Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Offers a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer and communication security. This monograph provides a tutorial on combinatorial designs, which gives an overview of the theory. The application of combinatorial designs to authentication and secrecy codes is also described in depth.
Working at the intersection of information theory and neighboring disciplines, the authors provide a comprehensive survey of a particular area of asymptotic frame theory that can drastically improve the performance of codes used in communication and signal processing systems.
Focuses on some of the key modern mathematical tools that are used for the derivation of concentration inequalities, on their links to information theory, and on their various applications to communications and coding. In addition to being a survey, this book also includes various new recent results derived by the authors.
The field of community detection has been expanding greatly since the 1980s, with a remarkable diversity of models and algorithms developed in different communities. Various fundamental questions remain nonetheless unsettled. This monograph describes recent developments in answering these questions in the context of block models.
Describes the principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The focus is on secrecy generation in two settings: a multiterminal source model and a multiterminal channel model.
Discusses recent advances in coding for non-volatile memories, covering topics such as error correction coding based on novel algebraic and graph-based methods, rank modulation, rewriting codes, and constrained coding. This book illuminates the advantages - as well as challenges - associated with modern NVMs.
Multi-way communication is a means to significantly improve the spectral efficiency of wireless networks. This book provides an overview of the developments in this research area. The basic two-way communication channel is considered first, followed by the two-way relay channel obtained by the deployment of an additional cooperative relay node.
Focuses on energy-efficient wireless network design, including resource allocation, scheduling, precoding, relaying, and decoding. Starting from simple point-to-point systems and then gradually moving towards more complex interference networks, energy efficiency is defined and its properties characterized.
Focuses on some of the key modern mathematical tools that are used for the derivation of concentration inequalities, on their links to information theory, and on their various applications to communications and coding. The book also includes various new recent results derived by the authors.
Presents the first Rate Distortion Bounds for Voice and Video that actually lower bound the operational rate distortion performance of the best-performing voice and video codecs. This is essential reading for researchers in information theory and signal processing working on theoretical and practical aspects of data compression.
Surveys coding techniques for Networked Distributed Storage Systems, which aim at achieving fault tolerance efficiently and good repairability characteristics to replenish the lost redundancy, and ensure data durability over time.
The technique underlying polar codes is "channel polarization": creating extremal channels those that are either noiseless or useless from mediocre ones. Polarization and Polar Codes offer an in-depth tutorial on this exciting technique that promises to offer major improvements in digital communications systems.
Provides an overview of the state-of-the-art of biometric security systems. Using information theoretic techniques, the book discusses some of the most promising methods to provide practical, but safe systems. It studies a number of problems related to the design of biometric secrecy systems for both authentication and identification.
Introduces the concept of interference alignment via a series of simple linear algebraic examples that very effectively convey the central idea of interference alignment. The ideas behind the various communication theoretic instantiations and applications of the technique are illustrated through simple examples that come across as neat puzzles.
Written by the inventors, Raptor Codes provides an introduction to the theory, design and practical implementation of a class of codes that provide practical value to a large variety of data communication applications. This is essential reading for researchers, engineers and computer scientists implementing data transmission applications.
Emphasises parallelism between information theory and statistical physics, as well as to the insights, the analysis tools, and techniques that can be borrowed from statistical physics and "imported" to certain problem areas in information theory.
Explores the applications of information theory concepts in statistics, in the finite alphabet setting. The topics covered include large deviations, hypothesis testing, maximum likelihood estimation in exponential families, analysis of contingency tables, and iterative algorithms with an "information geometry" background.
Security issues arising in communication networks include confidentiality, integrity, authentication and non-repudiation. This book focuses on confidentiality issues, in which passive attacks are of primary concern.
Presents a review of eleven of the fundamental issues in multi-user information theory. Each chapter is devoted to one particular issue and follows the same structure. Each chapter starts with a problem description and then describes solutions to the problem for general and specific cases.
Presents a unified mathematical framework for the design of point-to-point MIMO transceivers with channel state information at both sides of the link according to an arbitrary cost function as a measure of the system performance. In addition, the framework embraces the design of systems with given individual performance on the data streams.
Reviews the basic definitions of Majorization Theory and Matrix-Monotone Functions, describing their concepts clearly with many illustrative examples. In addition to this tutorial, new results are presented with respect to Schur-convex functions and regarding the properties of matrix-monotone functions.
Presents a comprehensive theoretical framework for SIR balancing, with and without noise. The theory considers the possible use of receive strategies (eg. interference filtering or channel assignment), which can be included in the model in an abstract way.
Derives in a tutorial manner the fundamental theorems on the asymptotic behavior of eigenvalues, inverses, and products of banded Toeplitz matrices and Toeplitz matrices with absolutely summable elements. Mathematical elegance and generality are sacrificed for conceptual simplicity and insight.
A tutorial on random matrices which provides an overview of the theory and brings together in one source the most significant results recently obtained. Furthermore, the application of random matrix theory to the fundamental limits of wireless communication channels is described in depth.
The interaction between communication entities, which is unique in the network setting, have been at the root of many difficult challenges in communications and information theory. This monograph advocates a sequential approach to make progress on the network communication problem.
Presents a comprehensive survey of universal estimation of information measures for memoryless analog sources with an emphasis on the estimation of mutual information and divergence and their applications. The book reviews the consistency of the universal algorithms and the corresponding sufficient conditions as well as their speed of convergence.
Provides a comprehensive study of Bit-Interleaved Coded Modulation (BICM). In particular, the book reviews its information theoretic foundations, and its capacity, cutoff rate and error exponents. It further examines the error probability of BICM, focussing on the union bound and improved bounds to the error probability.
Provides a tutorial introduction to the algebraic tools involved in the design of codes based on division algebras. The different design criteria involved are illustrated, including the constellation shaping, the information lossless property, the non-vanishing determinant property and the diversity multiplexing tradeoff.
Focuses on the performance evaluation of linear codes under optimal maximum-likelihood (ML) decoding. Though the ML decoding algorithm is prohibitively complex for most practical codes, their performance analysis under ML decoding allows to predict their performance without resorting to computer simulations.
Presents a comprehensive, yet compact, survey, emphasizing the mathematical aspects of single-user multiple-antenna theory. Wireless communication system design was until recently thought to have been limited in practice by time and bandwidth.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.