You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Cellular Convergence and the Death of Privacy explores the recent technological developments in the communication industry and the growing trend for all forms of communication to converge into the cellular handset. Stephen Wicker addresses the impact of cellular convergence on privacy from technical, legal, and social perspectives.
For introductory graduate courses in coding for telecommunications engineering, digital communications. This introductory text on error control coding focuses on key implementation issues and performance analysis with applications valuable to both mathematicians and engineers.
When the 50th anniversary of the birth of Information Theory was celebrated at the 1998 IEEE International Symposium on Informa tion Theory in Boston, there was a great deal of reflection on the the year 1993 as a critical year. As the years pass and more perspec tive is gained, it is a fairly safe bet that we will view 1993 as the year when the "early years" of error control coding came to an end. This was the year in which Berrou, Glavieux and Thitimajshima pre sented "Near Shannon Limit Error-Correcting Coding and Decoding: Turbo Codes" at the International Conference on Communications in Geneva. In their presentation, Berrou et al. claimed that a combi nation of parallel concatenation an...
Fundamentals of Codes, Graphs, and Iterative Decoding is an explanation of how to introduce local connectivity, and how to exploit simple structural descriptions. Chapter 1 provides an overview of Shannon theory and the basic tools of complexity theory, communication theory, and bounds on code construction. Chapters 2 - 4 provide an overview of "classical" error control coding, with an introduction to abstract algebra, and block and convolutional codes. Chapters 5 - 9 then proceed to systematically develop the key research results of the 1990s and early 2000s with an introduction to graph theory, followed by chapters on algorithms on graphs, turbo error control, low density parity check codes, and low density generator codes.
Reed-Solomon codes provide critical error control for many different types of digital communications systems, including those on the Voyager spacecraft and in CD players. This collection of 13 articles from leading researchers in the field provides a comprehensive overview of the history and practical applications--some never before published--of these important codes.
Cellular technology has always been a surveillance technology, but "cellular convergence" - the growing trend for all forms of communication to consolidate onto the cellular handset - has dramatically increased the impact of that surveillance. In Cellular Convergence and the Death of Privacy, Stephen Wicker explores this unprecedented threat to privacy from three distinct but overlapping perspectives: the technical, the legal, and the social. Professor Wicker first describes cellular technology and cellular surveillance using language accessible to non-specialists. He then examines current legislation and Supreme Court jurisprudence that form the framework for discussions about rights in the context of cellular surveillance. Lastly, he addresses the social impact of surveillance on individual users. The story he tells is one of a technology that is changing the face of politics and economics, but in ways that remain highly uncertain.
One of the greatest films ever to be made in Scotland, The Wicker Man immediately garnered a cult following on its release for its intense atmosphere and shocking denouement. This book explores the roots of this powerful, enduring film. With contributors including The Wicker Man director Robin Hardy, it is a thorough and informative read for all fans of this indispensable horror masterpiece.
What happens when people turn their everyday experience into data: an introduction to the essential ideas and key challenges of self-tracking. People keep track. In the eighteenth century, Benjamin Franklin kept charts of time spent and virtues lived up to. Today, people use technology to self-track: hours slept, steps taken, calories consumed, medications administered. Ninety million wearable sensors were shipped in 2014 to help us gather data about our lives. This book examines how people record, analyze, and reflect on this data, looking at the tools they use and the communities they become part of. Gina Neff and Dawn Nafus describe what happens when people turn their everyday experienceâ...
Artificial intelligence and expert systems have seen a great deal of research in recent years, much of which has been devoted to methods for incorporating uncertainty into models. This book is devoted to providing a thorough and up-to-date survey of this field for researchers and students.