Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Mathematical control systems --- Coding theory --- Data compression (Telecommunication) --- Codage --- Données --- Compression (Télécommunications) --- 621.391.3 --- 681.3*I42 --- Transmission of electric signals by conduction --- Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- Coding theory. --- Data compression (Telecommunication). --- 681.3*I42 Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- 621.391.3 Transmission of electric signals by conduction --- Données --- Compression (Télécommunications) --- Compression of data (Telecommunication) --- Data compression (Computer science) --- Data transmission systems --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming
Choose an application
Coding theory --- Image processing --- Signal processing --- Standards. --- Digital techniques --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Computer programming --- Standards --- Digital techniques&delete&
Choose an application
Although graph theory, design theory, and coding theory had their origins in various areas of applied mathematics, today they are to be found under the umbrella of discrete mathematics. Here the authors have considerably reworked and expanded their earlier successful books on graphs, codes and designs, into an invaluable textbook. They do not seek to consider each of these three topics individually, but rather to stress the many and varied connections between them. The discrete mathematics needed is developed in the text, making this book accessible to any student with a background of undergraduate algebra. Many exercises and useful hints are included througout, and a large number of references are given.
Combinatorial designs and configurations. --- Coding theory. --- Graph theory. --- Graph theory --- Graphs, Theory of --- Theory of graphs --- Combinatorial analysis --- Topology --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Configurations and designs, Combinatorial --- Designs and configurations, Combinatorial --- Extremal problems
Choose an application
This book constitutes the refereed postworkshop proceedings of the Fourth Canadian Workshop on Information Theory, held in Lac Delage, Quebec, in May 1995. The book contains 18 revised full papers selected from 30 workshop presentations; also included are three invited contributions. The book is divided into sections on algebraic coding, cryptography and secure communications, decoding methods and techniques, coding and modulation for fading channels, and signal processing and pattern recognition.
Information theory --- Congresses --- Coding theory --- Cryptography --- Computer vision. --- Coding theory. --- Data encryption (Computer science). --- Computer software. --- Combinatorics. --- Signal, Image and Speech Processing. --- Image Processing and Computer Vision. --- Coding and Information Theory. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Combinatorics --- Algebra --- Mathematical analysis --- Software, Computer --- Computer systems --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Data compression (Telecommunication) --- Digital electronics --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems
Choose an application
Digital video --- Video compression --- 681.3*I42 --- Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- 681.3*I42 Compression (coding): approximate methods; exact coding (Image processing)--See also {681.3*E4} --- Coding theory --- Video data compression --- Image compression --- Digital motion video --- PC video --- Video, Digital --- Computer graphics --- Digital media --- Image processing --- Multimedia systems --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Digital techniques
Choose an application
This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996. The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.
Computers --- Ordinateurs --- Access control --- Passwords --- Congresses --- Accès --- Contrôle --- Mots de passe --- Congrès --- Congresses. --- Accès --- Contrôle --- Congrès --- Information theory. --- Data encryption (Computer science). --- Software engineering. --- Computer software. --- Coding theory. --- Combinatorics. --- Theory of Computation. --- Cryptology. --- Software Engineering/Programming and Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Combinatorics --- Algebra --- Mathematical analysis --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Software, Computer --- Computer systems --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics --- Computers - Access control - Passwords - Congresses.
Choose an application
This book constitutes the refereed proceedings of the 1996 International Zurich Seminar on Digital Communications, IZS'96, held in Zurich, Switzerland, in February 1996 and focusing on broadband communications. The 26 revised papers were selected from a total of some 70 submissions and give a snapshot of the state of the art in broadband communications. The book is divided into sections on broadband network architectures, designing for quality of service guarantees, protocol support for multimedia/multipoint services, traffic modeling and performance evaluation, fairness in resource allocation, applications, server functions in ATM, satellite and wireless networks, broadband access and switching, and acceptance and congestion control.
Broadband communication systems --- Congresses. --- Congresses --- Computer Communication Networks. --- Telecommunication. --- Coding theory. --- Software engineering. --- Data transmission systems. --- Computer science. --- Communications Engineering, Networks. --- Coding and Information Theory. --- Special Purpose and Application-Based Systems. --- Input/Output and Data Communications. --- Models and Principles. --- Informatics --- Science --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems --- Computer software engineering --- Engineering --- Data compression (Telecommunication) --- Digital electronics --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Broadband communication systems - Congresses.
Choose an application
This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
Computer security --- Cryptography --- Congresses. --- Congresses --- Computer security. --- Data encryption (Computer science). --- Database management. --- Coding theory. --- Combinatorics. --- Computer Communication Networks. --- Systems and Data Security. --- Cryptology. --- Database Management. --- Coding and Information Theory. --- Combinatorics --- Algebra --- Mathematical analysis --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer security - Congresses --- Cryptography - Congresses.
Listing 1 - 8 of 8 |
Sort by
|