• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Information Theory

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Information Theory

ilość książek w kategorii: 3017

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Spectrum Estimation and System Identification S. Unnikrishna Pillai Theodore I. Shim 9781461383208 Springer
Spectrum Estimation and System Identification

ISBN: 9781461383208 / Angielski / Miękka / 327 str.

ISBN: 9781461383208/Angielski/Miękka/327 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Unnikrishna Pillai; Theodore I. Shim
Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to ways of characterizing the mechanism or system behind the observed sig nal/data. Such an identification allows one to predict the system outputs, and as a result this has considerable impact in several areas such as speech processing, pattern recognition, target identification, seismology, and signal processing. A new outlook to spectrum estimation and system identification is pre sented here by making use of the powerful concepts of positive...
Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to w...
cena: 402,53

 Relative Information: Theories and Applications Jumarie, Guy 9783642840197 Springer
Relative Information: Theories and Applications

ISBN: 9783642840197 / Angielski / Miękka / 258 str.

ISBN: 9783642840197/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guy Jumarie; G. J. Klir; H. Haken
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usually referred to as Shannon entropy. Since the publication of Shannon's seminal paper in 1948, the theory has grown extremely rapidly and has been applied with varied success in almost all areas of human endeavor. At this time, the Shannon information theory is a well established and developed body of knowledge. Among its most significant recent contributions have been the use of the complementary principles of minimum and maximum entropy in...
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usu...
cena: 201,24

 Moving Target Defense II: Application of Game Theory and Adversarial Modeling Jajodia, Sushil 9781461454151 Springer
Moving Target Defense II: Application of Game Theory and Adversarial Modeling

ISBN: 9781461454151 / Angielski / Twarda / 204 str.

ISBN: 9781461454151/Angielski/Twarda/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Anup K. Ghosh; V. S. Subrahmanian

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling...

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ...

cena: 402,53

 Formal Languages and Computation: Models and Their Applications Meduna, Alexander 9781466513457 Taylor & Francis
Formal Languages and Computation: Models and Their Applications

ISBN: 9781466513457 / Angielski / Twarda / 316 str.

ISBN: 9781466513457/Angielski/Twarda/316 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexander Meduna

Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applications in computer science. It covers all rudimental topics concerning formal languages and their models, especially grammars and automata, and sketches the basic ideas underlying the theory of computation, including computability, decidability, and computational complexity. Emphasizing the relationship between theory and application, the book describes many real-world applications, including computer science engineering techniques for language...

Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applica...

cena: 489,72

 Multimedia Information Storage and Management Soon M. Chung 9781461286226 Springer
Multimedia Information Storage and Management

ISBN: 9781461286226 / Angielski / Miękka / 484 str.

ISBN: 9781461286226/Angielski/Miękka/484 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Soon M. Chung
Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interface. The large size of multimedia data and the high bandwidth requirement of multime- dia streams require new storage, buffering, delivery, and networking schemes. The presentational nature of multimedia applications requires a proper syn- chronization between multimedia streams, and the composition of multimedia documents in the distributed environment should overcome the heterogeneity of underlying systems. This book is edited for...
Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interf...
cena: 805,10

 The Maximum Entropy Method Nailong Wu 9783642644849 Springer
The Maximum Entropy Method

ISBN: 9783642644849 / Angielski / Miękka / 327 str.

ISBN: 9783642644849/Angielski/Miękka/327 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nailong Wu
Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal publication, this principle has been adopted in many areas of science and technology beyond its initial application. It is now found in spectral analysis, image restoration and a number of branches ofmathematics and physics, and has become better known as the Maximum Entropy Method (MEM). Today MEM is a powerful means to deal with ill-posed problems, and much research work is devoted to it. My own research in the area ofMEM started in 1980,...
Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal...
cena: 402,53

 Are there fundamental principles in Geographic Information Science?: Tobler Lecture Event 2012 of the Association of American Geographers Geographic I Tobler, Waldo 9781478213628 Createspace Independent Publishing Platform
Are there fundamental principles in Geographic Information Science?: Tobler Lecture Event 2012 of the Association of American Geographers Geographic I

ISBN: 9781478213628 / Angielski / Miękka / 100 str.

