![]() |
Spectrum Estimation and System Identification
ISBN: 9781461383208 / Angielski / Miękka / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to ways of characterizing the mechanism or system behind the observed sig nal/data. Such an identification allows one to predict the system outputs, and as a result this has considerable impact in several areas such as speech processing, pattern recognition, target identification, seismology, and signal processing. A new outlook to spectrum estimation and system identification is pre sented here by making use of the powerful concepts of positive...
Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to w...
|
cena:
402,53 |
![]() |
Relative Information: Theories and Applications
ISBN: 9783642840197 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usually referred to as Shannon entropy. Since the publication of Shannon's seminal paper in 1948, the theory has grown extremely rapidly and has been applied with varied success in almost all areas of human endeavor. At this time, the Shannon information theory is a well established and developed body of knowledge. Among its most significant recent contributions have been the use of the complementary principles of minimum and maximum entropy in...
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usu...
|
cena:
201,24 |
![]() |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
ISBN: 9781461454151 / Angielski / Twarda / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling... Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ... |
cena:
402,53 |
![]() |
Formal Languages and Computation: Models and Their Applications
ISBN: 9781466513457 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applications in computer science. It covers all rudimental topics concerning formal languages and their models, especially grammars and automata, and sketches the basic ideas underlying the theory of computation, including computability, decidability, and computational complexity. Emphasizing the relationship between theory and application, the book describes many real-world applications, including computer science engineering techniques for language... Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applica... |
cena:
489,72 |
![]() |
Multimedia Information Storage and Management
ISBN: 9781461286226 / Angielski / Miękka / 484 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interface. The large size of multimedia data and the high bandwidth requirement of multime- dia streams require new storage, buffering, delivery, and networking schemes. The presentational nature of multimedia applications requires a proper syn- chronization between multimedia streams, and the composition of multimedia documents in the distributed environment should overcome the heterogeneity of underlying systems. This book is edited for...
Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interf...
|
cena:
805,10 |
![]() |
The Maximum Entropy Method
ISBN: 9783642644849 / Angielski / Miękka / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal publication, this principle has been adopted in many areas of science and technology beyond its initial application. It is now found in spectral analysis, image restoration and a number of branches ofmathematics and physics, and has become better known as the Maximum Entropy Method (MEM). Today MEM is a powerful means to deal with ill-posed problems, and much research work is devoted to it. My own research in the area ofMEM started in 1980,...
Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal...
|
cena:
402,53 |
![]() |
Are there fundamental principles in Geographic Information Science?: Tobler Lecture Event 2012 of the Association of American Geographers Geographic I
ISBN: 9781478213628 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in Geographic Information Science (GIScience). Michael Goodchild offers an afterword and Waldo Tobler contributes a preface. The book is intended for advanced undergraduate and graduate student readers.
This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in...
|
cena:
70,81 |
![]() |
Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings
ISBN: 9783642341281 / Angielski / Miękka / 506 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Ho...
|
cena:
201,24 |
![]() |
Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proc
ISBN: 9783642341342 / Angielski / Miękka / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012.
Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in T...
|
cena:
201,24 |
![]() |
Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings
ISBN: 9783642342097 / Angielski / Miękka / 247 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in Octobe...
|
cena:
185,18 |
![]() |
Automatic Malware Analysis: An Emulator Based Approach
ISBN: 9781461455226 / Angielski / Miękka / 73 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for... Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam... |
cena:
201,24 |
![]() |
Stufen Zur Informationsgesellschaft: Festschrift Zum 65. Geburtstag Von Klaus Fuchs-Kittowski
ISBN: 9783631376423 / Niemiecki / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. -Es gibt keine eindeutige Determination der sozialen und gesellschaftlichen Entwicklung durch die wissenschaftlich-technische Entwicklung, wie dies aus technokratischer bzw. scientistischer Sicht gerne angenommen wird. Es gibt aber sicher keine soziale und gesellschaftliche Entwicklung ohne wissenschaftlich-technische Entwicklung. Es wird hochst wahrscheinlich auch keinen weiteren wissenschaftlich-technischen Fortschritt ohne sozialen Fortschritt geben, beide Entwicklungsprozesse mussen durch bewusste Gestaltung miteinander vermittelt werden.-
-Die modernen Informations- und... -Es gibt keine eindeutige Determination der sozialen und gesellschaftlichen Entwicklung durch die wissenschaftlich-technische Entwicklung, wie dies au...
|
cena:
621,37 |
![]() |
Digital Communication: Principles and System Modelling
ISBN: 9783642264436 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems. The Salient features of the book are: 1. The foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language. 2. The application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally. 3.... "Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The boo... |
cena:
402,53 |
![]() |
Codes, Designs and Geometry
ISBN: 9781461286189 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Codes, Designs, and Geometry brings together in one place important contributions and up-to-date research results in this important area.
Codes, Designs, and Geometry serves as an excellent reference, providing insight into some of the most important research issues in the field. Codes, Designs, and Geometry brings together in one place important contributions and up-to-date research results in this important area. |
cena:
603,81 |
![]() |
Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings
ISBN: 9783642360947 / Angielski / Miękka / 405 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, i...
|
cena:
201,24 |
![]() |
Sicherheitskonzepte Für Das Internet: 5. Berliner Kolloquium Der Gottlieb Daimler- Und Karl Benz-Stiftung
ISBN: 9783642625879 / Niemiecki / Miękka / 211 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
169,28 |
![]() |
Locally Decodable Codes and Private Information Retrieval Schemes
ISBN: 9783642265778 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency - specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve...
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable ...
|
cena:
402,53 |
![]() |
Pairing-Based Cryptography -- Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
ISBN: 9783642363337 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012.
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software,... This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germa...
|
cena:
201,24 |
![]() |
Information Theory: A Tutorial Introduction
ISBN: 9780993367953 / Angielski / Twarda / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Originally developed by Claude Shannon in the 1940s, information theory laid the foundations for the digital revolution, and is now an essential tool in telecommunications, genetics, linguistics, brain sciences, and deep space communication. In this richly illustrated book, accessible examples are used to introduce information theory in terms of everyday games like 20 questions before more advanced topics are explored. Online MatLab and Python computer programs provide hands-on experience of information theory in action, and PowerPoint slides give support for teaching. Written in an informal...
Originally developed by Claude Shannon in the 1940s, information theory laid the foundations for the digital revolution, and is now an essential tool ...
|
cena:
383,94 |
![]() |
Understanding Compression: Data Compression for Modern Developers
ISBN: 9781491961537 / Angielski / Miękka / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you want to attract and retain users in the booming mobile services market, you need a quick-loading app that won't churn through their data plans. The key is to compress multimedia and other data into smaller files, but finding the right method is tricky. This witty book helps you understand how data compression algorithms work--in theory and practice--so you can choose the best solution among all the available compression tools. With tables, diagrams, games, and as little math as possible, authors Colt McAnlis and Aleks Haecky neatly explain the fundamentals. Learn how... If you want to attract and retain users in the booming mobile services market, you need a quick-loading app that won't churn through their data pla... |
cena:
142,54 |