The use of mobile communication devices has grown phenomenally throughout the world during the last few years. With strong consumer demand to increase data delivery (large emails, browsing the Internet on wireless devices, transferring video images, etc.), engineers are faced with the challenge of enhancing CDMA to provide larger data capabilities while improving voice signals for clearer reception. In November 2001 the U.S. Federal Communications Commission released a much broader band of fre...
This book aims to foster machine and deep learning approaches to data-driven applications, in which data governs the behaviour of applications. Applications of Artificial intelligence (AI)-based systems play a significant role in today's software industry. The sensors data from hardware-based systems making a mammoth database, increasing day by day. Recent advances in big data generation and management have created an avenue for decision-makers to utilize these huge volumes of data for different...
Error-Correcting Linear Codes (Algorithms and Computation in Mathematics, #18)
by Anton Betten, Michael Braun, Harald Fripertinger, Adalbert Kerber, Axel Kohnert, and Alfred Wassermann
This text offers an introduction to error-correcting linear codes for researchers and graduate students in mathematics, computer science and engineering. The book differs from other standard texts in its emphasis on the classification of codes by means of isometry classes. The relevant algebraic are developed rigorously. Cyclic codes are discussed in great detail. In the last four chapters these isometry classes are enumerated, and representatives are constructed algorithmically.
Cryptography in Constant Parallel Time (Information Security and Cryptography)
by Benny Applebaum
Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth. This book establishes, for the first tim...
This book constitutes the proceedings of the 24th International Conference on Principles and Practice of Constraint Programming, CP 2018, held in Lille, France, in August 2018.The 41 full and 9 short papers presented in this volume were carefully reviewed and selected from 114 submissions. They deal with all aspects of computing with constraints including theory, algorithms, environments, languages, models, systems, and applications such as decision making, resource allocation, scheduling, confi...
This book constitutes the proceedings of the 7th International Conference on Wireless and Satellite Services, WiSATS 2015, held in Bradford, UK, in July 2015. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed to WiSATS. The 29 revised papers were presented at the conference in three technical sessions...
Fundamentals of Object Databases (Synthesis Lectures on Data Management)
by Suzanne Dietrich and Susan Urban
Object-oriented databases were originally developed as an alternative to relational database technology for the representation, storage, and access of non-traditional data forms that were increasingly found in advanced applications of database technology. After much debate regarding object-oriented versus relational database technology, object-oriented extensions were eventually incorporated into relational technology to create object-relational databases. Both object-oriented databases and obje...
Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics. The volume represents the first multi-authored attempt to deal with the range of codes relevant to life, and to reveal the ubiquitous role of coding mechanisms in both organic and mental evolution.
This book contains the refereed proceedings of the 10th International Conference on Knowledge Management in Organizations, KMO 2015, held in Maribor, Slovenia, in August 2015. The theme of the conference was "Knowledge Management and Internet of Things." The KMO conference brings together researchers and developers from industry and academia to discuss how knowledge management using big data can improve innovation and competitiveness. The 59 contributions accepted for KMO 2015 were selected fr...
This book is about the nature of information. It touches on many core issues of philosophy of the mind, ontology, and epistemology, and draws in several domain-specific concepts from physics, mathematics, thermodynamics, computer science, and biology. The terms used in this book, such as the mind, a conscious agent, meaning, and knowledge are used with very precise meanings because they can be easily misinterpreted. A proper understanding of these terms can be gained from the referenced literatu...
Advanced Metasearch Engine Technology (Synthesis Lectures on Data Management)
by Weiyi Meng and Clement Yu
Among the search tools currently on the Web, search engines are the most well known thanks to the popularity of major search engines such as Google and Yahoo!. While extremely successful, these major search engines do have serious limitations. This book introduces large-scale metasearch engine technology, which has the potential to overcome the limitations of the major search engines. Essentially, a metasearch engine is a search system that supports unified access to multiple existing search eng...
This Vaxjo conference was devoted to the reconsideration of quantum foundations. Due to increasing research in quantum information theory, especially on quantum computing and cryptography, many questions regarding the foundations of quantum mechanics, which have long been considered to be exclusively of philosophical interest, nowadays play an important role in theoretical and experimental quantum physics.