ISBN: 9781478213628/Angielski/Miękka/100 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Francis J. Harvey; Waldo Tobler; Nicholas R. Chrisman
This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in Geographic Information Science (GIScience). Michael Goodchild offers an afterword and Waldo Tobler contributes a preface. The book is intended for advanced undergraduate and graduate student readers.
This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in...
cena: 70,81

 Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings Chim, Tat Wing 9783642341281 Springer
Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings

ISBN: 9783642341281 / Angielski / Miękka / 506 str.

ISBN: 9783642341281/Angielski/Miękka/506 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tat Wing Chim; Tsz Hon Yuen
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Ho...
cena: 201,24

 Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proc Thampi, Sabu M. 9783642341342 Springer
Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proc

ISBN: 9783642341342 / Angielski / Miękka / 532 str.

ISBN: 9783642341342/Angielski/Miękka/532 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sabu M. Thampi; Albert Y. Zomaya; Thorsten Strufe
Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012.
Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in T...
cena: 201,24

 Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings Audun Jøsang, Bengt Carlsson 9783642342097 Springer-Verlag Berlin and Heidelberg GmbH &
Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings

ISBN: 9783642342097 / Angielski / Miękka / 247 str.

ISBN: 9783642342097/Angielski/Miękka/247 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Audun Jøsang;Bengt Carlsson
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in Octobe...
cena: 185,18

 Automatic Malware Analysis: An Emulator Based Approach Yin, Heng 9781461455226 Springer
Automatic Malware Analysis: An Emulator Based Approach

ISBN: 9781461455226 / Angielski / Miękka / 73 str.

ISBN: 9781461455226/Angielski/Miękka/73 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Heng Yin; Dawn Song

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems.

Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for...

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam...

cena: 201,24

 Stufen Zur Informationsgesellschaft: Festschrift Zum 65. Geburtstag Von Klaus Fuchs-Kittowski Floyd, Christiane 9783631376423 Lang, Peter, Gmbh, Internationaler Verlag Der
Stufen Zur Informationsgesellschaft: Festschrift Zum 65. Geburtstag Von Klaus Fuchs-Kittowski

ISBN: 9783631376423 / Niemiecki / Miękka / 438 str.

ISBN: 9783631376423/Niemiecki/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christiane Floyd; Christian Fuchs; Wolfgang Hofkirchner
-Es gibt keine eindeutige Determination der sozialen und gesellschaftlichen Entwicklung durch die wissenschaftlich-technische Entwicklung, wie dies aus technokratischer bzw. scientistischer Sicht gerne angenommen wird. Es gibt aber sicher keine soziale und gesellschaftliche Entwicklung ohne wissenschaftlich-technische Entwicklung. Es wird hochst wahrscheinlich auch keinen weiteren wissenschaftlich-technischen Fortschritt ohne sozialen Fortschritt geben, beide Entwicklungsprozesse mussen durch bewusste Gestaltung miteinander vermittelt werden.-
-Die modernen Informations- und...
-Es gibt keine eindeutige Determination der sozialen und gesellschaftlichen Entwicklung durch die wissenschaftlich-technische Entwicklung, wie dies au...
cena: 621,37

 Digital Communication: Principles and System Modelling Das, Apurba 9783642264436 Springer
Digital Communication: Principles and System Modelling

ISBN: 9783642264436 / Angielski / Miękka / 246 str.

ISBN: 9783642264436/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Apurba Das

"Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems.

The Salient features of the book are:

1. The foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language.

2. The application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally.

3....

"Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The boo...

cena: 402,53

 Codes, Designs and Geometry Vladimir Tonchev 9781461286189 Springer
Codes, Designs and Geometry

ISBN: 9781461286189 / Angielski / Miękka / 116 str.

