Narrow your search
Listing 1 - 10 of 10
Sort by

Book
Random curves : journeys of a mathematician
Author:
ISBN: 9783540740780 3540740775 9783540740773 3540740783 Year: 2008 Publisher: Berlin : Springer Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math education, the C. P. Snow two-culture problem, and mistreatment of women in academia. The stories speak for themselves and reflect the experiences of a student and later a scientist caught up in the tumultuous events of his generation.


Book
Permutation complexity in dynamical systems : ordinal patterns, permutation entropy and all that
Author:
ISBN: 3642040985 3642040837 1282834533 3642040845 9786612834530 9783642040849 9783642040832 Year: 2010 Publisher: Berlin ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The study of permutation complexity can be envisioned as a new kind of symbolic dynamics whose basic blocks are ordinal patterns, that is, permutations defined by the order relations among points in the orbits of dynamical systems. Since its inception in 2002 the concept of permutation entropy has sparked a new branch of research in particular regarding the time series analysis of dynamical systems that capitalizes on the order structure of the state space. Indeed, on one hand ordinal patterns and periodic points are closely related, yet ordinal patterns are amenable to numerical methods, while periodicity is not. Another interesting feature is that since it can be shown that random (unconstrained) dynamics has no forbidden patterns with probability one, their existence can be used as a fingerprint to identify any deterministic origin of orbit generation. This book is primarily addressed to researchers working in the field of nonlinear dynamics and complex systems, yet will also be suitable for graduate students interested in these subjects. The presentation is a compromise between mathematical rigor and pedagogical approach. Accordingly, some of the more mathematical background needed for more in depth understanding has been shifted into the appendices.


Book
Economics of Information Security and Privacy
Authors: --- --- ---
ISBN: 9781441969675 9781441969668 1441969667 Year: 2010 Publisher: Boston MA Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. Economics of Information Security and Privacy includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered include identity theft, modeling uncertainty's effects, future directions in the economics of information security, economics of privacy, options, misaligned incentives in systems, cyber-insurance, and modeling security dynamics. Economics of Information Security and Privacy is designed for managers, policy makers, and researchers working in the related fields of economics of information security. Advanced-level students focusing on computer science, business management and economics will find this book valuable as a reference.

Algorithmic learning in a random world
Authors: --- ---
ISBN: 1280235217 9786610235216 0387250611 0387001522 1441934715 9780387001524 9780387250618 Year: 2005 Publisher: New York, N.Y. ; [Great Britain] : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Conformal prediction is a valuable new method of machine learning. Conformal predictors are among the most accurate methods of machine learning, and unlike other state-of-the-art methods, they provide information about their own accuracy and reliability. This new monograph integrates mathematical theory and revealing experimental work. It demonstrates mathematically the validity of the reliability claimed by conformal predictors when they are applied to independent and identically distributed data, and it confirms experimentally that the accuracy is sufficient for many practical problems. Later chapters generalize these results to models called repetitive structures, which originate in the algorithmic theory of randomness and statistical physics. The approach is flexible enough to incorporate most existing methods of machine learning, including newer methods such as boosting and support vector machines and older methods such as nearest neighbors and the bootstrap. Topics and Features: * Describes how conformal predictors yield accurate and reliable predictions, complemented with quantitative measures of their accuracy and reliability * Handles both classification and regression problems * Explains how to apply the new algorithms to real-world data sets * Demonstrates the infeasibility of some standard prediction tasks * Explains connections with Kolmogorov’s algorithmic randomness, recent work in machine learning, and older work in statistics * Develops new methods of probability forecasting and shows how to use them for prediction in causal networks Researchers in computer science, statistics, and artificial intelligence will find the book an authoritative and rigorous treatment of some of the most promising new developments in machine learning. Practitioners and students in all areas of research that use quantitative prediction or machine learning will learn about important new methods.

Keywords

Prediction theory. --- Algorithms. --- Stochastic processes. --- Forecasting theory --- Stochastic processes --- Random processes --- Probabilities --- Algorism --- Algebra --- Arithmetic --- Foundations --- Artificial Intelligence (incl. Robotics). --- Artificial intelligence. --- Computer Science. --- Computer science. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer science). --- Statistics and Computing/Statistics Programs. --- Statistics. --- Information Technology --- Artificial Intelligence --- Prévision, Théorie de la --- Algorithmes --- Processus stochastiques --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Mathematical statistics. --- Data structures (Computer scienc. --- Artificial Intelligence. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Sampling (Statistics) --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Statistical methods --- Statistics . --- Statistical analysis --- Statistical data --- Statistical science --- Econometrics


