На головну сторінку сайту Спрощенний режим E-бібліотека навчальних матеріалів
Авторизація
Прізвище
Пароль
 

Бази даних


Ресурси порталу Springer Link (доступ через IP-адреси ЗДМУ)- результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: <.>S=Coding theory.<.>
Загальна кількість знайдених документів : 42
Показані документи с 1 за 20
 1-20    21-40   41-42 
1.


   
    Advances in Cryptology – ASIACRYPT 2017 [Electronic resource] : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III / / ed.: Takagi, Tsuyoshi., Peyrin, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 473 p. 57 illus. - ISBN 9783319707006
    Зміст:
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Management information systems.

   Computer science.

   Computers.

   Computer science—Mathematics.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Management of Computing and Information Systems.

   Theory of Computation.

   Mathematics of Computing.

Анотація: The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Takagi, Tsuyoshi. \ed.\; Peyrin, Thomas. \ed.\
Вільних прим. немає
Знайти схожі

2.


    Tomlinson, Martin.
    Error-Correction Coding and Decoding [Electronic resource] : bounds, Codes, Decoders, Analysis and Applications / / Martin. Tomlinson, Tjhai, Cen Jung. [et al.] ; . - 1st ed. 2017. - [S. l. : s. n.]. - XX, 522 p. 134 illus., 82 illus. in color. - ISBN 9783319511030
    Зміст:
Рубрики: Electrical engineering.
   Computer communication systems.

   Coding theory.

   Information theory.

   Algorithms.

   Communications Engineering, Networks.

   Computer Communication Networks.

   Coding and Information Theory.

   Algorithms.

Анотація: This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of research organized into five parts: Part I is concerned with the theoretical performance attainable by using error correcting codes to achieve communications efficiency in digital communications systems. Part II explores the construction of error-correcting codes and explains the different families of codes and how they are designed. Techniques are described for producing the very best codes. Part III addresses the analysis of low-density parity-check (LDPC) codes, primarily to calculate their stopping sets and low-weight codeword spectrum which determines the performance of th ese codes. Part IV deals with decoders designed to realize optimum performance. Part V describes applications which include combined error correction and detection, public key cryptography using Goppa codes, correcting errors in passwords and watermarking. This book is a valuable resource for anyone interested in error-correcting codes and their applications, ranging from non-experts to professionals at the forefront of research in their field This book is open access under a CC BY 4.0 license.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Tjhai, Cen Jung.; Ambroze, Marcel A.; Ahmed, Mohammed.; Jibril, Mubarak.; Tomlinson, Martin. \.\
Вільних прим. немає
Знайти схожі

3.


    Shankar, P. Mohana.
    Fading and Shadowing in Wireless Systems [Electronic resource] / P. Mohana. Shankar ; . - 2nd ed. 2017. - [S. l. : s. n.]. - XVII, 817 p. 511 illus., 390 illus. in color. - ISBN 9783319531984
    Зміст:
Рубрики: Electrical engineering.
   Coding theory.

   Information theory.

   Communications Engineering, Networks.

   Coding and Information Theory.

   Information and Communication, Circuits.

Анотація: This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms. In addition, this edition contains a new chapter on Cognitive Radio. Based on the response from readers of the First Edition, detailed Matlab scripts used in the preparation of this edition are provided. Wherever necessary, Maple scripts used are also provided. • Covers detailed analysis of fading and shadowing as well as their mitigation that are critical to the improvement of reliable wireless communication capabilities; • Second edition provides additional background materials with sections on Laplace and Mellin transforms, parameter estimation (ML and MoM), statistical testing (chi square) and receiver operating characteristics – also offers newer models of fading and shadowing and a new chapter on cognitive radio; • New edition provides detailed Matlab and Maple scripts helpful to computational modeling and analysis of wireless systems adding a pedagogic component.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Shankar, P. Mohana. \.\
Вільних прим. немає
Знайти схожі

4.


   
    Artificial General Intelligence [Electronic resource] : 10th International Conference, AGI 2017, Melbourne, VIC, Australia, August 15-18, 2017, Proceedings / / ed.: Everitt, Tom., Goertzel, Ben., Potapov, Alexey. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 275 p. 38 illus. - ISBN 9783319637037
    Зміст:
Рубрики: Artificial intelligence.
   Application software.

