Listing 1 - 10 of 19 | << page >> |
Sort by
|
Choose an application
Orthogonal designs have proved fundamental to constructing code division multiple antenna systems for more efficient mobile communications. Starting with basic theory, this book develops the algebra and combinatorics to create new communications modes. Intended primarily for researchers, it is also useful for graduate students wanting to understand some of the current communications coding theories.
Mathematics. --- Matrix theory. --- Algebra. --- Computer mathematics. --- Combinatorics. --- Linear and Multilinear Algebras, Matrix Theory. --- Signal, Image and Speech Processing. --- Computational Mathematics and Numerical Analysis. --- Orthogonal polynomials --- Data processing. --- Fourier analysis --- Functions, Orthogonal --- Polynomials --- Computer science --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Combinatorics --- Algebra --- Mathematical analysis --- Mathematics --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Choose an application
Orthogonal designs have proved fundamental to constructing code division multiple antenna systems for more efficient mobile communications. Starting with basic theory, this book develops the algebra and combinatorics to create new communications modes. Intended primarily for researchers, it is also useful for graduate students wanting to understand some of the current communications coding theories.
Algebra --- Discrete mathematics --- Mathematics --- Computer. Automation --- beeldverwerking --- algebra --- matrices --- spraaktechnologie --- discrete wiskunde --- informatica --- externe fixatie (geneeskunde --- wiskunde --- signaalverwerking
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses --- Congrès --- -Cryptography --- -681.3*E3 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security measures --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cyber security --- Cybersecurity --- Sécurité informatique --- Congrès --- Protection of computer systems --- Protection --- 681.3*E3 --- Computer security - Congresses. --- Cryptography - Congresses.
Choose an application
Computers --- Access control --- Congresses --- Cryptography
Choose an application
#TELE:COSIC --- cryptografie --- Computer. Automation --- Computers --- Cryptography --- Access control --- Computers - Access control
Choose an application
Discrete mathematics --- 519.1 <061.3> --- 519.1 --- Combinatorics. Graph theory--?<061.3> --- Combinatorics. Graph theory --- Conferences - Meetings --- Combinatorial analysis --- Congresses. --- 519.1 Combinatorics. Graph theory --- 519.1 <061.3> Combinatorics. Graph theory--?<061.3> --- Analyse combinatoire
Choose an application
Algebra --- Forms, Quadratic --- 519.1 --- Hadamard matrices --- Combinatorial analysis --- Combinatorial designs and configurations --- Matrices --- Quadratic forms --- Diophantine analysis --- Forms, Binary --- Number theory --- Combinatorics. Graph theory --- 519.1 Combinatorics. Graph theory --- Hadamard, Matrices d' --- Hadamard, Matrices d'. --- Hadamard matrices. --- Analyse combinatoire --- Formes quadratiques
Choose an application
The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.
Computer security --- Data protection --- Privacy, Right of --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Management of Computing and Information Systems. --- Operating Systems. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computers and Society. --- Information Systems. --- Computer software. --- Cryptology. --- Informatics --- Science --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Foundations --- Distributed processing --- Communication systems --- Computer security - Congresses --- Data protection - Congresses --- Privacy, Right of - Congresses --- Data encryption (Computer science) --- Operating systems (Computers) --- Computer networks.
Choose an application
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.
Ergodic theory. Information theory --- Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken --- informatietheorie
Choose an application
Ergodic theory. Information theory --- Office management --- Applied marketing --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- e-business --- informatica --- bedrijfsadministratie --- e-commerce --- computerbeveiliging --- informatica management --- informatietheorie
Listing 1 - 10 of 19 | << page >> |
Sort by
|