Book
Learn cocoa on the Mac
Authors: --- ---
ISBN: 9781430218609 9781430218593 1430218592 9786612981340 1430218606 128298134X Year: 2010 Publisher: [Berkeley, Calif.] : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Cocoa frameworks are some of the most powerful frameworks for creating native desktop applications available on any platform today, and Apple gives them away, along with the Xcode development environment, for free! However, for a first-time Mac developer, just firing up Xcode and starting to browse the documentation can be a daunting task. The Objective-C class reference documentation alone would fill thousands of printed pages, not to mention all the other tutorials and guides included with Xcode. Where do you start? Which classes are you going to need to use? How do you use Xcode and the rest of the tools? This book answers these questions and more, helping you find your way through the jungle of classes, tools, and new concepts so that you can get started on the next great Mac OS X application today. Jack Nutting is your guide through this forest; he's lived here for years, and he'll show you which boulder to push, which vine to chop, and which stream to float across in order to make it through. You will learn not only how to use the components of this rich framework, but also which of them fit together, and why. Jack Nutting's approach, combining pragmatic problem-solving with a deep respect for the underlying design philosophies contained within Cocoa, stems from years of experience using these frameworks. He'll show you which parts of your application require you to jump in and code a solution, and which parts are best served by letting Cocoa take you where it wants you to go. The path over what looks like a mountain of components and APIs has never been more thoroughly prepared for your travels. With Jack's guidance, the steep learning curve becomes a pleasurable adventure. There is still much work for the uninitiated, but by the time you're done, you will be well on your way to becoming a Cocoa master.


Book
Preferences and similarities
Authors: --- ---
ISBN: 9783211854327 3211854312 9783211854310 9786612330841 1282330845 3211854320 Year: 2008 Publisher: Wien ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impact of vagueness, imprecision, uncertainty and dominance on human and agent information, communication, planning, decision, action, and control as well as by the technical progress of the information technology itself. The topics treated in this book are of interest to computer scientists, statisticians, operations researchers, experts in AI, cognitive psychologists and economists.

Keywords

Computer Science. --- Data Structures, Cryptology and Information Theory. --- Operations Research/Decision Theory. --- Computer science. --- Data structures (Computer science). --- Informatique --- Structures de données (Informatique) --- Decision making. --- Fuzzy logic. --- Production planning. --- Computer Science --- Mathematical Statistics --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Databases. --- Embedded computer systems. --- Nonlinear logic --- Embedded systems (Computer systems) --- Data banks --- Data bases --- Databanks --- Database systems --- Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Manufacturing planning --- Process planning --- Decision making --- Operations research. --- Operation Research/Decision Theory. --- Choice (Psychology) --- Problem solving --- Planning --- Production engineering --- Fuzzy mathematics --- Logic, Symbolic and mathematical --- Fuzzy systems --- Computer systems --- Architecture Analysis and Design Language --- Computer files --- Electronic information resources --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science)

Multimedia technologies and applications for the 21st century : visions of world experts
Author:
ISBN: 0792380746 1441950222 0585287678 Year: 1998 Publisher: New York : Springer Science+Business Media, LLC,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Multimedia Technologies and Applications for the 21st Century: Visions of World Experts presents contributions from leading researchers and experts describing their current research and their views of the future trends in the field. The book consists of thirteen chapters in five parts. These chapters tackle a number of critical issues in distributed multimedia systems and applications - from VLSI processors that support multimedia and multimedia servers, through multimedia databases and multimedia networks and communications, to merging multimedia applications. Only a few years ago multimedia seemed like a brand new research field and an emerging new industry. Today, at the edge of the 21st century, multimedia research is coming of age, and the multimedia industry has significantly grown with the total market estimated to be about $50 billion. Several years ago it was felt that the digital media revolution had just started; however, the seeds had been sown long before. Fundamental technologies, such as interactive laser disks, video games, and electronic encyclopedias were invented in the 1970s and 80s. They represented the seeds for current `hot' applications, such as digital libraries, video-on-demand, interactive television, and videoconferencing. Another aspect of the digital media revolution is the formation of a new media industry composed of computer, entertainment, communication, and consumer electronics companies. Many industry segments are currently involved in creating new products and services, positioning themselves for the 21st century. They include telephone, cable, and satellite TV companies, communication equipment companies, TV and radio broadcasters, on-line Internet service providers, cable channels, movie studios, record companies, book publishers, CD-ROM title creators, Internet tool vendors, multimedia software tools companies, computer companies, general software tools companies, computer add-on vendors, semiconductor vendors, and consumer electronics vendors. Multimedia Technologies and Applications for the 21st Century: Visions of World Experts should stimulate the curiosity of its readers and inspire new technological breakthroughs in this exciting field. It serves as a valuable reference for system designers, engineers, programmers, and managers who are involved in multimedia systems, the Internet, and their applications. This book can also be used as a textbook for advanced courses on multimedia in engineering curricula.

