Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Coding and Information Theory.<.>)
Загальна кiлькiсть документiв : 42
Показанi документи с 1 за 20
 1-20    21-40   41-42 
1.


   
    Electronic Voting [[electronic resource] :] : second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings / / ed. Krimmer, Robert. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - X, 319 p. 35 illus. - Б. ц.
    Зміст:
Election Security and Economics: It's all about Eve --
Cryptographic Security Analysis of E-Voting Systems: Achievements, Misconceptions, and Limitations --
Voting in E-participation: A Set of Requirements to Support Accountability and Trust by Electoral Committees --
The Weakness of Cumulative Voting --
No More Excuses: Automated Synthesis of Practical and Verifiable Vote-counting Programs for Complex Voting Schemes --
Public Evidence from Secret Ballots --
A Mechanized Proof of Selene Receipt Freeness and Privacy --
Trust Implications of DDoS Protection in Online Elections --
Updated European Standards for e-voting --
A Formally Verified Single Transferable Vote Scheme with Fractional Values --
Reverse Bayesian poisoning: How to use spam filters to manipulate online elections --
Return Code Schemes for Electronic Voting Systems --
Eos A Universal Verifiable and Coercion Resistant Voting Protocol --
Clash attacks and the STAR-Vote system --
Verifiability experiences in government online voting systems --
Cast-as-Intended Mechanism with Return Codes Based on PETs --
How Could Snowden Attack an Election --
Bits or Paper: which should get to carry your vote --
Estonian Voting Verification Mechanism Revisited Again.  .
Рубрики: Data encryption (Computer science).
   Computer security.

   Software engineering.

   Coding theory.

   Information theory.

   Computer communication systems.

   Application software.

   Cryptology.

   Systems and Data Security.

   Software Engineering.

   Coding and Information Theory.

   Computer Communication Networks.

   Computer Appl. in Administrative Data Processing.

Анотація: This book constitutes the refereed proceedings of the Second International Joint Conference on Electronic Voting, E-Vote-ID 2017, held in Bregenz, Austria, in October 2017. The 16 full papers presented in this volume were carefully reviewed and selected from 48 submissions. In addition the book contains 3 keynote talks. The papers deal with security, usability and technical issues; administrative, legal, political and social issued; and election and practical experiences. .

Перейти: https://doi.org/10.1007/978-3-319-68687-5

Дод.точки доступу:
Krimmer, Robert. \ed.\; Volkamer, Melanie. \ed.\; Braun Binder, Nadja. \ed.\; Kersting, Norbert. \ed.\; Pereira, Olivier. \ed.\; Schurmann, Carsten. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


   
    Advances in Cryptology – CRYPTO 2017 [[electronic resource] :] : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III / / ed.: Katz, Jonathan., Shacham, Hovav. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 713 p. 95 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer communication systems.

   Computer security.

   Coding theory.

   Information theory.

   Computers and civilization.

   Software engineering.

   Cryptology.

   Computer Communication Networks.

   Systems and Data Security.

   Coding and Information Theory.

   Computers and Society.

   Software Engineering.

Анотація: The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Перейти: https://doi.org/10.1007/978-3-319-63697-9

Дод.точки доступу:
Katz, Jonathan. \ed.\; Shacham, Hovav. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


   
    Advances in Cryptology – ASIACRYPT 2017 [[electronic resource] :] : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I / / ed.: Takagi, Tsuyoshi., Peyrin, Thomas. - 1st ed. 2017. - [S. l. : s. n.]. - XXVI, 813 p. 121 illus. - Б. ц.
    Зміст:
Post-Quantum Cryptography --
Symmetric Key Cryptanalysis --
Lattices --
Homomorphic Encryptions.-Access Control --
Oblivious Protocols --
Side Channel Analysis. .
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Management information systems.

   Computer science.

   Computers.

   Computer science—Mathematics.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Management of Computing and Information Systems.

   Theory of Computation.

   Mathematics of Computing.