   Mathematical logic.

   Special purpose computers.

   Coding theory.

   Information theory.

   Artificial Intelligence.

   Computer Appl. in Administrative Data Processing.

   Mathematical Logic and Formal Languages.

   Special Purpose and Application-Based Systems.

   Coding and Information Theory.

Анотація: This book constitutes the proceedings of the 10th International Conference on Artificial General Intelligence, AGI 2017, held in Melbourne, VIC, Australia, in August 2017. The 24 regular papers presented in this book together with 1 short paper were carefully reviewed and selected from 35 submissions. They cover topics such as architectures; mathematical foundations; algorithms; safety; understanding; human cognition; and philosophy.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Everitt, Tom. \ed.\; Goertzel, Ben. \ed.\; Potapov, Alexey. \ed.\
Вільних прим. немає
Знайти схожі

5.


   
    Digital Forensics and Watermarking [Electronic resource] : 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings / / ed. Kraetzer, Christian. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 422 p. 174 illus. - ISBN 9783319641850
    Зміст:
Рубрики: Data encryption (Computer science).
   Computer security.

   Algorithms.

   Optical data processing.

   Computers and civilization.

   Coding theory.

   Information theory.

   Cryptology.

   Systems and Data Security.

   Algorithm Analysis and Problem Complexity.

   Image Processing and Computer Vision.

   Computers and Society.

   Coding and Information Theory.

Анотація: This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Kraetzer, Christian. \ed.\; Shi, Yun-Qing. \ed.\; Dittmann, Jana. \ed.\; Kim, Hyoung Joong. \ed.\
Вільних прим. немає
Знайти схожі

6.


   
    Foundations and Practice of Security [Electronic resource] : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers / / ed. Cuppens, Frédéric. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 361 p. 83 illus. - ISBN 9783319519661
    Зміст:
Рубрики: Data encryption (Computer science).
   Data protection.

   Coding theory.

   Information theory.

   Computer communication systems.

   Biometrics (Biology).

   Algorithms.

   Cryptology.

   Security.

   Coding and Information Theory.

   Computer Communication Networks.

   Biometrics.

   Algorithm Analysis and Problem Complexity.

Анотація: This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Cuppens, Frédéric. \ed.\; Wang, Lingyu. \ed.\; Cuppens-Boulahia, Nora. \ed.\; Tawbi, Nadia. \ed.\; Garcia-Alfaro, Joaquin. \ed.\
Вільних прим. немає
Знайти схожі

7.


   
    Codes, Cryptology and Information Security [Electronic resource] : second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet / / ed.: El Hajji, Said., Nitaj, Abderrahmane., Souidi, El Mamoun. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 384 p. 46 illus. - ISBN 9783319555898
Рубрики: Computer security.
   Data encryption (Computer science).

   Coding theory.

   Information theory.

   Computer communication systems.

   Numerical analysis.

   Systems and Data Security.

   Cryptology.

   Coding and Information Theory.

   Computer Communication Networks.

   Numeric Computing.

Анотація: This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
El Hajji, Said. \ed.\; Nitaj, Abderrahmane. \ed.\; Souidi, El Mamoun. \ed.\
Вільних прим. немає
Знайти схожі

8.


   
    Progress in Cryptology - AFRICACRYPT 2017 [Electronic resource] : 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings / / ed.: Joye, Marc., Nitaj, Abderrahmane. - 1st ed. 2017. - [S. l. : s. n.]. - X, 231 p. 42 illus. - ISBN 9783319573397
Рубрики: Computer security.
   Data encryption (Computer science).

   Coding theory.

   Information theory.

   Numerical analysis.

   Computers.

   Management information systems.

   Computer science.

   Systems and Data Security.

   Cryptology.

   Coding and Information Theory.

   Numeric Computing.

   Computation by Abstract Devices.

   Management of Computing and Information Systems.

Анотація: This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017. The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Joye, Marc. \ed.\; Nitaj, Abderrahmane. \ed.\
Вільних прим. немає
Знайти схожі

9.


   
    Advances in Cryptology – ASIACRYPT 2017 [Electronic resource] : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II / / ed.: Takagi, Tsuyoshi., Peyrin, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XIX, 701 p. 98 illus. - ISBN 9783319706979
    Зміст:
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Management information systems.