Internet of Things (Communications in Computer and Information Science, #1727)
This book constitutes the refereed and selected papers presented during the Third International Conference on Internet of Things, ICIoT 2022, held in Chennai, India, in April 2022. The 10 papers were thoroughly reviewed and selected from the 100 qualified submissions. They focus on application of IoT in the field of Computer Science and Information Technology as well as on Industrial IoT.
Database Issues in Geographic Information Systems (Advances in Database Systems, #6)
by Nabil R. Adam and Aryya Gangopadhyay
Geographic Information Systems (GIS) have been experiencing a steady and unprecedented growth in terms of general interest, theory development, and new applications in the last decade or so. GIS is an inter-disciplinary field that brings together many diverse areas such as computer science, geography, cartography, engineering, and urban planning. Database Issues in Geographic Information Systems approaches several important topics in GIS from a database perspective. Database management...
Operations Research and Enterprise Systems (Communications in Computer and Information Science, #966)
This book constitutes the refereed proceedings of the Third International Conference on Operations Research and Enterprise Systems, ICORES 2014, held in Angers, France, in March 2014. The 18 revised full papers presented together with an invited paper were carefully reviewed and selected from 96 submissions. The papers are organized in topical sections on Methodologies and Technologies and Applications.
This book constitutes the refereed proceedings of the 10th International Conference on Theory and Applications of Models of Computation, TAMC 2013, held in Hong Kong, China, in May 2013. The 31 revised full papers presented were carefully reviewed and selected from 70 submissions. Bringing together a wide range of researchers with interests in computational theory and applications, the papers address the three main themes of the conference which were computability, complexity, and algorithms and...
This volume contains the proceedings of CONCURRENCY 88, an international conference on formal methods for distributed systems, held October 18-19, 1988 in Hamburg. CONCURRENCY 88 responded to great interest in the field of formal methods as a means of mastering the complexity of distributed systems. In addition, the impulse was determined by the fact that the various methodological approaches, such as constructive or property oriented methods, have not had an extensive comparative analysis nor h...
Continued Fractions with Applications (Studies in Computational Mathematics)
by L. Lorentzen and H. Waadeland
This book is aimed at two kinds of readers: firstly, people working in or near mathematics, who are curious about continued fractions; and secondly, senior or graduate students who would like an extensive introduction to the analytic theory of continued fractions. The book contains several recent results and new angles of approach and thus should be of interest to researchers throughout the field. The first five chapters contain an introduction to the basic theory, while the last seven chapters...
Pro ADO.NET Data Services: Working with RESTful Data is aimed at developers interested in taking advantage of the REST-style data services that ADO.NET Data Services (formerly code-named Astoria) provides. The book shows how to incorporate ADO.NET Data Services into a wide range of common environments, including BizTalk, Ajax and Silverlight client applications. The material is intended for professional developers who are comfortable with the .NET 3.5 Framework but are coming to ADO.NET Data Ser...
Block Error-Correcting Codes (Universitext)
by Sebastian Xambo-Descamps
Error-correcting codes have been incorporated in numerous working communication and memory systems. This book covers the mathematical aspects of the theory of block error-correcting codes together, in mutual reinforcement, with computational discussions, implementations and examples of all relevant concepts, functions and algorithms. This combined approach facilitates the reading and understanding of the subject.The digital companion of the book is a non-printable .pdf document with hyperlinks....
Data Cleaning (Synthesis Lectures on Data Management)
by Venkatesh Ganti and Anish Das Sarma
Data warehouses consolidate various activities of a business and often form the backbone for generating reports that support important business decisions. Errors in data tend to creep in for a variety of reasons. Some of these reasons include errors during input data collection and errors while merging data collected independently across different databases. These errors in data warehouses often result in erroneous upstream reports, and could impact business decisions negatively. Therefore, one...
Advances in Database Technology - Edbt 2004 (Lecture Notes in Computer Science, #2992)
The 9th International Conference on Extending Database Technology, EDBT 2004, was held in Heraklion, Crete, Greece, during March 14-18, 2004. The EDBT series of conferences is an established and prestigious forum for the exchange of the latest research results in data management. Held every two years in an attractive European location, the conference provides unique opp- tunities for database researchers, practitioners, developers, and users to explore new ideas, techniques, and tools, and to ex...