Listing 1 - 10 of 80 | << page >> |
Sort by
|
Choose an application
Choose an application
Data compression (Computer science) --- Compression of data (Computer science) --- Compression of files (Computer science) --- Compression of text (Computer science) --- File compression (Computer science) --- Text compression (Computer science) --- Coding theory --- Database management --- File organization (Computer science) --- Data compression (Telecommunication)
Choose an application
This book investigates the permutation polynomial (PP) based interleavers for turbo codes, including all the main theoretical and practical findings related to topics such as full coefficient conditions for PPs up to fifth; the number of all true different PPs up to fifth degree; the number of true different PPs under Zhao and Fan sufficient conditions, for any degree (with direct formulas or with a simple algorithm); parallel decoding of turbo codes using PP interleavers by butterfly networks; upper bounds of the minimum distance for turbo codes with PP interleavers; specific methods to design and find PP interleavers with good bit/frame error rate (BER/FER) performance. The theoretical results are explained in great detail to enhance readers’ understanding. The book is intended for engineers in the telecommunications field, but the chapters dealing with the PP coefficient conditions and with the number of PP are of interest to mathematicians working in the field.
Turbo codes (Telecommunication) --- Telecommunication. --- Coding theory. --- Mathematics. --- Communications Engineering, Networks. --- Coding and Information Theory. --- Information and Communication, Circuits. --- Math --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Electrical engineering. --- Information theory. --- Communication theory --- Cybernetics --- Electric engineering --- Engineering
Choose an application
The fifth volume of Rudolf Ahlswede’s lectures on Information Theory focuses on several problems that were at the heart of a lot of his research. One of the highlights of the entire lecture note series is surely Part I of this volume on arbitrarily varying channels (AVC), a subject in which Ahlswede was probably the world's leading expert. Appended to Part I is a survey by Holger Boche and Ahmed Mansour on recent results concerning AVC and arbitrarily varying wiretap channels (AVWC). After a short Part II on continuous data compression, Part III, the longest part of the book, is devoted to distributed information. This Part includes discussions on a variety of related topics; among them let us emphasize two which are famously associated with Ahlswede: "multiple descriptions", on which he produced some of the best research worldwide, and "network coding", which had Ahlswede among the authors of its pioneering paper. The final Part IV on "Statistical Inference under Communication constraints" is mainly based on Ahlswede’s joint paper with Imre Csiszar, which received the Best Paper Award of the IEEE Information Theory Society. The lectures presented in this work, which consists of 10 volumes, are suitable for graduate students in Mathematics, and also for those working in Theoretical Computer Science, Physics, and Electrical Engineering with a background in basic Mathematics. The lectures can be used either as the basis for courses or to supplement them in many ways. Ph.D. students will also find research problems, often with conjectures, that offer potential subjects for a thesis. More advanced researchers may find questions which form the basis of entire research programs.
Information theory. --- Mathematics. --- Telecommunication. --- Coding theory. --- Information and Communication, Circuits. --- Communications Engineering, Networks. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Math --- Science --- Electrical engineering. --- Electric engineering --- Engineering --- Communication theory --- Cybernetics
Choose an application
This book focuses on information geometry manifolds of structured data/information and their advanced applications featuring new and fruitful interactions between several branches of science: information science, mathematics and physics. It addresses interrelations between different mathematical domains like shape spaces, probability/optimization & algorithms on manifolds, relational and discrete metric spaces, computational and Hessian information geometry, algebraic/infinite dimensional/Banach information manifolds, divergence geometry, tensor-valued morphology, optimal transport theory, manifold & topology learning, and applications like geometries of audio-processing, inverse problems and signal processing.The book collects the most important contributions to the conference GSI’2017 – Geometric Science of Information.