   Computer science.

   Computers.

   Computer science—Mathematics.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Management of Computing and Information Systems.

   Theory of Computation.

   Mathematics of Computing.

Анотація: The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Takagi, Tsuyoshi. \ed.\; Peyrin, Thomas. \ed.\
Вільних прим. немає
Знайти схожі

10.


   
    Machine Learning and Knowledge Extraction [Electronic resource] : first IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference, CD-MAKE 2017, Reggio, Italy, August 29 – September 1, 2017, Proceedings / / ed. Holzinger, Andreas. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 376 p. 129 illus. - ISBN 9783319668086
Рубрики: Application software.
   Artificial intelligence.

   Coding theory.

   Information theory.

   Computer communication systems.

   Computer security.

   Computers and civilization.

   Information Systems Applications (incl. Internet).

   Artificial Intelligence.

   Coding and Information Theory.

   Computer Communication Networks.

   Systems and Data Security.

   Computers and Society.

Анотація: This book constitutes the refereed proceedings of the IFIP TC 5, WG 8.4, 8.9, 12.9 International Cross-Domain Conference for Machine Learning and Knowledge Extraction, CD-MAKE 2017, held in Reggio, Italy, in August/September 2017. The 24 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers deal with fundamental questions and theoretical aspects and cover a wide range of topics in the field of machine learning and knowledge extraction. They are organized in the following topical sections: MAKE topology; MAKE smart factory; MAKE privacy; MAKE VIS; MAKE AAL; and MAKE semantics.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Holzinger, Andreas. \ed.\; Kieseberg, Peter. \ed.\; Tjoa, A Min. \ed.\; Weippl, Edgar. \ed.\
Вільних прим. немає
Знайти схожі

11.


    Brémaud, Pierre.
    Discrete Probability Models and Methods [Electronic resource] : probability on Graphs and Trees, Markov Chains and Random Fields, Entropy and Coding / / Pierre. Brémaud ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 559 p. 92 illus. - ISBN 9783319434766
    Зміст:
Рубрики: Probabilities.
   Mathematical statistics.

   Graph theory.

   Coding theory.

   Information theory.

   Computer communication systems.

   Probability Theory and Stochastic Processes.

   Probability and Statistics in Computer Science.

   Graph Theory.

   Coding and Information Theory.

   Computer Communication Networks.

Анотація: The emphasis in this book is placed on general models (Markov chains, random fields, random graphs), universal methods (the probabilistic method, the coupling method, the Stein-Chen method, martingale methods, the method of types) and versatile tools (Chernoff's bound, Hoeffding's inequality, Holley's inequality) whose domain of application extends far beyond the present text. Although the examples treated in the book relate to the possible applications, in the communication and computing sciences, in operations research and in physics, this book is in the first instance concerned with theory. The level of the book is that of a beginning graduate course. It is self-contained, the prerequisites consisting merely of basic calculus (series) and basic linear algebra (matrices). The reader is not assumed to be trained in probability since the first chapters give in considerable detail the background necessary to understand the rest of the book. .
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Brémaud, Pierre. \.\
Вільних прим. немає
Знайти схожі

12.


   
    Digital Nations – Smart Cities, Innovation, and Sustainability [Electronic resource] : 16th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2017, Delhi, India, November 21–23, 2017, Proceedings / / ed. Kar, Arpan Kumar. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XX, 526 p. 120 illus. - ISBN 9783319685571
    Зміст:
Рубрики: E-commerce.
   Computer security.

   Application software.

   Coding theory.

   Information theory.

   e-Commerce/e-business.

   Systems and Data Security.

   Information Systems Applications (incl. Internet).

   Computer Appl. in Social and Behavioral Sciences.

   Coding and Information Theory.

Анотація: This book constitutes the refereed conference proceedings of the 16th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2017, held in Delhi, India, in November 2017. The 45 revised full papers presented were carefully reviewed and selected from 92 submissions. They are organized in the following topical sections: Adoption of Smart Services; Assessment of ICT Enabled Smart Initiatives; Analytics for Smart Governance; Social Media and Web 3.0 for Smartness; and Smart Solutions for the Future.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Kar, Arpan Kumar. \ed.\; Ilavarasan, P. Vigneswara. \ed.\; Gupta, M.P. \ed.\; Dwivedi, Yogesh K. \ed.\; Mäntymäki, Matti. \ed.\; Janssen, Marijn. \ed.\; Simintiras, Antonis. \ed.\; Al-Sharhan, Salah. \ed.\
Вільних прим. немає
Знайти схожі

13.


