![]() |
Klassifikation mit Support Vektor Maschinen
ISBN: 9783640674275 / Niemiecki / Miękka / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Diplomarbeit aus dem Jahr 1998 im Fachbereich Informatik - Theoretische Informatik, Note: 1,5, Universitat Ulm, Sprache: Deutsch, Abstract: Im Rahmen dieser Arbeit werden nichtlineare Support Vektor Maschinen im Bereich der Mehrklassen-Mustererkennung untersucht. Ein Punkt der Untersuchungen ist die Multiklassendiskriminierung durch Kombination binarer SV-Klassifikatoren. Diese Kombination kann durch paarweise Klassifikatoren und der Klassifikation, einer Klasse gegen alle anderen erreicht werden. Weiterhin wird untersucht, wie hochdimensionale Datensatze mit Standardsoftware fur quadratische...
Diplomarbeit aus dem Jahr 1998 im Fachbereich Informatik - Theoretische Informatik, Note: 1,5, Universitat Ulm, Sprache: Deutsch, Abstract: Im Rahmen ...
|
cena:
271,73 |
![]() |
Kryptografie in Theorie Und Praxis: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld
ISBN: 9783834809773 / Niemiecki / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlusselung und Authentifikation, symmetrische Algorithmen und Public-Key-Verfahren werden entsprechend ihrer Wichtigkeit prasentiert. Das Buch hat den Umfang einer 2-semestrigen Vorlesung, aufgrund seiner klaren Darstellung eignet es sich aber auch hervorragend zum Selbststudium. Zahlreiche Ubungsaufgaben von unterschiedlichem Schwierigkeitsgrad...
Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. D...
|
cena:
190,29 |
![]() |
Komplexe Strukturen: Entropie Und Information
ISBN: 9783815430323 / Niemiecki / Twarda / 265 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Erforschung komplexer Strukturen ist gegenwartig eines der interessantesten wissenschaftlichen Themen. Dieses Buch behandelt Moglichkeiten der Beschreibung und quantitativen Charakterisierung komplexer Strukturen mit Hilfe verschiedener Entropie- und Informationsmae. Nach einer allgemein verstandlichen Einfuhrung der Grundbegriffe werden die fur eine quantitative Analyse erforderlichen Konzepte ausfuhrlich behandelt und an zahlreichen Beispielen, wie Zeitreihen, Biosequenzen, literarischen Texten und Musikstucken, veranschaulicht.
Die Erforschung komplexer Strukturen ist gegenwartig eines der interessantesten wissenschaftlichen Themen. Dieses Buch behandelt Moglichkeiten der Bes...
|
cena:
228,38 |
![]() |
Intelligent Data Interchange (IDI): Interventionsfreier Gesch?sdatenaustausch Durch Wissensrepräsentation Und Ontologisches Matching
ISBN: 9783834812926 / Niemiecki / Miękka / 397 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Andre Kohler entwickelt eine Architektur fur den intelligenten Geschaftsdatenaustausch (IDI), die es Unternehmen ermoglicht, strukturierte Geschaftsdokumente ad hoc und mit unbekannten Partnern austauschen zu konnen. Zentrale Bestandteile dieser Architektur sind Ontologien und semantische Matchingverfahren, die von sogenannten IDI-Agenten zur Interpretation von Geschaftsdokumenten sowie zur Protokollvereinbarung genutzt werden.
Andre Kohler entwickelt eine Architektur fur den intelligenten Geschaftsdatenaustausch (IDI), die es Unternehmen ermoglicht, strukturierte Geschaftsdo...
|
cena:
315,90 |
![]() |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings
ISBN: 9783642174544 / Angielski / Miękka / 467 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
|
cena:
203,61 |
![]() |
The Codes of Life: The Rules of Macroevolution
ISBN: 9789048176113 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics. The book's 18 chapters present a range of experimental evidence which suggests that the genetic code was only the first in a long series of organic codes, and that it has been the appearance of new codes - organic, mental and cultural - that paved the way for the major transitions in the history of life. While the... Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading name... |
cena:
1018,20 |
![]() |
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings
ISBN: 9783642176180 / Angielski / Miękka / 355 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program...
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The co...
|
cena:
203,61 |
![]() |
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
ISBN: 9783642184048 / Angielski / Miękka / 317 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held i...
|
cena:
203,61 |
![]() |
An Introduction to Mathematical Cryptography
ISBN: 9781441926746 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long history of secret c- munications. It is hard to overestimate the importance of public key cr- tosystems and their associated digital signature schemes in the modern world of computers and the Internet. This book provides an introduction to the theory of public key cryptography and to the mathematical ideas underlying that theory. Public key cryptography draws on many areas of mathematics, including number...
ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman ...
|
cena:
203,61 |
![]() |
Preferences and Similarities
ISBN: 9783211999417 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impact of vagueness, imprecision, uncertainty and dominance on human and agent information, communication, planning, decision, action, and control as well as by the technical progress of the information technology itself. The topics treated in this book are of interest to computer scientists, statisticians, operations researchers, experts in AI, cognitive psychologists and economists. The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impa... |
cena:
610,90 |
![]() |
Securing Emerging Wireless Systems: Lower-Layer Approaches
ISBN: 9781441946935 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a... Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the... |
cena:
407,25 |
![]() |
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings
ISBN: 9783642101762 / Angielski / Miękka / 444 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long...
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a...
|
cena:
407,25 |
![]() |
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security
ISBN: 9783642096884 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume... Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide secur... |
cena:
203,61 |
![]() |
Fractal Image Encoding and Analysis
ISBN: 9783642083242 / Angielski / Miękka / 370 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. This book, originating from a NATO Advanced Study Institute held in 1995, presents work by leading researchers. It is developing the subjects at an introductory level, but it also has some recent and exciting results in both fields.
The book contains a thorough discussion of fractal image compression and decompression, including both continuous and discrete formulations, vector space and hierarchical methods, and algorithmic optimizations. The book also discusses multifractal approaches... The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. This book, originating from a NATO Advanced St...
|
cena:
814,55 |
![]() |
Public-Key Cryptography
ISBN: 9783642082542 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be...
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications...
|
cena:
203,61 |
![]() |
Power Analysis Attacks: Revealing the Secrets of Smart Cards
ISBN: 9781441940391 / Angielski / Miękka / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how... Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mo... |
cena:
733,09 |
![]() |
Database Machines: International Workshop Munich, September 1983
ISBN: 9783540129592 / Angielski / Miękka / 344 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The International Workshop on Database Machines in Munich is the third of its kind, preceeded by the meetings in Florence (Sept. 81) and San Diego (Sept. 82). The workshop is aimed at providing an interchange of ideas and experience on computer systems designed to perform database operations more efficiently than general purpose computers with a software database management system. Many proposals have been published during the past 10 years, but now several systems have been built and practically implemented and some are even commercially available, so that confrontation with the real world...
The International Workshop on Database Machines in Munich is the third of its kind, preceeded by the meetings in Florence (Sept. 81) and San Diego (Se...
|
cena:
544,24 |
![]() |
Game Start!: Strumenti Per Comprendere I Videogiochi
ISBN: 9788847019553 / Włoski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Un manuale di riferimento per chi desidera avvicinarsi al mondo dei videogiochi non solo come fruitore esperto ma, soprattutto, come potenziale creatore di contenuti. E' suddiviso in 6 sezioni: 1) storia ed evoluzione del linguaggio videoludico; 2) l'interfaccia grafica e sistema di controllo; 3) gioco, apprendimento, intrattenimento; 4) applicazioni di Game Design (regole, ambiente, personaggi); 5) interactive storytelling; 6) produzione e mercato dei videogiochi. Le singole sezioni sono pensate come indipendenti. Il volume puo essere arricchito da screenshot di gioco.
Un manuale di riferimento per chi desidera avvicinarsi al mondo dei videogiochi non solo come fruitore esperto ma, soprattutto, come potenziale creato...
|
cena:
114,00 |
![]() |
Persistente Objektsysteme: Integrierte Datenbankentwicklung und Programmerstellung
ISBN: 9783540565819 / Niemiecki / Miękka / 241 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Persistente Objektsysteme sind Softwaresysteme, die ihren Benutzern einen flexiblen und problemad{quaten Zugriff auf gro e und komplex verkn}pfte Mengen von langlebig gespeicherten Datenobjekten gestatten. In diesem Buch wird im Detail die persistente polymorphe Programmierumgebung Tycoon beschrieben, die eine Verbesserung der Qualit{t persistenter Objektsysteme dadurch erreicht, da der Anteil der stereotypen, untypisierten Programmiert{tigkeiten im Vergleich zu C, Modula 2 oder C++ L-sungen erheblich reduziert wird. Gleichzeitig gestattet Tycoon dieflexible Anbindung externer generischer...
Persistente Objektsysteme sind Softwaresysteme, die ihren Benutzern einen flexiblen und problemad{quaten Zugriff auf gro e und komplex verkn}pfte Meng...
|
cena:
209,31 |
![]() |
A Classical Introduction to Cryptography Exercise Book
ISBN: 9781441939128 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
|
cena:
175,10 |