Анотація: The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Перейти: https://doi.org/10.1007/978-3-319-70694-8

Дод.точки доступу:
Takagi, Tsuyoshi. \ed.\; Peyrin, Thomas. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Information Security [[electronic resource] :] : 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings / / ed.: Nguyen, Phong Q., Zhou, Jianying. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 474 p. 115 illus. - Б. ц.
Рубрики: Computer security.
   Data encryption (Computer science).

   Computer organization.

   Computers.

   Artificial intelligence.

   Coding theory.

   Information theory.

   Systems and Data Security.

   Cryptology.

   Computer Systems Organization and Communication Networks.

   Computing Milieux.

   Artificial Intelligence.

   Coding and Information Theory.

Анотація: This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.  The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Перейти: https://doi.org/10.1007/978-3-319-69659-1

Дод.точки доступу:
Nguyen, Phong Q. \ed.\; Zhou, Jianying. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


   
    Post-Quantum Cryptography [[electronic resource] :] : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / / ed.: Lange, Tanja., Takagi, Tsuyoshi. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 427 p. 34 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Software engineering.

   Coding theory.

   Information theory.

   Cryptology.

   Systems and Data Security.

   Software Engineering.

   Coding and Information Theory.

Анотація: This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.

Перейти: https://doi.org/10.1007/978-3-319-59879-6

Дод.точки доступу:
Lange, Tanja. \ed.\; Takagi, Tsuyoshi. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


   
    Advances in Cryptology – CRYPTO 2017 [[electronic resource] :] : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part II / / ed.: Katz, Jonathan., Shacham, Hovav. - 1st ed. 2017. - [S. l. : s. n.]. - XV, 735 p. 100 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Computer communication systems.

   Software engineering.

   Management information systems.

   Computer science.

   Coding theory.

   Information theory.

   Cryptology.

   Systems and Data Security.

   Computer Communication Networks.

   Software Engineering.

   Management of Computing and Information Systems.

   Coding and Information Theory.

Анотація: The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Перейти: https://doi.org/10.1007/978-3-319-63715-0

Дод.точки доступу:
Katz, Jonathan. \ed.\; Shacham, Hovav. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Digital Forensics and Watermarking [[electronic resource] :] : 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers / / ed. Shi, Yun Qing. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 618 p. 269 illus. - Б. ц.
Рубрики: Data encryption (Computer science).
   Computer security.

   Algorithms.

   Optical data processing.

   Computers and civilization.

   Coding theory.

   Information theory.

   Cryptology.

   Systems and Data Security.

   Algorithm Analysis and Problem Complexity.

   Image Processing and Computer Vision.

   Computers and Society.

   Coding and Information Theory.

Анотація: This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.

Перейти: https://doi.org/10.1007/978-3-319-53465-7

Дод.точки доступу:
Shi, Yun Qing. \ed.\; Kim, Hyoung Joong. \ed.\; Perez-Gonzalez, Fernando. \ed.\; Liu, Feng. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


   
    Information Theoretic Security [[electronic resource] :] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / ed. Shikata, Junji. - 1st ed. 2017. - [S. l. : s. n.]. - XII, 235 p. 31 illus. - Б. ц.
    Зміст:
Quantum cryptography --
Quantum information theory --
Post-quantum cryptography (e.g. lattices and cryptography) --
Physical layer security --
Wiretap channels --
Adversarial channel models --
Cryptography from noisy channels --
Bounded storage models --
Network coding security --
Biometric security --
Randomness extraction --
Key and message rates --
Secret sharing --
Authentication codes --
Multiparty computations --
Information theoretic reductions --
Implementation challenges.
Рубрики: Computer security.
   Coding theory.

   Information theory.

   Computer communication systems.

   Software engineering.

   Mathematical statistics.

   Optical data processing.

   Systems and Data Security.

   Coding and Information Theory.

   Computer Communication Networks.

   Software Engineering.

   Probability and Statistics in Computer Science.

   Image Processing and Computer Vision.

Анотація: This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Перейти: https://doi.org/10.1007/978-3-319-72089-0

Дод.точки доступу:
Shikata, Junji. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


   
    Virtual Reality and Augmented Reality [[electronic resource] :] : 14th EuroVR International Conference, EuroVR 2017, Laval, France, December 12–14, 2017, Proceedings / / ed. Barbic, Jernej. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XX, 193 p. 90 illus. - Б. ц.
    Зміст:
Interactive Physics Simulation for Virtual technologies --
H2020 and its new actions in Interactive Technologies --
Touching with the eyes: A story of pseudo-haptics --
The good, the bad and the better: opportunities and risks in Virtual Rehabilitation --
The Four S's of the Next User Interface Paradigm for VR: Spatial, Supernatural, Social & Smart --
Semantic Composition of 3D Content Behavior for Explorable Virtual Reality Applications --
Haptic Virtual Reality DFMA - A Case Study --
Interaction Techniques for Virtual Reality Based Automotive Design Reviews --
An Efficient Statistical Data Representation for Real-time Rendering of Metallic Effect Car Paints --
Containerized Distributed Rendering for Interactive Environments --
Model Based Compensation for Low Mass Objects Haptic Manipulation in Virtual Environments --
Impact of the visual rendering system on subjective auralization assessment in VR --
Can Virtual Human Entourage Elements Facilitate Accurate Distance Judgments in VR? --
Removing the mask - do people over trust avatars reconstructed from video? --
A Low-cost Virtual Reality Bike for Remote Cardiac Rehabilitation --
Supporting Rehabilitation of ADHD Children with Serious Games and Enhancement of Inhibition Mechanisms --
Reconstruction of Near Misses and Accidents for Analyses from Virtual Reality Usability Study.
Рубрики: Optical data processing.
   User interfaces (Computer systems).

   Special purpose computers.

   Computer system failures.

   E-commerce.

   Coding theory.

   Information theory.

   Computer Imaging, Vision, Pattern Recognition and Graphics.

   User Interfaces and Human Computer Interaction.

   Special Purpose and Application-Based Systems.

   System Performance and Evaluation.

   e-Commerce/e-business.

   Coding and Information Theory.

Анотація: This book constitutes the refereed proceedings of the 14th International Conference on Virtual Reality and Augmented Reality, EuroVR 2017, held in Laval, France, in December 2017. The 10 full papers and 2 short papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in four topical sections: interaction models and user studies, visual and haptic real-time rendering, perception and cognition, and rehabilitation and safety.

Перейти: https://doi.org/10.1007/978-3-319-72323-5

Дод.точки доступу:
Barbic, Jernej. \ed.\; D'Cruz, Mirabelle. \ed.\; Latoschik, Marc Erich. \ed.\; Slater, Mel. \ed.\; Bourdot, Patrick. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


   
    Electronic Government [[electronic resource] :] : 16th IFIP WG 8.5 International Conference, EGOV 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedings / / ed. Janssen, Marijn. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 422 p. 60 illus. - Б. ц.
    Зміст:
Smart governance, government and cities --
Service delivery --
Organizational aspects --
Infrastructures --
Big and open linked data --
Open government --
Evaluation.
Рубрики: Computers and civilization.
   Application software.

   Coding theory.

   Information theory.

   Computer security.

   Software engineering.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Coding and Information Theory.

   Systems and Data Security.

   Software Engineering.

Анотація: This book constitutes the proceedings of the 16th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2017, held in St. Petersburg, Russia, in September 2017, in conjunction with the 9th International Conference on eParticipation, ePart 2017. The 34 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers are clustered under the following topical sections: Smart Governance, Government and Cities; Service delivery; Organizational aspects; Infrastructures; Big and Open Linked Data; Open Government; and Evaluation.

Перейти: https://doi.org/10.1007/978-3-319-64677-0

Дод.точки доступу:
Janssen, Marijn. \ed.\; Axelsson, Karin. \ed.\; Glassey, Olivier. \ed.\; Klievink, Bram. \ed.\; Krimmer, Robert. \ed.\; Lindgren, Ida. \ed.\; Parycek, Peter. \ed.\; Scholl, Hans J. \ed.\; Trutnev, Dmitrii. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


   
    Electronic Participation [[electronic resource] :] : 9th IFIP WG 8.5 International Conference, ePart 2017, St. Petersburg, Russia, September 4-7, 2017, Proceedings / / ed. Parycek, Peter. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 161 p. 13 illus. - Б. ц.
    Зміст:
Methodological Issues in eParticipation --
eParticipation Implementations --
Policy Modeling and Policy Informatics --
Critical Reflections. .
Рубрики: Computers and civilization.
   Application software.

