The use of mobile communication devices has grown phenomenally throughout the world during the last few years. With strong consumer demand to increase data delivery (large emails, browsing the Internet on wireless devices, transferring video images, etc.), engineers are faced with the challenge of enhancing CDMA to provide larger data capabilities while improving voice signals for clearer reception. In November 2001 the U.S. Federal Communications Commission released a much broader band of fre...
This book aims to foster machine and deep learning approaches to data-driven applications, in which data governs the behaviour of applications. Applications of Artificial intelligence (AI)-based systems play a significant role in today's software industry. The sensors data from hardware-based systems making a mammoth database, increasing day by day. Recent advances in big data generation and management have created an avenue for decision-makers to utilize these huge volumes of data for different...
Error-Correcting Linear Codes (Algorithms and Computation in Mathematics, #18)
by Anton Betten, Michael Braun, Harald Fripertinger, Adalbert Kerber, Axel Kohnert, and Alfred Wassermann
This text offers an introduction to error-correcting linear codes for researchers and graduate students in mathematics, computer science and engineering. The book differs from other standard texts in its emphasis on the classification of codes by means of isometry classes. The relevant algebraic are developed rigorously. Cyclic codes are discussed in great detail. In the last four chapters these isometry classes are enumerated, and representatives are constructed algorithmically.
Cryptography in Constant Parallel Time (Information Security and Cryptography)
by Benny Applebaum
Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth. This book establishes, for the first tim...
This book constitutes the proceedings of the 24th International Conference on Principles and Practice of Constraint Programming, CP 2018, held in Lille, France, in August 2018.The 41 full and 9 short papers presented in this volume were carefully reviewed and selected from 114 submissions. They deal with all aspects of computing with constraints including theory, algorithms, environments, languages, models, systems, and applications such as decision making, resource allocation, scheduling, confi...
This book constitutes the proceedings of the 7th International Conference on Wireless and Satellite Services, WiSATS 2015, held in Bradford, UK, in July 2015. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed to WiSATS. The 29 revised papers were presented at the conference in three technical sessions...
Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics. The volume represents the first multi-authored attempt to deal with the range of codes relevant to life, and to reveal the ubiquitous role of coding mechanisms in both organic and mental evolution.
This book contains the refereed proceedings of the 10th International Conference on Knowledge Management in Organizations, KMO 2015, held in Maribor, Slovenia, in August 2015. The theme of the conference was "Knowledge Management and Internet of Things." The KMO conference brings together researchers and developers from industry and academia to discuss how knowledge management using big data can improve innovation and competitiveness. The 59 contributions accepted for KMO 2015 were selected fr...
This Vaxjo conference was devoted to the reconsideration of quantum foundations. Due to increasing research in quantum information theory, especially on quantum computing and cryptography, many questions regarding the foundations of quantum mechanics, which have long been considered to be exclusively of philosophical interest, nowadays play an important role in theoretical and experimental quantum physics.
Internet of Things (Communications in Computer and Information Science, #1727)
This book constitutes the refereed and selected papers presented during the Third International Conference on Internet of Things, ICIoT 2022, held in Chennai, India, in April 2022. The 10 papers were thoroughly reviewed and selected from the 100 qualified submissions. They focus on application of IoT in the field of Computer Science and Information Technology as well as on Industrial IoT.
Database Issues in Geographic Information Systems (Advances in Database Systems, #6)
by Nabil R. Adam and Aryya Gangopadhyay
Geographic Information Systems (GIS) have been experiencing a steady and unprecedented growth in terms of general interest, theory development, and new applications in the last decade or so. GIS is an inter-disciplinary field that brings together many diverse areas such as computer science, geography, cartography, engineering, and urban planning. Database Issues in Geographic Information Systems approaches several important topics in GIS from a database perspective. Database management...
This book constitutes the refereed proceedings of the 10th International Conference on Theory and Applications of Models of Computation, TAMC 2013, held in Hong Kong, China, in May 2013. The 31 revised full papers presented were carefully reviewed and selected from 70 submissions. Bringing together a wide range of researchers with interests in computational theory and applications, the papers address the three main themes of the conference which were computability, complexity, and algorithms and...
Continued Fractions with Applications (Studies in Computational Mathematics)
by L. Lorentzen and H. Waadeland
This book is aimed at two kinds of readers: firstly, people working in or near mathematics, who are curious about continued fractions; and secondly, senior or graduate students who would like an extensive introduction to the analytic theory of continued fractions. The book contains several recent results and new angles of approach and thus should be of interest to researchers throughout the field. The first five chapters contain an introduction to the basic theory, while the last seven chapters...
Pro ADO.NET Data Services: Working with RESTful Data is aimed at developers interested in taking advantage of the REST-style data services that ADO.NET Data Services (formerly code-named Astoria) provides. The book shows how to incorporate ADO.NET Data Services into a wide range of common environments, including BizTalk, Ajax and Silverlight client applications. The material is intended for professional developers who are comfortable with the .NET 3.5 Framework but are coming to ADO.NET Data Ser...
Block Error-Correcting Codes (Universitext)
by Sebastian Xambo-Descamps
Error-correcting codes have been incorporated in numerous working communication and memory systems. This book covers the mathematical aspects of the theory of block error-correcting codes together, in mutual reinforcement, with computational discussions, implementations and examples of all relevant concepts, functions and algorithms. This combined approach facilitates the reading and understanding of the subject.The digital companion of the book is a non-printable .pdf document with hyperlinks....
Data Cleaning (Synthesis Lectures on Data Management)
by Venkatesh Ganti and Anish Das Sarma
Data warehouses consolidate various activities of a business and often form the backbone for generating reports that support important business decisions. Errors in data tend to creep in for a variety of reasons. Some of these reasons include errors during input data collection and errors while merging data collected independently across different databases. These errors in data warehouses often result in erroneous upstream reports, and could impact business decisions negatively. Therefore, one...
Knowledge Discovery in Databases (Lecture Notes in Computer Science, #4213) (Lecture Notes in Artificial Intelligence, #4213)
by Johannes Furnkranz
This book constitutes the refereed proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, PKDD 2006. The book presents 36 revised full papers and 26 revised short papers together with abstracts of 5 invited talks, carefully reviewed and selected from 564 papers submitted. The papers offer a wealth of new results in knowledge discovery in databases and address all current issues in the area.
The Prentice Hall Essence of Engineering Series provides a concise, practical and uniform introduction to the core components of an undergraduate Engineering degree. Acknowledging recent changes within higher education, this approach uses a variety of pedagogical tools - case studies, worked examples and self-test questions - to underpin the student's learning. The Essence of Communication Theory provides the reader with everything that they need to know about communications theory in one conci...
Query Answer Authentication (Synthesis Lectures on Data Management)
by Hweehwa Pang and Tan Kian-Lee
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completene...
Making Sense of Inner Sense 'Terra cognita' is terra incognita. It is difficult to find someone not taken abackand fascinated by the incomprehensible but indisputable fact: there are material systems which are aware of themselves. Consciousness is self-cognizing code. During homo sapiens's relentness and often frustrated search for self-understanding various theories of consciousness have been and continue to be proposed. However, it remains unclear whether and at what level the problems...
Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen technical chapters. Each chapter focuses on a particular communication technology utilizing turbo codes, and they are written by experts who have been working in related th areas from around the world. This book is published to celebrate the 10 year anniversary of turbo codes invention by Claude Berrou Alain Glavieux and Punya Thitimajshima (1993-2003). As known for more t...
Essential Tools for Water Resources Analysis, Planning, and Management (Springer Water)
This book describes concepts and tools needed for water resources management, including methods for modeling, simulation, optimization, big data analysis, data mining, remote sensing, geographical information system, game theory, conflict resolution, System dynamics, agent-based models, multiobjective, multicriteria, and multiattribute decision making and risk and uncertainty analysis, for better and sustainable management of water resources and consumption, thus mitigating the present and futur...