   
    Security, Privacy, and Applied Cryptography Engineering [Electronic resource] : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings / / ed.: Ali, Sk Subidh., Danger, Jean-Luc., Eisenbarth, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XXIV, 295 p. 55 illus. - ISBN 9783319715018
    Зміст:
Рубрики: Data protection.
   Computer security.

   Data encryption (Computer science).

   Coding theory.

   Information theory.

   Computer communication systems.

   Security.

   Systems and Data Security.

   Cryptology.

   Coding and Information Theory.

   Computer Communication Networks.

Анотація: This book constitutes the refereed proceedings of the 7th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2017, held in Goa, India, in December 2017. The 13 revised full papers presented together with 1 short paper, 7 invited talks, and 4 tutorials were carefully reviewed and selected from 49 initial submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is indeed a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Ali, Sk Subidh. \ed.\; Danger, Jean-Luc. \ed.\; Eisenbarth, Thomas. \ed.\
Вільних прим. немає
Знайти схожі

14.


    Dasgupta, Dipankar.
    Advances in User Authentication [Electronic resource] / Dipankar. Dasgupta, Roy, Arunava., Nag, Abhijit. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 360 p. 165 illus., 128 illus. in color. - ISBN 9783319588087
    Зміст:
Рубрики: Coding theory.
   Information theory.

   Computer security.

   Data structures (Computer science).

   Biometrics (Biology).

   Coding and Information Theory.

   Systems and Data Security.

   Data Storage Representation.

   Biometrics.

Анотація: This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists. .
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Roy, Arunava.; Nag, Abhijit.; Dasgupta, Dipankar. \.\
Вільних прим. немає
Знайти схожі

15.


   
    Computational Information Geometry [Electronic resource] : for Image and Signal Processing / / ed.: Nielsen, Frank., Critchley, Frank., Dodson, Christopher T. J. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 299 p. 79 illus. - ISBN 9783319470580
    Зміст:
Рубрики: Signal processing.
   Image processing.

   Speech processing systems.

   Statistics .

   Probabilities.

   Coding theory.

   Information theory.

   Biomedical engineering.

   Signal, Image and Speech Processing.

   Statistics and Computing/Statistics Programs.

   Probability Theory and Stochastic Processes.

   Coding and Information Theory.

   Biomedical Engineering and Bioengineering.

Анотація: This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Nielsen, Frank. \ed.\; Critchley, Frank. \ed.\; Dodson, Christopher T. J. \ed.\
Вільних прим. немає
Знайти схожі

16.


    Reznikova, Zhanna.
    Studying Animal Languages Without Translation: An Insight from Ants [Electronic resource] / Zhanna. Reznikova ; . - 1st ed. 2017. - [S. l. : s. n.]. - VIII, 92 p. 25 illus., 15 illus. in color. - ISBN 9783319449180
    Зміст:
Рубрики: Animal physiology.
   Animal models in research.

   Coding theory.

   Information theory.

   Invertebrates.

   Neurobiology.

   Animal Physiology.

   Animal Models.

   Coding and Information Theory.

   Invertebrates.

   Neurobiology.

Анотація: The Author of this new volume on ant communication demonstrates that information theory is a valuable tool for studying the natural communication of animals. To do so, she pursues a fundamentally new approach to studying animal communication and “linguistic” capacities on the basis of measuring the rate of information transmission and the complexity of transmitted messages. Animals’ communication systems and cognitive abilities have long-since been a topic of particular interest to biologists, psychologists, linguists, and many others, including researchers in the fields of robotics and artificial intelligence. The main difficulties in the analysis of animal language have to date been predominantly methodological in nature. Addressing this perennial problem, the elaborated experimental paradigm presented here has been applied to ants, and can be extended to other social species of animals that have the need to memorize and relay complex “messages”. Accordingly, the method opens exciting new dimensions in the study of natural communications in the wild.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Reznikova, Zhanna. \.\
Вільних прим. немає
Знайти схожі

17.