ISBN: 9781461286189/Angielski/Miękka/116 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vladimir Tonchev
Codes, Designs, and Geometry brings together in one place important contributions and up-to-date research results in this important area.
Codes, Designs, and Geometry serves as an excellent reference, providing insight into some of the most important research issues in the field.
Codes, Designs, and Geometry brings together in one place important contributions and up-to-date research results in this important area.
cena: 603,81

 Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings Ed Dawson 9783642360947 Springer-Verlag Berlin and Heidelberg GmbH &
Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

ISBN: 9783642360947 / Angielski / Miękka / 405 str.

ISBN: 9783642360947/Angielski/Miękka/405 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ed Dawson
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, i...
cena: 201,24

 Sicherheitskonzepte Für Das Internet: 5. Berliner Kolloquium Der Gottlieb Daimler- Und Karl Benz-Stiftung Müller, Günter 9783642625879 Springer
Sicherheitskonzepte Für Das Internet: 5. Berliner Kolloquium Der Gottlieb Daimler- Und Karl Benz-Stiftung

ISBN: 9783642625879 / Niemiecki / Miękka / 211 str.

ISBN: 9783642625879/Niemiecki/Miękka/211 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Nter M. Ller; Martin Reichenbach
cena: 169,28

 Locally Decodable Codes and Private Information Retrieval Schemes Sergey Yekhanin 9783642265778 Springer-Verlag Berlin and Heidelberg GmbH &
Locally Decodable Codes and Private Information Retrieval Schemes

ISBN: 9783642265778 / Angielski / Miękka / 82 str.

ISBN: 9783642265778/Angielski/Miękka/82 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sergey Yekhanin
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency - specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve...
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable ...
cena: 402,53

 Pairing-Based Cryptography -- Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers Michel Abdalla, Tanja Lange 9783642363337 Springer-Verlag Berlin and Heidelberg GmbH &
Pairing-Based Cryptography -- Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers

ISBN: 9783642363337 / Angielski / Miękka / 333 str.

ISBN: 9783642363337/Angielski/Miękka/333 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla;Tanja Lange
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012.
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software,...
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germa...
cena: 201,24

 Information Theory: A Tutorial Introduction James V. Stone 9780993367953 Jim Stone
Information Theory: A Tutorial Introduction

ISBN: 9780993367953 / Angielski / Twarda / 260 str.

ISBN: 9780993367953/Angielski/Twarda/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James V. Stone
Originally developed by Claude Shannon in the 1940s, information theory laid the foundations for the digital revolution, and is now an essential tool in telecommunications, genetics, linguistics, brain sciences, and deep space communication. In this richly illustrated book, accessible examples are used to introduce information theory in terms of everyday games like 20 questions before more advanced topics are explored. Online MatLab and Python computer programs provide hands-on experience of information theory in action, and PowerPoint slides give support for teaching. Written in an informal...
Originally developed by Claude Shannon in the 1940s, information theory laid the foundations for the digital revolution, and is now an essential tool ...
cena: 383,94

 Understanding Compression: Data Compression for Modern Developers McAnlis, Colt 9781491961537 O'Reilly Media
Understanding Compression: Data Compression for Modern Developers

ISBN: 9781491961537 / Angielski / Miękka / 242 str.

ISBN: 9781491961537/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aleks Haecky

If you want to attract and retain users in the booming mobile services market, you need a quick-loading app that won't churn through their data plans. The key is to compress multimedia and other data into smaller files, but finding the right method is tricky. This witty book helps you understand how data compression algorithms work--in theory and practice--so you can choose the best solution among all the available compression tools.

With tables, diagrams, games, and as little math as possible, authors Colt McAnlis and Aleks Haecky neatly explain the fundamentals. Learn how...

If you want to attract and retain users in the booming mobile services market, you need a quick-loading app that won't churn through their data pla...

cena: 142,54

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia