Information theory Books

Sidebar Sidebar Sidebar
  • Asymptotic Combinatorial Coding Theory Asymptotic Combinatorial Coding Theory
    Add to Cart The item has been added

    Asymptotic Combinatorial Coding Theory

    Asymptotic Combinatorial Coding Theory is devoted to the investigation of the combinatorial properties of transmission systems using discrete signals. The book presents results of interest to specialists in combinatorics...
    $184.00

    Add to Cart The item has been added
  • Hierarchical Optimization and Mathematical Physics Hierarchical Optimization and Mathematical Physics
    Add to Cart The item has been added

    Hierarchical Optimization and Mathematical Physics

    This book should be considered as an introduction to a special dass of hierarchical systems of optimal control, where subsystems are described by partial differential equations of various types. Optimization is carried out by...
    $220.00

    Add to Cart The item has been added
  • Security of Data and Transaction Processing Security of Data and Transaction Processing
    Add to Cart The item has been added

    Security of Data and Transaction Processing

    Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent...
    $227.00

    Add to Cart The item has been added
  • Model Development and Optimization Model Development and Optimization
    Add to Cart The item has been added

    Model Development and Optimization

    At present, concerning intensive development of computer hardware and software, computer-based methods for modeling of difficult problems have become the main technique for theoretical and applied investigations. Many unsolved...
    $227.00

    Add to Cart The item has been added
  • Multimedia Mining Multimedia Mining
    Add to Cart The item has been added

    Multimedia Mining

    Multimedia Mining: A Highway to Intelligent Multimedia Documents brings together experts in digital media content analysis, state-of-art data mining and knowledge discovery in multimedia database systems, knowledge engineers...
    $184.00

    Add to Cart The item has been added
  • Probabilistic Analysis of Belief Functions Probabilistic Analysis of Belief Functions
    Add to Cart The item has been added

    Probabilistic Analysis of Belief Functions

    Inspired by the eternal beauty and truth of the laws governing the run of stars on heavens over his head, and spurred by the idea to catch, perhaps for the smallest fraction of the shortest instant, the Eternity itself, man...
    $227.00

    Add to Cart The item has been added
  • Variation Principle in Informational Macrodynamics Variation Principle in Informational Macrodynamics
    Add to Cart The item has been added

    Variation Principle in Informational Macrodynamics

    Information Macrodynamics (IMD) belong to an interdisciplinary science that represents a new theoretical and computer-based methodology for a system informational descriptionand improvement,including various activities in such...
    $227.00

    Add to Cart The item has been added
  • Reasoning and Unification over Conceptual Graphs Reasoning and Unification over Conceptual Graphs
    Add to Cart The item has been added

    Reasoning and Unification over Conceptual Graphs

    Reasoning and Unification over Conceptual Graphs is an exploration of automated reasoning and resolution in the expanding field of Conceptual Structures. Designed not only for computing scientists researching Conceptual Graphs,...
    $227.00

    Add to Cart The item has been added
  • Aggregation in Large-Scale Optimization Aggregation in Large-Scale Optimization
    Add to Cart The item has been added

    Aggregation in Large-Scale Optimization

    When analyzing systems with a large number of parameters, the dimen­ sion of the original system may present insurmountable difficulties for the analysis. It may then be convenient to reformulate the original system in terms of...
    $220.00

    Add to Cart The item has been added
  • Architecture of Systems Problem Solving Architecture of Systems Problem Solving
    Add to Cart The item has been added

    Architecture of Systems Problem Solving

    One criterion for classifying books is whether they are written for a single pur­ pose or for multiple purposes. This book belongs to the category of multipurpose books, but one of its roles is predominant-it is primarily a...
    $184.00

    Add to Cart The item has been added
  • Stochastic Recursive Algorithms for Optimization Stochastic Recursive Algorithms for Optimization
    Add to Cart The item has been added

    Stochastic Recursive Algorithms for Optimization

    Stochastic Recursive Algorithms for Optimization presents algorithms for constrained and unconstrained optimization and for reinforcement learning. Efficient perturbation approaches form a thread unifying all the algorithms considered. Simultaneous...
    $227.00

    Add to Cart The item has been added
  • Saturated Switching Systems Saturated Switching Systems
    Add to Cart The item has been added