   
    Public-Key Cryptography – PKC 2017 [Electronic resource] : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II / / ed. Fehr, Serge. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 556 p. 81 illus. - ISBN 9783662543887
    Зміст:
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Computer communication systems.

   Algorithms.

   Management information systems.

   Computer science.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Computer Communication Networks.

   Algorithm Analysis and Problem Complexity.

   Management of Computing and Information Systems.

Анотація: The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Fehr, Serge. \ed.\
Вільних прим. немає
Знайти схожі

18.


   
    Lightweight Cryptography for Security and Privacy [Electronic resource] : 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers / / ed. Bogdanov, Andrey. - 1st ed. 2017. - [S. l. : s. n.]. - VII, 149 p. 34 illus. - ISBN 9783319557144
    Зміст:
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Computer memory systems.

   Artificial intelligence.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Memory Structures.

   Artificial Intelligence.

Анотація: This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016. The 9 full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight designs, implementation challenges.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Bogdanov, Andrey. \ed.\
Вільних прим. немає
Знайти схожі

19.


   
    Economics of Grids, Clouds, Systems, and Services [Electronic resource] : 14th International Conference, GECON 2017, Biarritz, France, September 19-21, 2017, Proceedings / / ed.: Pham, Congduc., Altmann, Jörn., Bañares, José Ángel. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 302 p. 85 illus. - ISBN 9783319680668
    Зміст:
Рубрики: Computer communication systems.
   Computer system failures.

   Application software.

   E-commerce.

   Coding theory.

   Information theory.

   Programming languages (Electronic computers).

   Computer Communication Networks.

   System Performance and Evaluation.

   Information Systems Applications (incl. Internet).

   e-Commerce/e-business.

   Coding and Information Theory.

   Programming Languages, Compilers, Interpreters.

Анотація: This book constitutes the refereed proceedings of the 14th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2017, held in Biarritz, France, in September 2017. The 10 full papers and 10 short papers presented together with 3 invited talks were carefully reviewed and selected from 38 submissions. This volume of the GECON 2017 proceedings has been structured in sections following the sessions that comprised the conference program: Pricing in Cloud and Quality of Service, Work in Progress on Service Management, Work in Progress on Business models and Community Cooperation, Work in Progress on Energy Efficiency and Resource Management, Resource Management, Edge Computing, Cloud Federation; and Work in Progress on Service Selection and Coordination.
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Pham, Congduc. \ed.\; Altmann, Jörn. \ed.\; Bañares, José Ángel. \ed.\
Вільних прим. немає
Знайти схожі

20.


   
    Coding Theory and Applications [Electronic resource] : 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings / / ed.: Barbero, Ángela I., Skachek, Vitaly., Ytrehus, Øyvind. - 1st ed. 2017. - [S. l. : s. n.]. - X, 297 p. 29 illus. - ISBN 9783319662787
Рубрики: Coding theory.
   Information theory.

   Computer science—Mathematics.

   Mathematical statistics.

   Numerical analysis.

   Computer communication systems.

   Software engineering.

   Coding and Information Theory.

   Symbolic and Algebraic Manipulation.

   Probability and Statistics in Computer Science.

   Numeric Computing.

   Computer Communication Networks.

   Software Engineering.

Анотація: This book constitutes the refereed proceedings of the 5th International Castle Meeting on Coding Theory and Applications, ICMCTA 2017, held in Vihula, Estonia, in August 2017. The 24 full papers presented were carefully reviewed and selected for inclusion in this volume. The papers cover relevant research areas in modern coding theory, including codes and combinatorial structures, algebraic geometric codes, group codes, convolutional codes, network coding, other applications to communications, and applications of coding theory in cryptography.  .
Есть полнотекстовые версии (для доступа требуется авторизация)

Дод.точки доступу:
Barbero, Ángela I. \ed.\; Skachek, Vitaly. \ed.\; Ytrehus, Øyvind. \ed.\
Вільних прим. немає
Знайти схожі

 1-20    21-40   41-42 
 
Статистика
за 13.07.2024
Кількість запитів 6317
Кількість відвідувачів 1
© Международная Ассоциация пользователей и разработчиков электронных библиотек и новых информационных технологий
(Ассоциация ЭБНИТ)