You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. This volume discusses topics such as network security, information security and coding.
This monograph briefly formulates fundamental notions and results of Shannon theory on reliable transmission via coding and gives a survey of results obtained in last two-three decades by the authors.
This volume is dedicated to the memory of Rudolf Ahlswede, who passed away in December 2010. The Festschrift contains 36 thoroughly refereed research papers from a memorial symposium, which took place in July 2011. The four macro-topics of this workshop: theory of games and strategic planning; combinatorial group testing and database mining; computational biology and string matching; information coding and spreading and patrolling on networks; provide a comprehensive picture of the vision Rudolf Ahlswede put forward of a broad and systematic theory of search.
This book collects 63 revised, full-papers contributed to a research project on the "General Theory of Information Transfer and Combinatorics" that was hosted from 2001-2004 at the Center for Interdisciplinary Research (ZIF) of Bielefeld University and several incorporated meetings. Topics covered include probabilistic models, cryptology, pseudo random sequences, quantum models, pattern discovery, language evolution, and network coding.
In September 2018, researchers from Armenia, Chile, Germany and Japan met in Yerevan to discuss technologies with applications in Smart Cities, Data Science and Information-Theoretic Approaches for Smart Systems, Technical Challenges for Smart Environments, and Smart Human Centered Computing. This book presents their contributions to the CODASSCA 2018 workshop on Collaborative Technologies and Data Science in Smart City Applications, a cutting-edge topic in Computer Science today.
The volume “Storing and Transmitting Data” is based on Rudolf Ahlswede's introductory course on "Information Theory I" and presents an introduction to Shannon Theory. Readers, familiar or unfamiliar with the technical intricacies of Information Theory, will benefit considerably from working through the book; especially Chapter VI with its lively comments and uncensored insider views from the world of science and research offers informative and revealing insights. This is the first of several volumes that will serve as a collected research documentation of Rudolf Ahlswede’s lectures on information theory. Each volume includes comments from an invited well-known expert. Holger Boche cont...
Data Fusion is a very broad interdisciplinary technology domain. It provides techniques and methods for; integrating information from multiple sources and using the complementarities of these detections to derive maximum information about the phenomenon being observed; analyzing and deriving the meaning of these observations and predicting possible consequences of the observed state of the environment; selecting the best course of action; and controlling the actions. Here, the focus is on the more mature phase of data fusion, namely the detection and identification / classification of phenomena being observed and exploitation of the related methods for Security-Related Civil Science and Tech...