    Saturated Switching Systems

    Saturated Switching Systems treats the problem of actuator saturation, inherent in all dynamical systems by using two approaches: positive invariance in which the controller is designed to work within a region of non-saturating linear behaviour; and...
    $184.00

    Add to Cart The item has been added
  • Dynamic Surface Control of Uncertain Nonlinear Systems Dynamic Surface Control of Uncertain Nonlinear Systems
    Add to Cart The item has been added

    Dynamic Surface Control of Uncertain Nonlinear Systems

    Although the problem of nonlinear controller design is as old as that of linear controller design, the systematic design methods framed in response are more sparse. Given the range and complexity of nonlinear systems, effective new methods of control...
    $227.00

    Add to Cart The item has been added
  • Stability Theory of Switched Dynamical Systems Stability Theory of Switched Dynamical Systems
    Add to Cart The item has been added

    Stability Theory of Switched Dynamical Systems

    There are plenty of challenging and interesting problems open for investigation in the field of switched systems. Stability issues help to generate many complex nonlinear dynamic behaviors within switched systems. The authors present a thorough...
    $227.00

    Add to Cart The item has been added
  • Analysis and Control of Boolean Networks Analysis and Control of Boolean Networks
    Add to Cart The item has been added

    Analysis and Control of Boolean Networks

    Analysis and Control of Boolean Networks presents a systematic new approach to the investigation of Boolean control networks. The fundamental tool in this approach is a novel matrix product called the semi-tensor product (STP). Using the STP, a logical...
    $227.00

    Add to Cart The item has been added
  • Stabilization of Navier-Stokes Flows Stabilization of Navier-Stokes Flows
    Add to Cart The item has been added

    Stabilization of Navier-Stokes Flows

    Stabilization of Navier-Stokes Flows presents recent notable progress in the mathematical theory of stabilization of Newtonian fluid flows. Finite-dimensional feedback controllers are used to stabilize exponentially the equilibrium solutions of...
    $227.00

    Add to Cart The item has been added
  • Complex Strategic Choices Complex Strategic Choices
    Add to Cart The item has been added

    Complex Strategic Choices

    Effective decision making requires a clear methodology, particularly in complex, globally relevant situations. Institutions and companies in all disciplines and sectors are faced with increasingly multi-faceted areas of uncertainty which cannot always be...
    $220.00

    Add to Cart The item has been added
  • Identity-Based Encryption Identity-Based Encryption
    Add to Cart The item has been added

    Identity-Based Encryption

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work...
    $227.00

    Add to Cart The item has been added
  • Fault Detection and Isolation Fault Detection and Isolation
    Add to Cart The item has been added

    Fault Detection and Isolation

    "Fault Detection and Isolation: Multi-Vehicle Unmanned System" deals with the design and development of fault detection and isolation algorithms for unmanned vehicles such as spacecraft, aerial drones and other related vehicles. Addressing fault...
    $227.00

    Add to Cart The item has been added
  • Geometric Design of Linkages Geometric Design of Linkages
    Add to Cart The item has been added

    Geometric Design of Linkages

    This book is an introduction to the mathematical theory of design for articulated mechanical systems known as linkages. The focus is on sizing mechanical constraints that guide the movement of a work piece, or end-effector, of the system. The function of...
    $220.00

    Add to Cart The item has been added
  • Quantum Attacks on Public-Key Cryptosystems Quantum Attacks on Public-Key Cryptosystems
    Add to Cart The item has been added

    Quantum Attacks on Public-Key Cryptosystems

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The...
    $227.00

    Add to Cart The item has been added
  • Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
    Add to Cart The item has been added

    Preserving Privacy in Data Outsourcing

    Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties...
    $227.00

    Add to Cart The item has been added
  • Adaptive Cryptographic Access Control Adaptive Cryptographic Access Control
    Add to Cart The item has been added

    Adaptive Cryptographic Access Control

    Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access...
    $227.00

    Add to Cart The item has been added
  • Web Service Mining Web Service Mining
    Add to Cart The item has been added

    Web Service Mining

    The new computing environment enabled by advances in service oriented arc- tectures, mashups, and cloud computing will consist of service spaces comprising data, applications, infrastructure resources distributed over the Web. This envir- ment embraces a...
    $227.00

    Add to Cart The item has been added
  • Dynamics of Information Systems Dynamics of Information Systems
    Add to Cart The item has been added