   Coding theory.

   Information theory.

   Computers.

   Law and legislation.

   E-commerce.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Coding and Information Theory.

   Legal Aspects of Computing.

   e-Commerce/e-business.

Анотація: This book constitutes the proceedings of the 9th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2017, held in St. Petersburg, Russia, in September 2017. The 11 revised full papers presented in this book were carefully reviewed and selected from 14 submissions. The papers reflect completed multi-disciplinary research ranging from policy analysis and conceptual modeling to programming and visualization of simulation models. They are organized in four topical threads: methodological issues in e-participation; e-participation implementations; policy modeling and policy informatics; critical reflections. .

Перейти: https://doi.org/10.1007/978-3-319-64322-9

Дод.точки доступу:
Parycek, Peter. \ed.\; Charalabidis, Yannis. \ed.\; Chugunov, Andrei V. \ed.\; Panagiotopoulos, Panos. \ed.\; Pardo, Theresa A. \ed.\; S?bo, Oystein. \ed.\; Tambouris, Efthimios. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


    Bremaud, Pierre.
    Discrete Probability Models and Methods [[electronic resource] :] : probability on Graphs and Trees, Markov Chains and Random Fields, Entropy and Coding / / Pierre. Bremaud ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 559 p. 92 illus. - Б. ц.
    Зміст:
Introduction --
1.Events and probability --
2.Random variables --
3.Bounds and inequalities --
4.Almost-sure convergence --
5.Coupling and the variation distance --
6.The probabilistic method --
7.Codes and trees --
8.Markov chains --
9.Branching trees --
10.Markov fields on graphs --
11.Random graphs --
12.Recurrence of Markov chains --
13.Random walks on graphs --
14.Asymptotic behaviour of Markov chains --
15.Monte Carlo sampling --
16. Convergence rates --
Appendix --
Bibliography.
Рубрики: Probabilities.
   Mathematical statistics.

   Graph theory.

   Coding theory.

   Information theory.

   Computer communication systems.

   Probability Theory and Stochastic Processes.

   Probability and Statistics in Computer Science.

   Graph Theory.

   Coding and Information Theory.

   Computer Communication Networks.

Анотація: The emphasis in this book is placed on general models (Markov chains, random fields, random graphs), universal methods (the probabilistic method, the coupling method, the Stein-Chen method, martingale methods, the method of types) and versatile tools (Chernoff's bound, Hoeffding's inequality, Holley's inequality) whose domain of application extends far beyond the present text. Although the examples treated in the book relate to the possible applications, in the communication and computing sciences, in operations research and in physics, this book is in the first instance concerned with theory. The level of the book is that of a beginning graduate course. It is self-contained, the prerequisites consisting merely of basic calculus (series) and basic linear algebra (matrices). The reader is not assumed to be trained in probability since the first chapters give in considerable detail the background necessary to understand the rest of the book. .

Перейти: https://doi.org/10.1007/978-3-319-43476-6

Дод.точки доступу:
Bremaud, Pierre. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


    Ivanis, Predrag.
    Information Theory and Coding - Solved Problems [[electronic resource] /] : монография / Predrag. Ivanis, Drajic, Dusan. ; . - 1st ed. 2017. - [S. l. : s. n.]. - VIII, 517 p. 252 illus. - Б. ц.
    Зміст:
Introduction --
Information Sources --
Data Compression --
Information Channels --
Block Codes --
Cyclic Codes --
Convolutional Codes and Viterbi Algorithm --
Trellis Decoding of Linear Block Codes, Turbo Codes --
Low Density Parity Check Codes.
Рубрики: Electrical engineering.
   Coding theory.

   Information theory.

   Computer science—Mathematics.

   Computer mathematics.

   Communications Engineering, Networks.