Keywords

Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Multimedia information systems. --- Application software. --- Computer Science. --- Computer Applications. --- Multimedia Information Systems. --- Computer Communication Networks. --- Data Structures, Cryptology and Information Theory. --- Computer Science, general. --- Multimedia systems. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Informatics --- Science --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Distributed processing

Ontological engineering : with examples from the areas of knowledge management, e-commerce and the semantic Web
Authors: --- ---
ISBN: 1852335513 9786610189458 1280189452 1852338407 Year: 2004 Publisher: London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Ontological Engineering refers to the set of activities that concern the ontology development process, the ontology life cycle, the methods and methodologies for building ontologies, and the tool suites and languages that support them. During the last decade, increasing attention has been focused on ontologies and Ontological Engineering. Ontologies are now widely used in Knowledge Engineering, Artificial Intelligence and Computer Science; in applications related to knowledge management, natural language processing, e-commerce, intelligent integration information, information retrieval, integration of databases, b- informatics, and education; and in new emerging fields like the Semantic Web. Primary goals of this book are to acquaint students, researchers and developers of information systems with the basic concepts and major issues of Ontological Engineering, as well as to make ontologies more understandable to those computer science engineers that integrate ontologies into their information systems. We have paid special attention to the influence that ontologies have on the Semantic Web. Pointers to the Semantic Web appear in all the chapters, but specially in the chapter on ontology languages and tools.


Book
Understanding Cryptography : A Textbook for Students and Practitioners
Authors: ---
ISBN: 9783642041013 9783642041006 3642041000 3642041019 3642446493 9786613563170 1280385251 Year: 2010 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Keywords

Computer Science. --- Data Structures, Cryptology and Information Theory. --- Circuits and Systems. --- Systems and Data Security. --- Computer science. --- Data protection. --- Data structures (Computer science). --- Systems engineering. --- Informatique --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Ingénierie des systèmes --- Cryptography. --- Cryptography --- Data encryption (Computer science) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Mathematics. --- Cryptography -- Mathematics. --- Data encryption (Computer science). --- Electronic books. -- local. --- Book Studies & Arts --- Computer Science --- Engineering & Applied Sciences --- Education --- Social Sciences --- Mathematics --- Computer programming. --- Computer security. --- Electrical engineering. --- Electronic circuits. --- Programming Techniques. --- Communications Engineering, Networks. --- Data structures (Computer scienc. --- Telecommunication. --- Data Structures and Information Theory. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Electric engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Programming --- Data structures (Computer science)

Infinite matrices of operators
Author:
ISBN: 0387097635 1441935304 9786611875749 1281875740 0387097643 3540097635 3540386513 3540097643 3540389466 9783540097648 Year: 1980 Volume: 786 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ease of access, relative anonymity, and borderless nature of the Internet has allowed widespread computer-based crime – or cybercrime – to proliferate rapidly. Law enforcement and international security organizations, along with governments and the private sector, have only recently begun to appreciate the scope, severity and transnational nature of this problem. In recent years, organizations have begun to emerge and evolve in a progressively collaborative ecosystem of vested international bodies seeking to address these challenges in unique, innovative ways. This study attempts to address a series of questions regarding the current state of cyber security. What does the international landscape of cyber security look like today? What are these organizations actually doing? Are they succeeding? What measureable progress has been made in developing a supportive ecosystem of global cyber security? Are these organizations presenting practical, innovative, collaborative, and sustainable solutions to address these issues? Global Initiatives to Secure Cyberspace: An Emerging Landscape is designed for a professional audience composed of researchers, practitioners and the government, focusing on a secure cyberspace industry. Advanced-level students in computer science will also find this book suitable. .

Keywords

Cartography --Data processing --Congresses. --- Computer graphics --Congresses. --- Image processing --Congresses. --- Optical data processing --Congresses. --- Computer security --- Computer networks --- Cyberterrorism --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Security measures --- Prevention --- Computer security. --- Security measures. --- Prevention. --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer network security --- Network security, Computer --- Security of computer networks --- Protection of computer systems --- Protection --- 681.3*I42 --- #TCPW P4.5 --- 681.3*I33 --- Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Database management: security integrity protection--See also {?681.5*E5} --- Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I34 Graphics utilities: picture desciption languages software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning display algorithms viewing algorithms (Computer graphics) --- 681.3*H2m Database management: security integrity protection--See also {?681.5*E5} --- 681.3*I42 Compression (coding): approximate methods exact coding (Image processing)--See also {681.3*E4} --- Infinite matrices. --- Summability theory. --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Data Structures, Cryptology and Information Theory. --- Computer Systems Organization and Communication Networks. --- Information systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Informatics --- Science --- Distributed processing --- #TCPW P4.0 --- #TCPW P4.2 --- 681.3*A0 --- 681.3*H2m --- 681.3*I34 --- 681.3*I34 Graphics utilities: picture desciption languages; software support (Computer graphics) --- Graphics utilities: picture desciption languages; software support (Computer graphics) --- 681.3*I33 Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- Picture/image generation: digitizing and scanning; display algorithms; viewing algorithms (Computer graphics) --- 681.3*A0 General --- General --- 681.3*I42 Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- 681.3*H2m Database management: security; integrity; protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- Operator theory --- Computer crimes --- Terrorism --- Operator theory. --- Computer graphics --- Cartography --- Infographie --- Cartographie --- Data processing --- Informatique --- Data structures (Computer scienc. --- Computer network architectures. --- Cryptology. --- Data Structures and Information Theory. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer vision. --- Models and Principles. --- Image Processing and Computer Vision. --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Matrices. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Matrices --- Théorèmes taubériens --- Suites et series --- Sommabilite

Listing 1 - 10 of 10
Sort by