Geometry, Differential --- Data processing. --- Telecommunication. --- Coding theory. --- Global analysis. --- Communications Engineering, Networks. --- Coding and Information Theory. --- Global Analysis and Analysis on Manifolds. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Electrical engineering. --- Information theory. --- Global analysis (Mathematics). --- Manifolds (Mathematics). --- Communication theory --- Cybernetics --- Electric engineering --- Engineering --- Topology --- Analysis, Global (Mathematics) --- Differential topology --- Functions of complex variables --- Geometry, Algebraic
Choose an application
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
Computer security. --- Data encryption (Computer science). --- Coding theory. --- Systems and Data Security. --- Cryptology. --- Coding and Information Theory. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
Stationarity is a very general, qualitative assumption, that can be assessed on the basis of application specifics. It is thus a rather attractive assumption to base statistical analysis on, especially for problems for which less general qualitative assumptions, such as independence or finite memory, clearly fail. However, it has long been considered too general to be able to make statistical inference. One of the reasons for this is that rates of convergence, even of frequencies to the mean, are not available under this assumption alone. Recently, it has been shown that, while some natural and simple problems, such as homogeneity, are indeed provably impossible to solve if one only assumes that the data is stationary (or stationary ergodic), many others can be solved with rather simple and intuitive algorithms. The latter include clustering and change point estimation among others. In this volume these results are summarize. The emphasis is on asymptotic consistency, since this the strongest property one can obtain assuming stationarity alone. While for most of the problem for which a solution is found this solution is algorithmically realizable, the main objective in this area of research, the objective which is only partially attained, is to understand what is possible and what is not possible to do for stationary time series. The considered problems include homogeneity testing (the so-called two sample problem), clustering with respect to distribution, clustering with respect to independence, change point estimation, identity testing, and the general problem of composite hypotheses testing. For the latter problem, a topological criterion for the existence of a consistent test is presented. In addition, a number of open problems is presented.
Time-series analysis. --- Analysis of time series --- Autocorrelation (Statistics) --- Harmonic analysis --- Mathematical statistics --- Probabilities --- Artificial intelligence. --- Coding theory. --- Artificial Intelligence. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes the proceedings of the 6th International Conference on Cryptology and Security in Latin America, LATINCRYPT 2019, held in Santiago di Chile, Chile, in October 2019. The 18 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptoanalysis, symmetric cryptography, ide-channel cryptography, post-quantum cryptography, signatures and protocols, and implementation.
Data encryption (Computer science). --- Computer network architectures. --- Coding theory. --- Cryptology. --- Computer Systems Organization and Communication Networks. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data encryption (Computer science) --- Computer organization. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Organization, Computer --- Electronic digital computers
Choose an application
"Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct arguments that are made up of logical procedures and express both implicit and explicit claims as to how a given program operates. Building on current scholarly work in digital rhetoric, software studies, and technical communication, Brock connects and continues ongoing conversations among rhetoricians, technical communicators, software studies scholars, and programming practitioners to demonstrate how software code and its surrounding discourse are highly rhetorical forms of communication. He considers examples ranging from large, well-known projects like Mozilla Firefox to small-scale programs like the "FizzBuzz" test common in many programming job interviews. Undertaking specific examinations of code texts as well as the contexts surrounding their composition, Brock illuminates the variety and depth of rhetorical activity taking place in and around code, from individual differences in style to changes in large-scale organizational and community norms. Rhetorical Code Studies holds significant implications for digital communication, multimodal composition, and the cultural analysis of software and its creation. It will interest academics and students of writing, rhetoric, and software engineering as well as technical communicators and developers of all types of software."
Coding theory. --- Rhetoric --- Software engineering --- Computer algorithms --- Online social networks. --- Data processing. --- Psychological aspects. --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Algorithms --- Computer software engineering --- Engineering --- Language and languages --- Speaking --- Authorship --- Expression --- Literary style --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software --- Computer programs. --- Social aspects. --- Software, Computer --- Computer systems --- Information technology: general issues --- Computer programming / software development --- Programming & scripting languages: general --- Media
Choose an application
This book constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Body Area Networks, BodyNets 2019, held in Florence, Italy, in October 2019. The 27 papers presented were selected from 54 submissions and issue new technologies to provide trustable measuring and communications mechanisms from the data source to medical health databases. Wireless body area networks (WBAN) are one major element in this process. Not only on-body devices but also technologies providing information from inside a body are in the focus of this conference. Dependable communications combined with accurate localization and behavior analysis will benefit WBAN technology and make the healthcare processes more effective.
Health informatics. --- Computer organization. --- Coding theory. --- Information theory. --- Health Informatics. --- Computer Systems Organization and Communication Networks. --- Coding and Information Theory. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Organization, Computer --- Electronic digital computers --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Medicine --- Data processing --- Body area networks (Electronics) --- Medical informatics --- Coding theory --- Computer organization --- BANs (Body area networks) --- WBANs (Wireless body area networks) --- Wireless body area networks (Electronics) --- Wireless sensor networks
Listing 1 - 10 of 80 | << page >> |
Sort by
|