   Coding and Information Theory.

   Mathematical Applications in Computer Science.

Анотація: This book is offers a comprehensive overview of information theory and error control coding, using a different approach then in existed literature. The chapters are organized according to the Shannon system model, where one block affects the others. A relatively brief theoretical introduction is provided at the beginning of every chapter, including a few additional examples and explanations, but without any proofs. And a short overview of some aspects of abstract algebra is given at the end of the corresponding chapters. The characteristic complex examples with a lot of illustrations and tables are chosen to provide detailed insights into the nature of the problem. Some limiting cases are presented to illustrate the connections with the theoretical bounds. The numerical values are carefully selected to provide in-depth explanations of the described algorithms. Although the examples in the different chapters can be considered separately, they are mutually connected and the conclusions for one considered problem relate to the others in the book.

Перейти: https://doi.org/10.1007/978-3-319-49370-1

Дод.точки доступу:
Drajic, Dusan.; Ivanis, Predrag. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


   
    Applications of Computer Algebra [[electronic resource] :] : kalamata, Greece, July 20–23 2015 / / ed.: Kotsireas, Ilias S., Martinez-Moro, Edgar. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 515 p. 126 illus., 73 illus. in color. - Б. ц.
    Зміст:
An algebraic method to compute the mobility of closed-loop overconstrained mechanisms (Ali, Moinet, Serre) --
Simplicial topological coding and homology of spin networks (Berec) --
Trial set and Groebner bases for binary codes (Borges-Quintana, Borges-Trenard, Marti?nez-Moro) --
Automated Study of Envelopes of 1-parameter Families of Surfaces (Dana-Picard, Zehavi) --
Complex Roots of Quaternion Polynomials (Dospra, Poulakis) --
Mathematical renormalization in quantum electrodynamics via noncommutative generating series (Duchamp, Ngoc Minh, Quoc Hoan, Penson, Simonnet) --
The root lattice A2 in the construction of substitution tilings and singular hypersurfaces (Escudero) --
Finding eigenvalues of self-maps with the Kronecker canonical form (Ethier, Jablonski, Mrozek) --
Algorithm for Predicting Mathematical Formulae from Linear Strings for Mathematical Inputs (Fukui) --
Algebraic Modelling of Covering Arrays (Garn, Simos) --
Applications of Signatures Curves to Characterize Melanomas and Moles (Grim, Shakiban) --
Contemporary interpretation of a historical locus problem with the use of computer algebra (Hasek, Kovacs, Zahradnik) --
Computing the Chern-Schwartz-MacPherson Class of Complete Simplical Toric Varieties (Helmer) --
The Generalized Rabinowitsch Trick (Kapur, Sun, Wang, Zhou) --
A Web-based Quantum Computer Simulator with Symbolic Extensions (Karamitrou, Tsimpouris, Mavridi, Sgarbas) --
Dixon-EDF: The Premier Method for Solution of Parametric Polynomial Systems ( Lewis) --
Visualization of Orthonormal Triads in Cylindrical and Spherical Coordinates (Lopez-Garcia, Jimenez Zamudio, Diaz V.) --
Geometric and Computational Approach to Classical and Quantum Secret Sharing (Matsumoto, Ruano) --
Computing the Dixon Resultant with the Maple Package DR (Minimair) --
Collaborative Computer Algebra (Minimair) --
States and channels in quantum mechanics without complex numbers (Miszczak) --
Double Hough transform for estimating the position of the mandibular canal in dental radiographs (Onchis-Moaca, Zappala, Gotja, Real) --
Simple and Nearly Optimal Polynomial Root- nding by Means of Root Radii Approximation (Pan) --
A Fast Schur-Euclid-type Algorithm for Quasiseparable Polynomials (Perera, Olshevsky) --
The use of CAS Piranha for the construction of motion equations of the planetary system problem (Perminov, Kuznetsov) --
Code-Based Cryptosystems Using Generalized Concatenated Codes (Puchinger, Muelich, Ishak, Bossert) --
Univariate real root isolation over a single logarithmic extension of real algebraic numbers (Strzebonski, Tsigaridas) --
On the complexity of multivariate polynomial division (van der Hoeven) --
Preserving syntactic correctness while editing mathematical formulas (van der Hoeven, Lecerf, Raux) --
About balanced application of CAS in undergraduate mathematics (Varbanova) --
Some remarks on Taylor’s polynomials visualization using Mathematica in context of function approximation (Wojas, Krupa) --
Zooming algorithms for accurate plotting of functions of two real variables (Zeitoun, Dana-Picard).
Рубрики: Commutative algebra.
   Commutative rings.

