You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Introduction -- Network coding Fundamentals -- Harnessing Network Coding in Wireless Systems -- Network Coding for Content Distribution and Multimedia Streaming in Peer-to-Peer Networks -- Network Coding in the Real World -- Network Coding and User Cooperation for Streaming and Download Services in LTE Networks -- CONCERTO: Experiences with a Real-World MANET System Based on Network Coding -- Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications -- Network Coding and Data Compression -- Scaling Laws with Network Coding -- Network Coding in Disruption Tolerant Networks.
With a substantial amount of new material, the Handbook of Linear Algebra, Second Edition provides comprehensive coverage of linear algebra concepts, applications, and computational software packages in an easy-to-use format. It guides you from the very elementary aspects of the subject to the frontiers of current research. Along with revisions and
Following the horrors of Kristallnacht in November of 1938, frightened parents were forced to find refuge for their children, far from the escalating anti-Jewish violence. To that end, a courageous group of Belgian women organized a desperate and highly dangerous rescue mission to usher nearly 1,000 children out of Germany and Austria. Of these children, ninety-three were placed on a freight train, traveling through the night away from their families and into the relative safety of Vichy France. Ranging in age from five to sixteen years, the children along with their protectors spent a harsh winter in an abandoned barn with little food before eventually finding shelter in the isolated Châte...
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference’s goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.
The Workshop for Women in Graph Theory and Applications was held at the Institute for Mathematics and Its Applications (University of Minnesota, Minneapolis) on August 19-23, 2019. During this five-day workshop, 42 participants performed collaborative research, in six teams, each focused on open problems in different areas of graph theory and its applications. The research work of each team was led by two experts in the corresponding area, who prior to the workshop, carefully selected relevant and meaningful open problems that would yield high-quality research and results of strong impact. As a result, all six teams have made significant contributions to several open problems in their respective areas. The workshop led to the creation of the Women in Graph Theory and Applications Research Collaboration Network, which provided the framework to continue collaborating and to produce this volume. This book contains six chapters, each of them on one of the different areas of research at the Workshop for Women in Graph Theory and Applications, and written by participants of each team.
This new edited book focuses on the contemporary developments and results in mathematical systems theory and control. It is a book in honor of Diederich Hinrichsen, for his fundamental contributions and achievements in the fields of linear systems theory and control theory and for his long term achievements in establishing mathematical systems theory in Germany. The book includes invited, peer-reviewed, authoritative expositions and surveys of these fields, presented by leading international researchers. A key theme of the book is the stability and robustness of linear and nonlinear systems using the concepts of stability radii and spectral value sets. Chapters survey recent advances in line...
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013. The 17 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, cryptanalysis or implementations.
In this edited collection we commemorate the 60th birthday of Prof. Christopher Byrnes and the retirement of Prof. Anders Lindquist from the Chair of Optimization and Systems Theory at KTH. These papers were presented in part at a 2009 workshop in KTH, Stockholm, honoring the lifetime contributions of Professors Byrnes and Lindquist in various fields of applied mathematics.
During the past decade the interaction between control theory and linear algebra has been ever increasing, giving rise to new results in both areas. As a natural outflow of this research, this book presents information on this interdisciplinary area. The cross-fertilization between control and linear algebra can be found in subfields such as Numerical Linear Algebra, Canonical Forms, Ring-theoretic Methods, Matrix Theory, and Robust Control. This book's editors were challenged to present the latest results in these areas and to find points of common interest. This volume reflects very nicely the interaction: the range of topics seems very wide indeed, but the basic problems and techniques are always closely connected. And the common denominator in all of this is, of course, linear algebra. This book is suitable for both mathematicians and students.
This book constitutes the refereed and revised post-conference proceedings of the 7th International Workshop on Code-Based Cryptography, CBC 2019, held in Darmstadt, Germany, in May 2019. The eight papers presented in this book were carefully reviewed and selected from numerous submissions. These contributions are divided into two groups: The first four papers deal with the design of code-based cryptosystems, while the following four papers are on cryptanalysis of code-based cryptosystems.