experience in order to enhance their interpersonal skills. Chapters are included on educational theory, managing learning groups and curriculum design. Short sections called "activities for improving interpersonal skills" provide brief exercises and tips that can further develop skills. Teachers, students, practioners and managers in all health professions should find this book useful in acquiring interpersonal skills.

Error-Correcting Codes and Finite Fields (Paperback, Reprint): Oliver Pretzel Error-Correcting Codes and Finite Fields (Paperback, Reprint)
Oliver Pretzel
R2,122 Discovery Miles 21 220 Ships in 10 - 15 working days

Error correcting codes is an area which has vital importance for the development of signal processing over the next 20 years. The purpose of this book is to provide a theoretical and practical introduction to the subject of error correcting codes. This textbook is a reprint of Chapters 1-20 of the original hardback edition. It provides the reader with the tools necessary to implement modern error-processing schemes, and only a basic knowledge of linear algebra is assumed. More elementary than any of the other books of the same subject, it will be considerably easier for most graduate students to follow. All the necessary mathematics is developed in parallel with the applications. The author has provided a simple step-by-step approach, with worked examples which motivate and explain the theory.

Communication Complexity - and Applications (Hardcover): Anup Rao, Amir Yehudayoff Communication Complexity - and Applications (Hardcover)
Anup Rao, Amir Yehudayoff
R1,398 Discovery Miles 13 980 Ships in 10 - 15 working days

Communication complexity is the mathematical study of scenarios where several parties need to communicate to achieve a common goal, a situation that naturally appears during computation. This introduction presents the most recent developments in an accessible form, providing the language to unify several disjoint research subareas. Written as a guide for a graduate course on communication complexity, it will interest a broad audience in computer science, from advanced undergraduates to researchers in areas ranging from theory to algorithm design to distributed computing. The first part presents basic theory in a clear and illustrative way, offering beginners an entry into the field. The second part describes applications including circuit complexity, proof complexity, streaming algorithms, extension complexity of polytopes, and distributed computing. Proofs throughout the text use ideas from a wide range of mathematics, including geometry, algebra, and probability. Each chapter contains numerous examples, figures, and exercises to aid understanding.

Einfuhrung in die Theorie endlicher Automaten (German, Hardcover, Reprint 2021 ed.): N E B A Kobrinski Einfuhrung in die Theorie endlicher Automaten (German, Hardcover, Reprint 2021 ed.)
N E B A Kobrinski
R3,252 Discovery Miles 32 520 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Inherently Parallel Algorithms in…
D. Butnariu, S. Reich, … Hardcover R4,767 Discovery Miles 47 670
Mac Unlocked - Everything You Need to…
David Pogue Paperback R715 R644 Discovery Miles 6 440
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A. Hardcover R20,961 Discovery Miles 209 610
Navigating Information Literacy - Your…
Theo Bothma, Erica Cosijn, … Paperback R681 Discovery Miles 6 810
Research Methodologies, Innovations and…
Manuel Mora, Ovsei Gelman, … Hardcover R4,529 Discovery Miles 45 290
Information Theory - A Tutorial…
James V Stone Hardcover R1,731 Discovery Miles 17 310
Algorithmic Information Theory for…
Sean D Devine Paperback R763 Discovery Miles 7 630
Geometry, Algebra and Applications: From…
Marco Castrillon Lopez, Luis Hernandez Encinas, … Hardcover R3,837 R3,307 Discovery Miles 33 070
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A. Hardcover R20,967 Discovery Miles 209 670
B C, Before Computers - On Information…
Stephen Robertson Hardcover R1,157 Discovery Miles 11 570

 

Partners