Dieses Lehrbuch bietet eine fundierte Einfuhrung in die grundlegenden Begriffe und Methoden der Informatik. Die Autoren stellen dabei die Prinzipien der System-Modellierung und der Entwicklung von Software in den Mittelpunkt der Darstellung. Der hier vorliegende Band vermittelt die wesentlichen Grundbegriffe und theoretischen Grundlagen der Informatik, wie z.B. Algebren, Relationen, elementare Logik, funktionales Programmieren, abstrakte Datentypen. Die vierte Auflage des bewahrten Lehrbuches i...
Theory and Applications of Higher-Dimensional Hadamard Matrices (Combinatorics and Computer Science, #1)
by Yang Yi Xian
This is the first book on higher dimensional Hadamard matrices and their applications in telecommunications and information security. It is divided into three parts according to the dimensions of the Hadamard matrices treated.
Handbook of Information and Communication Security
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called "Y2K" issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A po...
Among the group of physics honors students huddled in 1957 on a Colorado mountain watching Sputnik bisect the heavens, one young scientist was destined, three short years later, to become a key player in America's own top-secret spy satellite program. One of our era's most prolific mathematicians, Karl Gustafson was given just two weeks to write the first US spy satellite's software. The project would fundamentally alter America's Cold War strategy, and this autobiographical account of a remarka...
Diese in der Neuauflage zweibandige Einfuhrung behandelt die fundamentalen Modelle, Formalismen und sprachlichen Konstruktionen sowie die wichtigsten Anwendungsgebiete und technischen Konzeptionen der Informatik. Die Darstellung zeichnet sich durch saubere formale Fundierung und begriffliche Klarheit aus. Der vorliegende Band 2 fasst die in der 1. Auflage getrennt erschienenen Teile III und IV zusammen. Teil III behandelt Grundbegriffe und Beschreibungstechniken fur verteilte informationsverarbe...
This book constitutes the refereed proceedings of the Third International Conference on Advanced Data Mining and Applications, ADMA 2007, held in Harbin, China in August 2007. The papers focus on advancements in data mining and peculiarities and challenges of real world applications using data mining.
Economics of Information Security and Privacy
The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has...
Illustrated Computational Intelligence (Studies in Computational Intelligence, #931)
by Priti Srinivas Sajja
This book presents a summary of artificial intelligence and machine learning techniques in its first two chapters. The remaining chapters of the book provide everything one must know about the basic artificial intelligence to modern machine intelligence techniques including the hybrid computational intelligence technique, using the concepts of several real-life solved examples, design of projects and research ideas. The solved examples with more than 200 illustrations presented in the book are...
Proceedings of the Satellite Workshops of ICVGIP 2021 (Lecture Notes in Electrical Engineering, #924)
This book constitutes peer-reviewed proceedings of satellite workshops of the 12th Indian Conference on Computer Vision, Graphics, and Image Processing (ICVGIP 2021). The book focuses on medical image processing, digital heritage, document analysis and recognition, and computer vision applications. The first part includes submissions on digital archiving and restoration methods with interesting and innovative research components. The second part focuses on medical imaging modalities including MR...
This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programm...
Mathematical Logic (Collected Works of A.M. Turing)
by R.O. Gandy and C.E.M. Yates
Mathematical Logic is a collection of the works of one of the leading figures in 20th-century science. This collection of A.M. Turing's works is intended to include all his mature scientific writing, including a substantial quantity of unpublished material. His work in pure mathematics and mathematical logic extended considerably further; the work of his last years, on morphogenesis in plants, is also of the greatest originality and of permanent importance. This book is divided into three parts...
Information Theory and Applications II (Lecture Notes in Computer Science, #1133)
This book constitutes the refereed postworkshop proceedings of the Fourth Canadian Workshop on Information Theory, held in Lac Delage, Quebec, in May 1995. The book contains 18 revised full papers selected from 30 workshop presentations; also included are three invited contributions. The book is divided into sections on algebraic coding, cryptography and secure communications, decoding methods and techniques, coding and modulation for fading channels, and signal processing and pattern recognitio...
Speech Dereverberation (Signals and Communication Technology)
Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberation. Speech Dereverberation presents current approaches to the problem of reverberation. It provides a review of topics in room acoustics and also describes performance measures for dereverberation. The algorithms are then explained with mathematical analysis and examples that enable the reader to see the strengths and weaknesses of the various techniq...
The volume LNCS 12393 constitutes the papers of the 22nd International Conference Big Data Analytics and Knowledge Discovery which will be held online in September 2020. The 15 full papers presented together with 14 short papers plus 1 position paper in this volume were carefully reviewed and selected from a total of 77 submissions. This volume offers a wide range to following subjects on theoretical and practical aspects of big data analytics and knowledge discovery as a new generation...
The two-volume set IFIP AICT 591 and 592 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2020, held in Novi Sad, Serbia, in August/September 2020. The 164 papers presented were carefully reviewed and selected from 199 submissions. They discuss globally pressing issues in smart manufacturing, operations management, supply chain management, and Industry 4.0. The papers are organized in the following topical sectio...
The Internet Age: on the face of it, an era of unprecedented freedom in both communication and culture. Yet in the past, each major new medium, from telephone to satellite television, has crested on a wave of similar idealistic optimism, before succumbing to the inevitable undertow of industrial consolidation. Every once free and open technology has, in time, become centralized and closed; as corporate power has taken control of the 'master switch.' Today a similar struggle looms over the Intern...
Als im Jahre 1940 ein schwedischer Mathematiker die Verschlusselung fur die deutsche strategische Militarkommunikation knackte, war dies eine der groessten Errungenschaften in der Geschichte der Kryptologie. Die fachlich prazise Geschichte dieses Ereignisses kann mit allen Bestandteilen eines klassischen Thrillers aufwarten: Eine verzweifelte Kriegssituation, ein launischer, heimlich tuender und gleichzeitig genialer Mathematiker mit einer besonderen Begabung fur die Kryptologie, und eine atembe...
Advances in Artificial Intelligence, Computation, and Data Science (Computational Biology)
Artificial intelligence (AI) has become pervasive in most areas of research and applications. While computation can significantly reduce mental efforts for complex problem solving, effective computer algorithms allow continuous improvement of AI tools to handle complexity-in both time and memory requirements-for machine learning in large datasets. Meanwhile, data science is an evolving scientific discipline that strives to overcome the hindrance of traditional skills that are too limited to en...
Uncertainty in Multi-Source Databases (Studies in Fuzziness and Soft Computing, #130)
by Premchand S. Nair
Database and database systems have become an essential part of everyday life, such as in banking activities, online shopping, or reservations of airline tickets and hotels. These trends place more demands on the capabilities of future database systems, which need to evolve into decision making systems based on data from multiple sources with varying reliability. In this book a model for the next generation of database systems is presented. It is demonstrated how to quantize favorable and unfavor...
Blockchain Technology in Internet of Things
by Liehuang Zhu, Keke Gai, and Meng Li
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be i...
Fundamentals of Physical Design and Query Compilation (Synthesis Lectures on Data Management)
by David Toman and Grant Weddell
Query compilation is the problem of translating user requests formulated over purely conceptual and domain specific ways of understanding data, commonly called logical designs, to efficient executable programs called query plans. Such plans access various concrete data sources through their low-level often iterator-based interfaces. An appreciation of the concrete data sources, their interfaces and how such capabilities relate to logical design is commonly called a physical design. This book is...
The AAECC Symposia Series was started in 1983 by Alain Poli (Toulouse), who, together with R. Desq, D. Lazard, and P. Camion, organized the ?rst conference. Originally the acronym AAECC meant “Applied Algebra and Error-Correcting Codes”. Over the years its meaning has shifted to “Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes”, re?ecting the growing importance of complexity in both decoding algorithms and computational algebra. AAECC aims to encourage cross-fertilization betwe...
Statistical and Inductive Inference by Minimum Message Length (Information Science and Statistics)
by C.S. Wallace
Mythanksareduetothemanypeoplewhohaveassistedintheworkreported here and in the preparation of this book. The work is incomplete and this account of it rougher than it might be. Such virtues as it has owe much to others; the faults are all mine. MyworkleadingtothisbookbeganwhenDavidBoultonandIattempted to develop a method for intrinsic classi?cation. Given data on a sample from some population, we aimed to discover whether the population should be considered to be a mixture of di?erent types, clas...