   Algebra.

   Field theory (Physics).

   Coding theory.

   Information theory.

   Computer science—Mathematics.

   Computer mathematics.

   Algebraic geometry.

   Commutative Rings and Algebras.

   Field Theory and Polynomials.

   Coding and Information Theory.

   Mathematical Applications in Computer Science.

   Algebraic Geometry.

Анотація: The Applications of Computer Algebra (ACA) conference covers a wide range of topics from Coding Theory to Differential Algebra to Quantam Computing, focusing on the interactions of these and other areas with the discipline of Computer Algebra. This volume provides the latest developments in the field as well as its applications in various domains, including communications, modelling, and theoretical physics. The book will appeal to researchers and professors of computer algebra, applied mathematics, and computer science, as well as to engineers and computer scientists engaged in research and development.

Перейти: https://doi.org/10.1007/978-3-319-56932-1

Дод.точки доступу:
Kotsireas, Ilias S. \ed.\; Martinez-Moro, Edgar. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


    Costa, Sueli I. R.
    Lattices Applied to Coding for Reliable and Secure Communications [[electronic resource] /] : монография / Sueli I. R. Costa, Oggier, Frederique. [et al.] ; . - 1st ed. 2017. - [S. l. : s. n.]. - VI, 120 p. 43 illus., 33 illus. in color. - Б. ц.
    Зміст:
Introduction --
Lattices and Applications --
Lattices from Codes --
Ideal Lattices --
Lattices and Spherical Codes --
Lattice and Index Coding.
Рубрики: Convex geometry .
   Discrete geometry.

   Coding theory.

   Information theory.

   Data encryption (Computer science).

   Convex and Discrete Geometry.

   Coding and Information Theory.

   Cryptology.

Анотація: This book provides a first course on lattices – mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematicians for their structure and, at the same time, are used by electrical and computer engineers working on coding theory and cryptography. The book presents both fundamental concepts and a wealth of applications, including coding and transmission over Gaussian channels, techniques for obtaining lattices from finite prime fields and quadratic fields, constructions of spherical codes, and hard lattice problems used in cryptography. The topics selected are covered in a level of detail not usually found in reference books. As the range of applications of lattices continues to grow, this work will appeal to mathematicians, electrical and computer engineers, and graduate or advanced undergraduate in these fields.

Перейти: https://doi.org/10.1007/978-3-319-67882-5

Дод.точки доступу:
Oggier, Frederique.; Campello, Antonio.; Belfiore, Jean-Claude.; Viterbo, Emanuele.; Costa, Sueli I.R. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


   
    Compressed Sensing and its Applications [[electronic resource] :] : second International MATHEON Conference 2015 / / ed. Boche, Holger. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIX, 388 p. 77 illus., 57 illus. in color. - Б. ц.
    Зміст:
Preface --
On the Global-Local Dichotomy in Sparsity Modeling, Batenkov, Romano, Elad --
Fourier Phase Retrieval: Uniqueness and Algorithms, Bendory, Beinert, Eldar --
Compressed Sensing Approaches for Polynomial Approximation of High-Dimensional Functions, Adcock, Brugiapaglia, Webster --
Multisection in the Stochastic Block Model using Semidefinite Programming, Agarwal, Bandeira, Koiliaris, Kolla --
Recovering Signals with Unknown Sparsity in Multiple Dictionaries, Ahmad, Schniter --
Compressive Classification and the Rare Eclipse Problem, Bandeira, Mixon, Recht --
Weak Phase Retrieval, Bothelo-Andrade, Casazza, Ghoreishi, Jose, Tremain --
Cubatures on Grassmannians: Moments, Dimension Reduction, and Related Topics, Breger, Ehler, Graf, Peter --
A Randomized Tensor Train Singular Value Decomposition, Huber, Schneider, Wolf --
Versatile and Scalable Cosparse Methods for Phsyics-driven Inverse Problems, Kitic, Bensiad, Albera, Bertin, Gribonval --
Total Variation Minimization in Compressed Sensing, Felix Krahmer, Kruschel, Sandbichler --
Compressed Sensing in Hilbert Spaces, Traonmilin, Puy, Gribonval, Davies.
Рубрики: Information theory.
   Numerical analysis.