    Dynamics of Information Systems

    "Dynamics of Information Systems" presents state-of-the-art research explaining the importance of information in the evolution of a distributed or networked system. This book presents techniques for measuring the value or...
    $184.00

    Add to Cart The item has been added
  • Digital Libraries and Multimedia Digital Libraries and Multimedia
    Add to Cart The item has been added

    Digital Libraries and Multimedia

    Digital Libraries and Multimedia brings together in one place important contributions and up-to-date research results in this fast moving area. Digital Libraries and Multimedia serves as an excellent reference, providing...
    $184.00

    Add to Cart The item has been added
  • Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining
    Add to Cart The item has been added

    Knowledge Discovery and Data Mining

    This book presents a specific and unified approach to Knowledge Discovery and Data Mining, termed IFN for Information Fuzzy Network methodology. Data Mining (DM) is the science of modelling and generalizing common patterns from...
    $227.00

    Add to Cart The item has been added
  • Access Control Systems Access Control Systems
    Add to Cart The item has been added

    Access Control Systems

    Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection...
    $227.00

    Add to Cart The item has been added
  • Stabilization of Control Systems Stabilization of Control Systems
    Add to Cart The item has been added

    Stabilization of Control Systems

    The problem of controlling or stabilizing a system of differential equa­ tions in the presence of random disturbances is intuitively appealing and has been a motivating force behind a wide variety of results grouped loosely...
    $227.00

    Add to Cart The item has been added
  • Multimedia Data Hiding Multimedia Data Hiding
    Add to Cart The item has been added

    Multimedia Data Hiding

    Comprehensive coverage of an important and current hot topic.; Details both theoretical as well as practical aspects.; Presents new data hiding algorithms for images and videos.; Reveals a number of attacks and countermeasures...
    $227.00

    Add to Cart The item has been added
  • Cryptographic Security Architecture Cryptographic Security Architecture
    Add to Cart The item has been added

    Cryptographic Security Architecture

    Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the...
    $227.00

    Add to Cart The item has been added
  • Information and Complexity in Statistical Modeling Information and Complexity in Statistical Modeling
    Add to Cart The item has been added

    Information and Complexity in Statistical Modeling

    Information and Coding.- Shannon-Wiener Information.- Coding of Random Processes.- Statistical Modeling.- Kolmogorov Complexity.- Stochastic Complexity.- Structure Function.- Optimally Distinguishable Models.- The MDL Principle.- Applications.
    $227.00

    Add to Cart The item has been added
  • Control of Complex Systems Control of Complex Systems
    Add to Cart The item has been added

    Control of Complex Systems

    "Control of Complex Systems: Structural Constraints and Uncertainty" focuses on control design under information structure constraints, with a particular emphasis on large-scale systems. The complexity of such systems poses serious computational...
    $220.00

    Add to Cart The item has been added
  • Model-Based Control Model-Based Control
    Add to Cart The item has been added

    Model-Based Control

    Model-Based Control will be a collection of state-of-the-art contributions in the field of modelling, identification, robust control and optimization of dynamical systems, with particular attention to the application domains of motion control systems...
    $227.00

    Add to Cart The item has been added
  • Encryption for Digital Content Encryption for Digital Content
    Add to Cart The item has been added

    Encryption for Digital Content

    Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised...
    $227.00

    Add to Cart The item has been added
  • Hierarchy in Natural and Social Sciences Hierarchy in Natural and Social Sciences
    Add to Cart The item has been added

    Hierarchy in Natural and Social Sciences

    Hierarchy is a form of organisation of complex systems that rely on or produce a strong differentiation in capacity (power and size) between the parts of the system. It is frequently observed within the natural living world as...
    $227.00

    Add to Cart The item has been added
  • Coordinated Multiuser Communications Coordinated Multiuser Communications
    Add to Cart The item has been added

    Coordinated Multiuser Communications

    Coordinated Multiuser Communications provides for the first time a unified treatment of multiuser detection and multiuser decoding in a single volume. Many communications systems, such as cellular mobile radio and wireless...
    $227.00

    Add to Cart The item has been added
  • Existing in the Information Dimension Existing in the Information Dimension
    Add to Cart The item has been added

    Existing in the Information Dimension

    This book presents new insights into the nature of the human mind as a product of the brain. It discusses how biological and technological information systems differ from their counterparts with physical functions, presenting Emergent Information Theory...
    $347.00

    Add to Cart The item has been added
Information theory