   Signal processing.

   Image processing.

   Speech processing systems.

   Coding theory.

   Matrix theory.

   Algebra.

   Computer mathematics.

   Information and Communication, Circuits.

   Numerical Analysis.

   Signal, Image and Speech Processing.

   Coding and Information Theory.

   Linear and Multilinear Algebras, Matrix Theory.

   Computational Science and Engineering.

Анотація: This contributed volume contains articles written by the plenary and invited speakers from the second international MATHEON Workshop 2015 that focus on applications of compressed sensing. Article authors address their techniques for solving the problems of compressed sensing, as well as connections to related areas like detecting community-like structures in graphs, curbatures on Grassmanians, and randomized tensor train singular value decompositions. Some of the novel applications covered include dimensionality reduction, information theory, random matrices, sparse approximation, and sparse recovery.  This book is aimed at both graduate students and researchers in the areas of applied mathematics, computer science, and engineering, as well as other applied scientists exploring the potential applications for the novel methodology of compressed sensing. An introduction to the subject of compressed sensing is also provided for researchers interested in the field who are not as familiar with it. .

Перейти: https://doi.org/10.1007/978-3-319-69802-1

Дод.точки доступу:
Boche, Holger. \ed.\; Caire, Giuseppe. \ed.\; Calderbank, Robert. \ed.\; Marz, Maximilian. \ed.\; Kutyniok, Gitta. \ed.\; Mathar, Rudolf. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


   
    Public-Key Cryptography – PKC 2017 [[electronic resource] :] : 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I / / ed. Fehr, Serge. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 466 p. 32 illus. - Б. ц.
    Зміст:
Cryptanalysis, Protocols --
Encrpytion Schemes --
Leakage-Resilient and Non-Malleable Codes --
Number Theory and Die-Hellman --
Encryption with Access Control --
Special Signatures --
Fully Homomorphic Encryption --
Real-World Schemes --
Multiparty Computation --
Primitives.
Рубрики: Data encryption (Computer science).
   Computer security.

   Coding theory.

   Information theory.

   Computer communication systems.

   Algorithms.

   Management information systems.

   Computer science.

   Cryptology.

   Systems and Data Security.

   Coding and Information Theory.

   Computer Communication Networks.

   Algorithm Analysis and Problem Complexity.

   Management of Computing and Information Systems.

Анотація: The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Перейти: https://doi.org/10.1007/978-3-662-54365-8

Дод.точки доступу:
Fehr, Serge. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Electronic Government and the Information Systems Perspective [[electronic resource] :] : 6th International Conference, EGOVIS 2017, Lyon, France, August 28-31, 2017, Proceedings / / ed.: Ko, Andrea., Francesconi, Enrico. - 1st ed. 2017. - [S. l. : s. n.]. - XI, 307 p. 69 illus. - Б. ц.
Рубрики: Computers and civilization.
   Application software.

   Coding theory.

   Information theory.

   E-commerce.

   Computers.

   Law and legislation.

   Information storage and retrieval.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Coding and Information Theory.

   e-Commerce/e-business.

   Legal Aspects of Computing.

   Information Storage and Retrieval.

Анотація: This book constitutes the refereed proceedings of the 6th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2017, held in Lyon, France, in August 2017. The 20 revised full papers presented were carefully reviewed and selected from 24 submissions. The papers areorganized in the following topical sections: digitalization and transparency; open data ecosystems; intelligent systems in e-government; e-government research and intelligent systems; m-government and inclusion; e-government cases - data knowledge management; and knowledge management in the context of e-government.

Перейти: https://doi.org/10.1007/978-3-319-64248-2

Дод.точки доступу:
Ko, Andrea. \ed.\; Francesconi, Enrico. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


    Tomlinson, Martin.
    Error-Correction Coding and Decoding [[electronic resource] :] : bounds, Codes, Decoders, Analysis and Applications / / Martin. Tomlinson, Tjhai, Cen Jung. [et al.] ; . - 1st ed. 2017. - [S. l. : s. n.]. - XX, 522 p. 134 illus., 82 illus. in color. - Б. ц.
    Зміст:
Part I: Theoretical Performance of Error-Correcting Codes --
Bounds on Error Correction Coding Performance --
Soft and Hard Decision Decoding Performance --
Soft Decision and Quantised Soft Decision Decoding --
Part II: Code Construction --
Cyclotomic Cosets, The Mattson–Solomon Polynomial, Idempotents and Cyclic Codes --
Good Binary Linear Codes --
Lagrange Codes --
Extended BCH --
Reed–Solomon Codes --
Algebraic Geometry Codes --
Algebraic Quasi Cyclic Codes --
Convolutional Codes: A Historical Perspective --
Aalogue BCH Codes --
LDPC Codes --
Part III: Analysis of Codes --
True Search for Stopping Sets for LDPC Codes --
Part IV: Decoders --
Erasures and Error-Correcting Codes --
The Modified Dorsch Decoder --
A Concatenated Error-Correction System Using the |u|u+v| Code Construction --
Part V: Applications --
Combined Error Detection and Error Correction --
Password Correction and Confidential Information Access System --
Variations on the McEliece Public Key Encryption System --
Error-Correcting Codes and Dirty-Paper Coding.
Рубрики: Electrical engineering.
   Computer communication systems.

   Coding theory.

   Information theory.

   Algorithms.

   Communications Engineering, Networks.

   Computer Communication Networks.

   Coding and Information Theory.

   Algorithms.

Анотація: This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of research organized into five parts: Part I is concerned with the theoretical performance attainable by using error correcting codes to achieve communications efficiency in digital communications systems. Part II explores the construction of error-correcting codes and explains the different families of codes and how they are designed. Techniques are described for producing the very best codes. Part III addresses the analysis of low-density parity-check (LDPC) codes, primarily to calculate their stopping sets and low-weight codeword spectrum which determines the performance of th ese codes. Part IV deals with decoders designed to realize optimum performance. Part V describes applications which include combined error correction and detection, public key cryptography using Goppa codes, correcting errors in passwords and watermarking. This book is a valuable resource for anyone interested in error-correcting codes and their applications, ranging from non-experts to professionals at the forefront of research in their field This book is open access under a CC BY 4.0 license.

Перейти: https://doi.org/10.1007/978-3-319-51103-0

Дод.точки доступу:
Tjhai, Cen Jung.; Ambroze, Marcel A.; Ahmed, Mohammed.; Jibril, Mubarak.; Tomlinson, Martin. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


   
    Computational Information Geometry [[electronic resource] :] : for Image and Signal Processing / / ed.: Nielsen, Frank., Critchley, Frank., Dodson, Christopher T. J. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 299 p. 79 illus. - Б. ц.
    Зміст:
Medical Applications --
Cognition and Learning --
Video Image Analysis --
Advanced Radar Processing.
Рубрики: Signal processing.
   Image processing.

   Speech processing systems.

   Statistics .

   Probabilities.

   Coding theory.

   Information theory.

   Biomedical engineering.

   Signal, Image and Speech Processing.

   Statistics and Computing/Statistics Programs.

   Probability Theory and Stochastic Processes.

   Coding and Information Theory.

   Biomedical Engineering and Bioengineering.

Анотація: This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

Перейти: https://doi.org/10.1007/978-3-319-47058-0

Дод.точки доступу:
Nielsen, Frank. \ed.\; Critchley, Frank. \ed.\; Dodson, Christopher T. J. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-40   41-42 
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)